Bugzilla – Bug 1065274
VUL-0: CVE-2017-15088: krb5: Buffer overflow in get_matching_data()
Last modified: 2018-10-02 11:46:42 UTC
rh#1504045 A buffer overflow vulnerability was found in get_matching_data() function when both the CA cert and the user cert have a long subject affecting krb5 that includes certauth plugin. Attack requires a validated certificate with a long subject and issuer, and a "pkinit_cert_match" string attribute on some principal in the database. A remote code execution exploit might also require that the attacker gets to choose the contents of the issuer in the validated cert. Bug report: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698 References: https://bugzilla.redhat.com/show_bug.cgi?id=1504045 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15088 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
Apart from Teradata's version, SLES 11 is not affected due to its lack of PKINIT infrastructure.
SUSE-SU-2017:2948-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1065274 CVE References: CVE-2017-15088 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP3 (src): krb5-1.12.5-40.16.1 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): krb5-1.12.5-40.16.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): krb5-1.12.5-40.16.1 SUSE Linux Enterprise Server 12-SP3 (src): krb5-1.12.5-40.16.1 SUSE Linux Enterprise Server 12-SP2 (src): krb5-1.12.5-40.16.1 SUSE Linux Enterprise Desktop 12-SP3 (src): krb5-1.12.5-40.16.1 SUSE Linux Enterprise Desktop 12-SP2 (src): krb5-1.12.5-40.16.1 SUSE Container as a Service Platform ALL (src): krb5-1.12.5-40.16.1 OpenStack Cloud Magnum Orchestration 7 (src): krb5-1.12.5-40.16.1
openSUSE-SU-2017:2993-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1065274 CVE References: CVE-2017-15088 Sources used: openSUSE Leap 42.3 (src): krb5-1.12.5-12.1, krb5-mini-1.12.5-12.1 openSUSE Leap 42.2 (src): krb5-1.12.5-6.6.1, krb5-mini-1.12.5-6.6.1
This ticket in my opinion is completed, are you happy with closing this bug, Alexander?
done -> closing
thanks for the quick answer!