| Summary: | krb5 new security issues CVE-2024-3737[01] | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Nicolas Salguero <nicolas.salguero> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | andrewsfarm, herman.viaene, sysadmin-bugs |
| Version: | 9 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA9-64-OK | ||
| Source RPM: | krb5-1.20.1-1.1.mga9.src.rpm | CVE: | CVE-2024-37370, CVE-2024-37371 |
| Status comment: | |||
|
Description
Nicolas Salguero
2024-07-01 09:05:02 CEST
Nicolas Salguero
2024-07-01 09:05:34 CEST
Whiteboard:
(none) =>
MGA9TOO Suggested advisory: ======================== The updated packages fix security vulnerabilities: In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application. (CVE-2024-37370) In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields. (CVE-2024-37371) References: https://www.openwall.com/lists/oss-security/2024/06/28/5 ======================== Updated packages in core/updates_testing: ======================== krb5-1.20.1-1.2.mga9 krb5-pkinit-1.20.1-1.2.mga9 krb5-server-1.20.1-1.2.mga9 krb5-server-ldap-1.20.1-1.2.mga9 krb5-workstation-1.20.1-1.2.mga9 lib(64)krb53-1.20.1-1.2.mga9 lib(64)krb53-devel-1.20.1-1.2.mga9 from SRPM: krb5-1.20.1-1.2.mga9.src.rpm Whiteboard:
MGA9TOO =>
(none)
katnatek
2024-07-01 21:46:00 CEST
Keywords:
(none) =>
advisory MGA9-64 Plasma Wayland on HP-Pavillion No installation issues. Followed wiki with success, good to go. CC:
(none) =>
herman.viaene Validating. CC:
(none) =>
andrewsfarm, sysadmin-bugs An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2024-0253.html Status:
ASSIGNED =>
RESOLVED |