| Summary: | krb5 new security issues CVE-2014-535[34] | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | olchal, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/627331/ | ||
| Whiteboard: | has_procedure advisory MGA4-32-OK MGA4-64-OK | ||
| Source RPM: | krb5-1.11.4-1.2.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2014-12-16 16:08:35 CET
Given that the only thing impacted by this change is using the LDAP backend for the KDC database, which is unlikely to be tested by anyone, full testing via the procedure is not really necessary. Just testing that the packages install is sufficient, although I just tested the kinit is able to successfully give me a ticket (tested against an Active Directory KDC), so at least I know a gamma ray didn't hit the build system and completely break the updated build :o) Adding an OK for Mageia 4 i586. Whiteboard:
has_procedure =>
has_procedure MGA4-32-OK Tested succesfully on Mageia4x64 following procedure mentioned in Comment 1 From current packages : --------------------- krb5-1.11.4-1.2.mga4 krb5-workstation-1.11.4-1.2.mga4 krb5-server-1.11.4-1.2.mga4 krb5-server-ldap-1.11.4-1.2.mga4 To updated testing packages : --------------------------- lib64krb53-1.11.4-1.3.mga4 krb5-1.11.4-1.3.mga4 krb5-workstation-1.11.4-1.3.mga4 krb5-server-1.11.4-1.3.mga4 krb5-server-ldap-1.11.4-1.3.mga4 CC:
(none) =>
olchal Validating. Advisory uploaded. Could sysadmin please push to updates Thanks Whiteboard:
has_procedure MGA4-32-OK MGA4-64-OK =>
has_procedure advisory MGA4-32-OK MGA4-64-OK An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2014-0536.html Resolution:
(none) =>
FIXED
David Walser
2014-12-22 20:26:19 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/627331/ LWN reference for CVE-2014-5354: http://lwn.net/Vulnerabilities/632907/ |