diff options
| author | Zhixiong Chi <zhixiong.chi@windriver.com> | 2016-04-25 17:34:56 +0800 |
|---|---|---|
| committer | Martin Jansa <Martin.Jansa@gmail.com> | 2016-04-28 10:38:40 +0200 |
| commit | 4d6c01395e39323a5c99e1c73694a616b73cbb52 (patch) | |
| tree | ce87289b041ce40a819879c01792de4e46b21132 /meta-oe/recipes-connectivity/krb5 | |
| parent | c16d59f29617da77e3201f3f5ebe5b639bcb03d9 (diff) | |
| download | meta-openembedded-4d6c01395e39323a5c99e1c73694a616b73cbb52.tar.gz | |
krb5-CVE-2016-3119.patch
Backport <commit 08c642c09c38a9c6454ab43a9b53b2a89b9eef99> from krb5
upstream <https://github.com/krb5/krb5> to fix CVE-2016-3119
avoid remote authenticated users to cause a denial of service (NULL pointer
dereference and daemon crash) via a crafted request to modify a principal.
Signed-off-by: Zhixiong Chi <Zhixiong.Chi@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Diffstat (limited to 'meta-oe/recipes-connectivity/krb5')
| -rw-r--r-- | meta-oe/recipes-connectivity/krb5/krb5/krb5-CVE-2016-3119.patch | 36 | ||||
| -rw-r--r-- | meta-oe/recipes-connectivity/krb5/krb5_1.13.2.bb | 1 |
2 files changed, 37 insertions, 0 deletions
diff --git a/meta-oe/recipes-connectivity/krb5/krb5/krb5-CVE-2016-3119.patch b/meta-oe/recipes-connectivity/krb5/krb5/krb5-CVE-2016-3119.patch new file mode 100644 index 0000000000..67fefed898 --- /dev/null +++ b/meta-oe/recipes-connectivity/krb5/krb5/krb5-CVE-2016-3119.patch | |||
| @@ -0,0 +1,36 @@ | |||
| 1 | Subject: kerb: Fix LDAP null deref on empty arg [CVE-2016-3119] | ||
| 2 | From: Greg Hudson | ||
| 3 | |||
| 4 | In the LDAP KDB module's process_db_args(), strtok_r() may return NULL | ||
| 5 | if there is an empty string in the db_args array. Check for this case | ||
| 6 | and avoid dereferencing a null pointer. | ||
| 7 | |||
| 8 | CVE-2016-3119: | ||
| 9 | |||
| 10 | In MIT krb5 1.6 and later, an authenticated attacker with permission | ||
| 11 | to modify a principal entry can cause kadmind to dereference a null | ||
| 12 | pointer by supplying an empty DB argument to the modify_principal | ||
| 13 | command, if kadmind is configured to use the LDAP KDB module. | ||
| 14 | |||
| 15 | CVSSv2 Vector: AV:N/AC:H/Au:S/C:N/I:N/A:C/E:H/RL:OF/RC:ND | ||
| 16 | |||
| 17 | ticket: 8383 (new) | ||
| 18 | target_version: 1.14-next | ||
| 19 | target_version: 1.13-next | ||
| 20 | tags: pullup | ||
| 21 | |||
| 22 | Upstream-Status: Backport | ||
| 23 | |||
| 24 | Signed-off-by: Zhixiong Chi <zhixiong.chi@windriver.com> | ||
| 25 | Index: krb5-1.13.2/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c | ||
| 26 | =================================================================== | ||
| 27 | --- krb5-1.13.2.orig/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c 2015-05-09 07:27:02.000000000 +0800 | ||
| 28 | +++ krb5-1.13.2/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c 2016-04-11 15:17:12.874140518 +0800 | ||
| 29 | @@ -267,6 +267,7 @@ | ||
| 30 | if (db_args) { | ||
| 31 | for (i=0; db_args[i]; ++i) { | ||
| 32 | arg = strtok_r(db_args[i], "=", &arg_val); | ||
| 33 | + arg = (arg != NULL) ? arg : ""; | ||
| 34 | if (strcmp(arg, TKTPOLICY_ARG) == 0) { | ||
| 35 | dptr = &xargs->tktpolicydn; | ||
| 36 | } else { | ||
diff --git a/meta-oe/recipes-connectivity/krb5/krb5_1.13.2.bb b/meta-oe/recipes-connectivity/krb5/krb5_1.13.2.bb index 1165b11e44..713b76c080 100644 --- a/meta-oe/recipes-connectivity/krb5/krb5_1.13.2.bb +++ b/meta-oe/recipes-connectivity/krb5/krb5_1.13.2.bb | |||
| @@ -32,6 +32,7 @@ SRC_URI = "http://web.mit.edu/kerberos/dist/${BPN}/${SHRT_VER}/${BP}-signed.tar | |||
| 32 | file://etc/init.d/krb5-admin-server \ | 32 | file://etc/init.d/krb5-admin-server \ |
| 33 | file://etc/default/krb5-kdc \ | 33 | file://etc/default/krb5-kdc \ |
| 34 | file://etc/default/krb5-admin-server \ | 34 | file://etc/default/krb5-admin-server \ |
| 35 | file://krb5-CVE-2016-3119.patch;striplevel=2 \ | ||
| 35 | " | 36 | " |
| 36 | SRC_URI[md5sum] = "f7ebfa6c99c10b16979ebf9a98343189" | 37 | SRC_URI[md5sum] = "f7ebfa6c99c10b16979ebf9a98343189" |
| 37 | SRC_URI[sha256sum] = "e528c30b0209c741f6f320cb83122ded92f291802b6a1a1dc1a01dcdb3ff6de1" | 38 | SRC_URI[sha256sum] = "e528c30b0209c741f6f320cb83122ded92f291802b6a1a1dc1a01dcdb3ff6de1" |
