Package "heimdal"
Name: |
heimdal
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Heimdal Kerberos - clients
- Heimdal Kerberos - KCM daemon
- Heimdal Kerberos - key distribution center (KDC)
- Heimdal Kerberos - server programs
|
Latest version: |
7.5.0+dfsg-1ubuntu0.4 |
Release: |
bionic (18.04) |
Level: |
updates |
Repository: |
universe |
Links
Other versions of "heimdal" in Bionic
Packages in group
Deleted packages are displayed in grey.
Changelog
heimdal (7.5.0+dfsg-1ubuntu0.4) bionic-security; urgency=medium
* SECURITY UPDATE: signature validation failure
- debian/patches/CVE-2022-45142.patch: fix logic inversion issue caused
by the fix for CVE-2022-3437 when using memcmp in
_gssapi_verify_mic_arcfour() and _gssapi_unwrap_arcfour() in
lib/gssapi/krb5/arcfour.c.
- CVE-2022-45142
-- Rodrigo Figueiredo Zaiden <email address hidden> Mon, 06 Feb 2023 15:30:26 -0300
|
Source diff to previous version |
|
heimdal (7.5.0+dfsg-1ubuntu0.3) bionic-security; urgency=medium
* SECURITY UPDATE: NULL pointer dereference
- debian/patches/CVE-2021-44758.patch: add a call to send_reject() when
preferred_mech_type is GSS_C_NO_OID in
lib/gssapi/spnego/accept_sec_context.c.
- debian/patches/CVE-2021-44758-post.patch: remove grep command in test
file tests/gss/check-context.in to prevent FTBFS.
- CVE-2021-44758
* SECURITY UPDATE: buffer overflow
- debian/patches/CVE-2022-3437-1.patch: change calls to memcmp with
ct_memcmp in lib/gssapi/krb5/arcfour.c.
- debian/patches/CVE-2022-3437-2.patch: change calls to memcmp with
ct_memcmp in lib/gssapi/krb5/unwrap.c
- debian/patches/CVE-2022-3437-3.patch: add NULL pointer checks before
memcpy in lib/gssapi/krb5/unwrap.c.
- debian/patches/CVE-2022-3437-4.patch: change logic on pad buffer
hanlding in _gssapi_verify_pad() in lib/gssapi/krb5/decapsulate.c.
- debian/patches/CVE-2022-3437-5.patch: add buffer boundary checks in
_gssapi_verify_mech_header() in lib/gssapi/krb5/decapsulate.c
- debian/patches/CVE-2022-3437-6.patch: add buffer length checks in
lib/gssapi/krb5/unwrap.c.
- debian/patches/CVE-2022-3437-7.patch: add buffer length checks in
_gsskrb5_get_mech() in lib/gssapi/krb5/decapsulate.c.
- debian/patches/CVE-2022-3437-8.patch: change buffer length parameter
when calling _gssapi_verify_pad() in lib/gssapi/krb5/unwrap.c.
- CVE-2022-3437
* SECURITY UPDATE: integer overflow
- debian/patches/CVE-2022-42898-1.patch: change logic on PAC buffer
parsing in lib/krb5/pac.c.
- debian/patches/CVE-2022-42898-2.patch: change variable type from
unsigned long to uint64_t in lib/krb5/store-int.c.
- CVE-2022-42898
* SECURITY UPDATE: invalid free
- debian/patches/CVE-2022-44640.patch: relocates a call to fprintf and
parameters when calling it in decode_type() in lib/asn1/gen_decode.c
and add a call to fprintf in free_type() in lib/asn1/gen_free.c.
- CVE-2022-44640
-- Rodrigo Figueiredo Zaiden <email address hidden> Wed, 11 Jan 2023 19:19:12 -0300
|
Source diff to previous version |
CVE-2021-44758 |
Heimdal before 7.7.1 allows attackers to cause a NULL pointer dereference in a SPNEGO acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzer |
CVE-2022-3437 |
Buffer overflow in Heimdal unwrap_des3() |
CVE-2022-42898 |
PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, |
CVE-2022-44640 |
Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Cen |
|
heimdal (7.5.0+dfsg-1ubuntu0.2) bionic-security; urgency=medium
* SECURITY UPDATE: out-of-bounds memory access
- debian/patches/CVE-2022-41916.patch: move variable assignment and
increment to be done later in time to prevent unintended read in
find_composition() in lib/wind/normalize.c.
- CVE-2022-41916
-- Rodrigo Figueiredo Zaiden <email address hidden> Wed, 07 Dec 2022 15:09:46 -0300
|
Source diff to previous version |
CVE-2022-41916 |
Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions prior to 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal |
|
heimdal (7.5.0+dfsg-1ubuntu0.1) bionic-security; urgency=medium
* Fix FTBFS problem due to expired certificates that cause failing tests
- debian/patches/update-certs.patch: regenerate certs so that they expire
before 2038.
- debian/source/include-binaries: add altered binaries.
* SECURITY UPDATE: incomplete checksum validation in S4U2Self handler
- debian/patches/CVE-2018-16860.patch: reject PA-S4U2Self with unkeyed
checksum (Heimdal KDC).
- CVE-2018-16860
* SECURITY UPDATE: no verification of anonymous PKINIT PA-PKINIT-KX key
exchange
- debian/patches/CVE-2019-12098.patch: always confirm PA-PKINIT-KX for
anon PKINIT (krb5).
- CVE-2019-12098
* SECURITY UPDATE: NULL pointer dereference when handling missing sname in
TGS-REQ
- debian/patches/CVE-2021-3671.patch: validate sname in TGS-REQ (kdc).
- CVE-2021-3671
* SECURITY UPDATE: NULL pointer dereference in SPNEGO
- debian/patches/CVE-2022-3116.patch: fix NULL pointer dereference
(spnego).
- CVE-2022-3116
-- Camila Camargo de Matos <email address hidden> Tue, 11 Oct 2022 14:46:15 -0300
|
CVE-2018-16860 |
A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, exclud |
CVE-2019-12098 |
In the client side of Heimdal before 7.6.0, failure to verify anonymous PKINIT PA-PKINIT-KX key exchange permits a man-in-the-middle attack. This iss |
CVE-2021-3671 |
A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authen |
CVE-2022-3116 |
RESERVED |
|
About
-
Send Feedback to @ubuntu_updates