Home > Security > Advisories

Advisories

Mandriva Advisories

Package name krb5
Date August 9th, 2006
Advisory ID MDKSA-2006:139
Affected versions CS3.0, MNF2.0, 2006.0
Synopsis Updated krb5 packages fix local privilege escalation vulnerability

Problem Description

A flaw was discovered in some bundled Kerberos-aware packages that
would fail to check the results of the setuid() call. This call can
fail in some circumstances on the Linux 2.6 kernel if certain user
limits are reached, which could be abused by a local attacker to get
the applications to continue to run as root, possibly leading to an
elevation of privilege.

Updated packages have been patched to correct this issue.

Updated Packages

Corporate Server 3.0

 828af711a7bc04cee4de3fccba07543f  corporate/3.0/RPMS/ftp-client-krb5-1.3-6.7.C30mdk.i586.rpm
 fc41fbc471acd1d94716ba7b37094e2c  corporate/3.0/RPMS/ftp-server-krb5-1.3-6.7.C30mdk.i586.rpm
 d118695919843b28dc401994b2f8605f  corporate/3.0/RPMS/krb5-server-1.3-6.7.C30mdk.i586.rpm
 c75c0d61e7fc98123f4dbfce2b2d3109  corporate/3.0/RPMS/krb5-workstation-1.3-6.7.C30mdk.i586.rpm
 156f7354acd35590c33903d5dce0697d  corporate/3.0/RPMS/libkrb51-1.3-6.7.C30mdk.i586.rpm
 15c4329696fbcfecc7bedc62c56cf577  corporate/3.0/RPMS/libkrb51-devel-1.3-6.7.C30mdk.i586.rpm
 d88d3533f6993057eb01d9baeb8f9046  corporate/3.0/RPMS/telnet-client-krb5-1.3-6.7.C30mdk.i586.rpm
 be90de149ade08f77bf15481e4a65bf6  corporate/3.0/RPMS/telnet-server-krb5-1.3-6.7.C30mdk.i586.rpm
 b5ab69f2c45bd7fd8ddf24204126a0d1  corporate/3.0/SRPMS/krb5-1.3-6.7.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 52e38def3585a04f2cec5dff30d1dad2  x86_64/corporate/3.0/RPMS/ftp-client-krb5-1.3-6.7.C30mdk.x86_64.rpm
 02a6c33fc49fe58013e999e2a4773f70  x86_64/corporate/3.0/RPMS/ftp-server-krb5-1.3-6.7.C30mdk.x86_64.rpm
 c3a9e4068740aeb23667ed5d46f0b48d  x86_64/corporate/3.0/RPMS/krb5-server-1.3-6.7.C30mdk.x86_64.rpm
 9196af8c916c889cbe234acb1393faf0  x86_64/corporate/3.0/RPMS/krb5-workstation-1.3-6.7.C30mdk.x86_64.rpm
 ae7336d754a485b4f24a42f3c36fbb59  x86_64/corporate/3.0/RPMS/lib64krb51-1.3-6.7.C30mdk.x86_64.rpm
 d38b0395a79d4ea909aeaf0eefcdc9d4  x86_64/corporate/3.0/RPMS/lib64krb51-devel-1.3-6.7.C30mdk.x86_64.rpm
 9e9bc222b2d7cbfc47c1af0fabd6ffd5  x86_64/corporate/3.0/RPMS/telnet-client-krb5-1.3-6.7.C30mdk.x86_64.rpm
 afd4f60af3022e6c319eb38fb658ca24  x86_64/corporate/3.0/RPMS/telnet-server-krb5-1.3-6.7.C30mdk.x86_64.rpm
 b5ab69f2c45bd7fd8ddf24204126a0d1  x86_64/corporate/3.0/SRPMS/krb5-1.3-6.7.C30mdk.src.rpm

Multi Network Firewall 2.0

 99da07eef578ea9634378d30310ea6da  mnf/2.0/RPMS/libkrb51-1.3-6.7.M20mdk.i586.rpm
 8fd9018ab4c3bed69af2466a5e587f25  mnf/2.0/SRPMS/krb5-1.3-6.7.M20mdk.src.rpm

Mandriva Linux 2006

 9769771585fb7b7fc6cf6feea1d6852d  2006.0/RPMS/ftp-client-krb5-1.4.2-1.1.20060mdk.i586.rpm
 132d70eb7cc47ac787ceb4490f87d308  2006.0/RPMS/ftp-server-krb5-1.4.2-1.1.20060mdk.i586.rpm
 ebcf417d249dc28511c8e6579ad832de  2006.0/RPMS/krb5-server-1.4.2-1.1.20060mdk.i586.rpm
 37eb990906dea9b113f8dde526a218ab  2006.0/RPMS/krb5-workstation-1.4.2-1.1.20060mdk.i586.rpm
 12bd0420fdfdf55433beaa839d245c7d  2006.0/RPMS/libkrb53-1.4.2-1.1.20060mdk.i586.rpm
 73ec87553b0dfdee4170c23fd42f9b33  2006.0/RPMS/libkrb53-devel-1.4.2-1.1.20060mdk.i586.rpm
 2e9bca676a7c89a2970105ec73dfd43a  2006.0/RPMS/telnet-client-krb5-1.4.2-1.1.20060mdk.i586.rpm
 309990a6c12954d0c742ae3fcc20d3f7  2006.0/RPMS/telnet-server-krb5-1.4.2-1.1.20060mdk.i586.rpm
 6b8f5083efd5c04230fb732636e78269  2006.0/SRPMS/krb5-1.4.2-1.1.20060mdk.src.rpm

Mandriva Linux 2006/X86_64

 7379da32042912507b45257c3ae7527a  x86_64/2006.0/RPMS/ftp-client-krb5-1.4.2-1.1.20060mdk.x86_64.rpm
 5b9c39f00856cbfe56c984636c9616ec  x86_64/2006.0/RPMS/ftp-server-krb5-1.4.2-1.1.20060mdk.x86_64.rpm
 dcbd8eb16edbaeab7f96bbbd61a63a42  x86_64/2006.0/RPMS/krb5-server-1.4.2-1.1.20060mdk.x86_64.rpm
 27f81fe2c23b1aadb77bf36a765f1f3a  x86_64/2006.0/RPMS/krb5-workstation-1.4.2-1.1.20060mdk.x86_64.rpm
 3ab0d3234686c559c0ca1363503f6632  x86_64/2006.0/RPMS/lib64krb53-1.4.2-1.1.20060mdk.x86_64.rpm
 b79453018b1fdfd10cd1e67ed77eeecb  x86_64/2006.0/RPMS/lib64krb53-devel-1.4.2-1.1.20060mdk.x86_64.rpm
 7ec7ec461afca7f7707e010310be4532  x86_64/2006.0/RPMS/telnet-client-krb5-1.4.2-1.1.20060mdk.x86_64.rpm
 e596730793941a4aedb582abb7bec0cf  x86_64/2006.0/RPMS/telnet-server-krb5-1.4.2-1.1.20060mdk.x86_64.rpm
 6b8f5083efd5c04230fb732636e78269  x86_64/2006.0/SRPMS/krb5-1.4.2-1.1.20060mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.