Mageia 2022-0467: krb5 security update
Summary
Greg Hudson discovered integer overflow flaws in the PAC parsing in krb5,
the MIT implementation of Kerberos, which may result in remote code
execution (in a KDC, kadmin, or GSS or Kerberos application server
process), information exposure (to a cross-realm KDC acting maliciously),
or denial of service (KDC or kadmind process crash).
References
- https://bugs.mageia.org/show_bug.cgi?id=31157
- https://www.debian.org/security/2022/dsa-5286
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I6MV4DA2O6D7LCUS6WJQRCLT5N3QXGX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/KNFBR437JQZXMPIT2AJCTGKUTQAFEMBY/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
Resolution
MGASA-2022-0467 - Updated krb5 packages fix security vulnerability
SRPMS
- 8/core/krb5-1.18.3-1.3.mga8