MGASA-2016-0123

Source
https://advisories.mageia.org/MGASA-2016-0123.html
Import Source
https://advisories.mageia.org/MGASA-2016-0123.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0123
Related
Published
2016-03-25T06:38:37Z
Modified
2016-03-25T06:21:42Z
Summary
Updated krb5 packages fix security vulnerability
Details

It was reported that in all versions of MIT krb5, an authenticated attacker with permission to modify a principal entry can cause kadmind to dereference a null pointer by supplying an empty DB argument to the modify_principal command, if kadmind is configured to use the LDAP KDB module (CVE-2016-3119).

The krb5 package has been updated to version 1.12.5 and patched to fix this issue and other bugs.

References
Credits

Affected packages

Mageia:5 / krb5

Package

Name
krb5
Purl
pkg:rpm/mageia/krb5?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.12.5-1.mga5

Ecosystem specific

{
    "section": "core"
}