• [SECURITY] [DSA 5287-1] heimdal security update

    From Salvatore Bonaccorso@21:1/5 to All on Tue Nov 22 21:00:01 2022
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-5287-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso November 22, 2022 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : heimdal
    CVE ID : CVE-2021-3671 CVE-2021-44758 CVE-2022-3437 CVE-2022-41916
    CVE-2022-42898 CVE-2022-44640
    Debian Bug : 996586

    Several vulnerabilities were discovered in Heimdal, an implementation of Kerberos 5 that aims to be compatible with MIT Kerberos.

    CVE-2021-3671

    Joseph Sutton discovered that the Heimdal KDC does not validate that
    the server name in the TGS-REQ is present before dereferencing,
    which may result in denial of service.

    CVE-2021-44758

    It was discovered that Heimdal is prone to a NULL dereference in
    acceptors where an initial SPNEGO token that has no acceptable
    mechanisms, which may result in denial of service for a server
    application that uses SPNEGO.

    CVE-2022-3437

    Several buffer overflow flaws and non-constant time leaks were
    discovered when using 1DES, 3DES or RC4 (arcfour).

    CVE-2022-41916

    An out-of-bounds memory access was discovered when Heimdal
    normalizes Unicode, which may result in denial of service.

    CVE-2022-42898

    It was discovered that integer overflows in PAC parsing may result
    in denial of service for Heimdal KDCs or possibly Heimdal servers.

    CVE-2022-44640

    It was discovered that the Heimdal's ASN.1 compiler generates code
    that allows specially crafted DER encodings to invoke an invalid
    free on the decoded structure upon decode error, which may result in
    remote code execution in the Heimdal KDC.

    For the stable distribution (bullseye), these problems have been fixed in version 7.7.0+dfsg-2+deb11u2.

    We recommend that you upgrade your heimdal packages.

    For the detailed security status of heimdal please refer to its security tracker page at:
    https://security-tracker.debian.org/tracker/heimdal

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmN9JvNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Soow//ePJ2Ls8Zoz3IZebkzebVDGYdofReuaVNOxb4yWBVAMi5B2LDYAdsusPJ mih1urmiVUEAoHlCXUUM57dx+Mm+HGOoNcI3ancDuFZIXv3PKGaJK9Tj1QRztZcg dgpWLTxTZKd62xEFsNcuaU4JMQ0dI8WXZHNEM4P7sqwcfBJyaZycoa3lJr0CUZp9 k68IwLEkzX0wgbiYub3himSkCdzMWOAnBuIFGQa6kbnvuwyM04wLi4es8uKTyF5j HFHrbf7eK2bxwizgimMCuM0DfTdaYUbgbLPSRh2P71grJty9EmO3GNaWDryYLXVf oO1klPk5hwmCHZJC3xAX1XATn+bM1ESF2diK95SXE8BmrhFgb4tWQaHWidszVkYO DOo6w+WCvdlHURTg8Az/f2KJWObp6W6+x27owxU38mddagYb0Vepu3dk90IoYzKP 4fy+wQ0eSBqlkBnvTlBjybwK6Jko3EibpusZoNaiJKRof5dTCLd+43GIaAPirU6u yV8x0tZR9ED18altczvzTT0hYFaF2Z4/0vhn4KB2OCCax6ii61GJzIIbkeGm+Blk ZghclzIzHfKBukBBaRSIB+OhO/1rvC7aKRHq24qx7eakUSL/jN7P/V2G56X+Ij4+ ssK/ffgb6NQw6nXu8364mt+qTqbDN0kQ/7nJbpk3tkpJXLEJf1o=
    =ddFe
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)