Launchpad has imported 8 comments from the remote bug at https://bugzilla.redhat.com/show_bug.cgi?id=827517.
If you reply to an imported comment from within Launchpad, your comment will be sent to the remote bug automatically. Read more about Launchpad's inter-bugtracker facilities at https://help.launchpad.net/InterBugTracking. ------------------------------------------------------------------------ On 2012-06-01T16:42:30+00:00 Vincent wrote: MIT Kerberos 5 version 1.10.2 was released [1] and noted as fixing: * Fix a kadmind denial of service issue (null pointer dereference), which could only be triggered by an administrator with the "create" privilege. [CVE-2012-1013] No information is currently available on which versions are affected by this flaw. [1] http://mailman.mit.edu/pipermail/kerberos- announce/2012q2/000136.html Reply at: https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/0 ------------------------------------------------------------------------ On 2012-06-01T20:17:27+00:00 Vincent wrote: Upstream bug report: http://krbdev.mit.edu/rt/Ticket/Display.html?id=7152 And the upstream fix: https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b This only affects krb5 1.8 and higher, and only clients authorized to create principals can trigger the bug (so requires administrative privileges). Reply at: https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/1 ------------------------------------------------------------------------ On 2012-06-01T20:18:28+00:00 Vincent wrote: Created krb5 tracking bugs for this issue Affects: fedora-all [bug 827598] Reply at: https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/2 ------------------------------------------------------------------------ On 2012-06-13T21:34:03+00:00 Fedora wrote: krb5-1.10-7.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report. Reply at: https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/4 ------------------------------------------------------------------------ On 2012-06-13T21:35:17+00:00 Fedora wrote: krb5-1.9.3-2.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report. Reply at: https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/5 ------------------------------------------------------------------------ On 2012-06-13T21:36:27+00:00 Fedora wrote: krb5-1.9.3-2.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report. Reply at: https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/6 ------------------------------------------------------------------------ On 2012-07-31T18:56:57+00:00 errata-xmlrpc wrote: This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:1131 https://rhn.redhat.com/errata/RHSA-2012-1131.html Reply at: https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/10 ------------------------------------------------------------------------ On 2012-07-31T21:43:19+00:00 Vincent wrote: Statement: Not vulnerable. This issue did not affect the versions of krb5 as shipped with Red Hat Enterprise Linux 4 and 5. Reply at: https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/11 ** Changed in: krb5 (Fedora) Status: Unknown => Fix Released ** Changed in: krb5 (Fedora) Importance: Unknown => Low ** Bug watch added: krbdev.mit.edu/rt/ #7152 http://krbdev.mit.edu/rt/Ticket/Display.html?id=7152 -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to krb5 in Ubuntu. https://bugs.launchpad.net/bugs/1009422 Title: (CVE-2012-1013) krb5 : kadmind denial of service Status in krb5 package in Ubuntu: Fix Released Status in krb5 package in Fedora: Fix Released Bug description: https://secunia.com/advisories/49346/ Description A weakness has been reported in Kerberos, which can be exploited by malicious users to cause a DoS (Denial of Service). The vulnerability is caused due to a NULL pointer dereference error in the "check_1_6_dummy()" function in src/lib/kadm5/srv/svr_principal.c. This can be exploited to cause a crash via a create-principal request containing no password but the KRB5_KDB_DISALLOW_ALL_TIX flag. Successful exploitation requires an administrator account with "create" privileges. The weakness is reported in versions prior to 1.10.2. Solution Update to version 1.10.2. Provided and/or discovered by Reported by the vendor. Original Advisory http://web.mit.edu/kerberos/krb5-1.10/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp