Bug 963975 (CVE-2015-8631) - VUL-0: CVE-2015-8631: krb5: Memory leak caused by supplying a null principal name in request
Summary: VUL-0: CVE-2015-8631: krb5: Memory leak caused by supplying a null principal ...
Status: RESOLVED FIXED
Alias: CVE-2015-8631
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2016-02-11
Assignee: Howard Guo
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/161390/
Whiteboard: CVSSv2:SUSE:CVE-2015-8631:6.3:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2016-01-28 12:34 UTC by Johannes Segitz
Modified: 2016-05-25 15:36 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Johannes Segitz 2016-01-28 12:34:45 UTC
https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2

In all versions of MIT krb5, an authenticated attacker can cause
kadmind to leak memory by supplying a null principal name in a request
which uses one.  Repeating these requests will eventually cause
kadmind to exhaust all available memory.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1302642
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8631
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
Comment 2 Swamp Workflow Management 2016-01-28 12:49:54 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2016-02-11.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/62471
Comment 3 Swamp Workflow Management 2016-01-28 23:03:20 UTC
bugbot adjusting priority
Comment 8 Bernhard Wiedemann 2016-02-02 09:00:29 UTC
This is an autogenerated message for OBS integration:
This bug (963975) was mentioned in
https://build.opensuse.org/request/show/357307 13.2 / krb5
Comment 9 Swamp Workflow Management 2016-02-10 15:12:27 UTC
openSUSE-SU-2016:0406-1: An update that fixes three vulnerabilities is now available.

Category: security (moderate)
Bug References: 963964,963968,963975
CVE References: CVE-2015-8629,CVE-2015-8630,CVE-2015-8631
Sources used:
openSUSE 13.2 (src):    krb5-1.12.2-21.1, krb5-mini-1.12.2-21.1
Comment 10 Swamp Workflow Management 2016-02-11 14:13:08 UTC
SUSE-SU-2016:0429-1: An update that fixes three vulnerabilities is now available.

Category: security (moderate)
Bug References: 963964,963968,963975
CVE References: CVE-2015-8629,CVE-2015-8630,CVE-2015-8631
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP1 (src):    krb5-1.12.1-25.1
SUSE Linux Enterprise Software Development Kit 12 (src):    krb5-1.12.1-25.1
SUSE Linux Enterprise Server 12-SP1 (src):    krb5-1.12.1-25.1
SUSE Linux Enterprise Server 12 (src):    krb5-1.12.1-25.1
SUSE Linux Enterprise Desktop 12-SP1 (src):    krb5-1.12.1-25.1
SUSE Linux Enterprise Desktop 12 (src):    krb5-1.12.1-25.1
Comment 11 Swamp Workflow Management 2016-02-11 14:13:45 UTC
SUSE-SU-2016:0430-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 963968,963975
CVE References: CVE-2015-8629,CVE-2015-8631
Sources used:
SUSE Linux Enterprise Software Development Kit 11-SP4 (src):    krb5-1.6.3-133.49.106.1
SUSE Linux Enterprise Server 11-SP4 (src):    krb5-1.6.3-133.49.106.1
SUSE Linux Enterprise Desktop 11-SP4 (src):    krb5-1.6.3-133.49.106.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    krb5-1.6.3-133.49.106.1
Comment 12 Swamp Workflow Management 2016-02-18 12:13:17 UTC
openSUSE-SU-2016:0501-1: An update that fixes three vulnerabilities is now available.

Category: security (moderate)
Bug References: 963964,963968,963975
CVE References: CVE-2015-8629,CVE-2015-8630,CVE-2015-8631
Sources used:
openSUSE Leap 42.1 (src):    krb5-1.12.1-27.1, krb5-mini-1.12.1-27.1
Comment 13 Marcus Meissner 2016-05-25 15:36:39 UTC
done