Bug 33769 - krb5 new security issue CVE-2024-3596
Summary: krb5 new security issue CVE-2024-3596
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2024-11-15 15:47 CET by Nicolas Salguero
Modified: 2024-12-02 18:18 CET (History)
3 users (show)

See Also:
Source RPM: krb5-1.20.1-1.2.mga9.src.rpm
CVE: CVE-2024-3596
Status comment:


Attachments

Nicolas Salguero 2024-11-15 15:48:22 CET

Source RPM: (none) => krb5-1.21.3-1.mga10.src.rpm, krb5-1.20.1-1.2.mga9.src.rpm
Status comment: (none) => Patch available from Fedora
Whiteboard: (none) => MGA9TOO
CVE: (none) => CVE-2024-3596

Comment 1 Lewis Smith 2024-11-17 20:15:37 CET
Thanks for the patch reference.

Assigning to KDE/Plasma.

Assignee: bugsquad => kde

Comment 2 Nicolas Salguero 2024-11-20 15:13:07 CET
Suggested advisory:
========================

The updated packages fix a security vulnerability:

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature. (CVE-2024-3596)

References:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REJM7FX5TXBAJNRQ7XSMGPQSLMSSGMA3/
========================

Updated packages in core/updates_testing:
========================
krb5-1.20.1-1.3.mga9
krb5-pkinit-1.20.1-1.3.mga9
krb5-server-1.20.1-1.3.mga9
krb5-server-ldap-1.20.1-1.3.mga9
krb5-workstation-1.20.1-1.3.mga9
lib(64)krb53-1.20.1-1.3.mga9
lib(64)krb53-devel-1.20.1-1.3.mga9

from SRPM:
krb5-1.20.1-1.3.mga9.src.rpm

Version: Cauldron => 9
Status comment: Patch available from Fedora => (none)
Status: NEW => ASSIGNED
Assignee: kde => qa-bugs
Whiteboard: MGA9TOO => (none)
Source RPM: krb5-1.21.3-1.mga10.src.rpm, krb5-1.20.1-1.2.mga9.src.rpm => krb5-1.20.1-1.2.mga9.src.rpm

katnatek 2024-11-20 18:55:38 CET

Keywords: (none) => advisory

Comment 3 Herman Viaene 2024-11-22 14:02:39 CET
Tried to follow the wiki as in bug 33344 Comment 2.
But after the initial steps for the server setup (no problems encountered) I noticed that:
there is no file /etc/xinetd.d/eklogin
and
# systemctl restart xinetd.service
Failed to restart xinetd.service: Unit xinetd.service not found.

CC: (none) => herman.viaene

Comment 4 katnatek 2024-11-22 17:27:52 CET
(In reply to Herman Viaene from comment #3)
> Tried to follow the wiki as in bug 33344 Comment 2.
> But after the initial steps for the server setup (no problems encountered) I
> noticed that:
> there is no file /etc/xinetd.d/eklogin
> and
> # systemctl restart xinetd.service
> Failed to restart xinetd.service: Unit xinetd.service not found.

I think we need to update the wiki
https://wiki.archlinux.org/title/Kerberos , I hope the link help you
Comment 5 katnatek 2024-11-23 02:32:36 CET
urpmf /etc/xinetd.d/eklogin -f
krb5-appl-servers-1.0.3-16.mga9.x86_64:/etc/xinetd.d/eklogin

So should krb5-appl-servers be a require to allow follow the test procedure as is written in the wiki
Comment 6 katnatek 2024-11-28 18:38:41 CET
Herman can you repeat test installing by hand krb5-appl-servers?
Comment 7 Herman Viaene 2024-11-29 09:49:12 CET
Installed and then run the procedure again, works OK now, except that the final krlogin does not return anything, but that is a minor deviation I guess.
OK then.

Whiteboard: (none) => MGA9-64-OK

Comment 8 Thomas Andrews 2024-12-01 23:10:59 CET
Validating.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Comment 9 Mageia Robot 2024-12-02 18:18:57 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2024-0385.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.