RedHat has issued an advisory on April 16: https://rhn.redhat.com/errata/RHSA-2013-0748.html Cauldron is not affected (bug eliminated through code refactoring in 1.11). Patched package uploaded for Mageia 2. Patch checked into Mageia 1 SVN. Advisory: ======================== Updated krb5 packages fix security vulnerability: A NULL pointer dereference flaw was found in the way the MIT Kerberos KDC processed certain TGS (Ticket-granting Server) requests. A remote, authenticated attacker could use this flaw to crash the KDC via a specially-crafted TGS request (CVE-2013-1416). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416 https://rhn.redhat.com/errata/RHSA-2013-0748.html ======================== Updated packages in core/updates_testing: ======================== krb5-1.9.2-2.5.mga2 libkrb53-devel-1.9.2-2.5.mga2 libkrb53-1.9.2-2.5.mga2 krb5-server-1.9.2-2.5.mga2 krb5-server-ldap-1.9.2-2.5.mga2 krb5-workstation-1.9.2-2.5.mga2 krb5-pkinit-openssl-1.9.2-2.5.mga2 from krb5-1.9.2-2.5.mga2.src.rpm Reproducible: Steps to Reproduce:
Testing complete on Mageia 2 i586 using the procedure from https://wiki.mageia.org/en/QA_procedure:Krb5 I'll test x86_64 shortly.
CC: (none) => davidwhodgins
Testing complete on Mageia 2 x86_64. Could someone from the sysadmin team push the srpm krb5-1.9.2-2.5.mga2.src.rpm from Mageia 2 Core Updates Testing to Core Updates. Advisory: Updated krb5 packages fix security vulnerability: A NULL pointer dereference flaw was found in the way the MIT Kerberos KDC processed certain TGS (Ticket-granting Server) requests. A remote, authenticated attacker could use this flaw to crash the KDC via a specially-crafted TGS request (CVE-2013-1416). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416 https://rhn.redhat.com/errata/RHSA-2013-0748.html https://bugs.mageia.org/show_bug.cgi?id=9778
Keywords: (none) => validated_updateWhiteboard: (none) => MGA2-64-OK MGA2-32-OKCC: (none) => sysadmin-bugs
Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0131
Status: NEW => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED