Date: Wednesday, August 13, 2014 @ 02:13:55 Author: eric Revision: 219636
upgpkg: krb5 1.12.2-1 Upstream update, Remove old patch Modified: krb5/trunk/PKGBUILD Deleted: krb5/trunk/krb5-81c332e29f10887c6b9deb065f81ba259f4c7e03.patch -----------------------------------------------------+ PKGBUILD | 13 +-- krb5-81c332e29f10887c6b9deb065f81ba259f4c7e03.patch | 64 ------------------ 2 files changed, 5 insertions(+), 72 deletions(-) Modified: PKGBUILD =================================================================== --- PKGBUILD 2014-08-13 00:13:13 UTC (rev 219635) +++ PKGBUILD 2014-08-13 00:13:55 UTC (rev 219636) @@ -2,8 +2,8 @@ # Maintainer: Stéphane Gaudreault <[email protected]> pkgname=krb5 -pkgver=1.12.1 -pkgrel=2 +pkgver=1.12.2 +pkgrel=1 pkgdesc="The Kerberos network authentication system" arch=('i686' 'x86_64') url="http://web.mit.edu/kerberos/" @@ -18,16 +18,14 @@ krb5-kdc.service krb5-kpropd.service [email protected] - krb5-kpropd.socket - krb5-81c332e29f10887c6b9deb065f81ba259f4c7e03.patch) -sha1sums=('d59e8dc0fc9e1890e109cd033756539984e3d3fe' + krb5-kpropd.socket) +sha1sums=('281ab1be7e8cf2b38134c330f0d2b3bc88da7915' 'f125824ed37f31e6fd2fdb6a437be8ff1c3700ab' '59bbc7e686cbb4bcefddf0f134d928d7bd5e7722' '2ef2476a8673b3b702e829d8f451c839c2273b02' '74d66aefd291f22dd80799f0437cc03d83083ed5' '6787c6ce2783b3f980c423e2dd4abf5236af670b' - 'f3677d30dbbd7106c581379c2c6ebb1bf7738912' - '8273976824137df1d42a4f9c7bafdfbd92f27d0a') + 'f3677d30dbbd7106c581379c2c6ebb1bf7738912') prepare() { # the signature and source are bundled together, so signature check needs to be done here @@ -37,7 +35,6 @@ cd ${pkgname}-${pkgver} # cf https://bugs.gentoo.org/show_bug.cgi?id=448778 patch -p1 -i "${srcdir}"/krb5-config_LDFLAGS.patch - patch -p1 -i "${srcdir}"/krb5-81c332e29f10887c6b9deb065f81ba259f4c7e03.patch # FS#25384 sed -i "/KRB5ROOT=/s/\/local//" src/util/ac_check_krb5.m4 Deleted: krb5-81c332e29f10887c6b9deb065f81ba259f4c7e03.patch =================================================================== --- krb5-81c332e29f10887c6b9deb065f81ba259f4c7e03.patch 2014-08-13 00:13:13 UTC (rev 219635) +++ krb5-81c332e29f10887c6b9deb065f81ba259f4c7e03.patch 2014-08-13 00:13:55 UTC (rev 219636) @@ -1,64 +0,0 @@ -From 81c332e29f10887c6b9deb065f81ba259f4c7e03 Mon Sep 17 00:00:00 2001 -From: Tomas Kuthan <[email protected]> -Date: Fri, 1 Aug 2014 15:25:50 +0200 -Subject: [PATCH] Fix LDAP key data segmentation [CVE-2014-4345] - -For principal entries having keys with multiple kvnos (due to use of --keepold), the LDAP KDB module makes an attempt to store all the keys -having the same kvno into a single krbPrincipalKey attribute value. -There is a fencepost error in the loop, causing currkvno to be set to -the just-processed value instead of the next kvno. As a result, the -second and all following groups of multiple keys by kvno are each -stored in two krbPrincipalKey attribute values. Fix the loop to use -the correct kvno value. - -CVE-2014-4345: - -In MIT krb5, when kadmind is configured to use LDAP for the KDC -database, an authenticated remote attacker can cause it to perform an -out-of-bounds write (buffer overrun) by performing multiple cpw --keepold operations. An off-by-one error while copying key -information to the new database entry results in keys sharing a common -kvno being written to different array buckets, in an array whose size -is determined by the number of kvnos present. After sufficient -iterations, the extra writes extend past the end of the -(NULL-terminated) array. The NULL terminator is always written after -the end of the loop, so no out-of-bounds data is read, it is only -written. - -Historically, it has been possible to convert an out-of-bounds write -into remote code execution in some cases, though the necessary -exploits must be tailored to the individual application and are -usually quite complicated. Depending on the allocated length of the -array, an out-of-bounds write may also cause a segmentation fault -and/or application crash. - - CVSSv2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C - -[[email protected]: clarified commit message] -[[email protected]: CVE summary, CVSSv2 vector] - -ticket: 7980 (new) -target_version: 1.12.2 -tags: pullup ---- - src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c | 3 ++- - 1 file changed, 2 insertions(+), 1 deletion(-) - -diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c -index ce851ea..df5934c 100644 ---- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c -+++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c -@@ -456,7 +456,8 @@ krb5_encode_krbsecretkey(krb5_key_data *key_data_in, int n_key_data, - j++; - last = i + 1; - -- currkvno = key_data[i].key_data_kvno; -+ if (i < n_key_data - 1) -+ currkvno = key_data[i + 1].key_data_kvno; - } - } - ret[num_versions] = NULL; --- -2.0.3 -
