Bug 13858

Summary: [CVE 21] heimdal 7.7.0 CVEs found
Product: [ROSA-based products] ROSA Fresh Reporter: Yury <y.tumanov>
Component: System (kernel, glibc, systemd, bash, PAM...)Assignee: ROSA Linux Bugs <bugs>
Status: VERIFIED FIXED QA Contact: ROSA Linux Bugs <bugs>
Severity: blocker    
Priority: Highest CC: a.proklov, e.kosachev, pastordidi, s.matveev, v.potapov, y.tumanov
Version: AllFlags: v.potapov: qa_verified+
e.kosachev: secteam_verified+
a.proklov: published+
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: CVE-2021-44758, CVE-2022-41916, CVE-2022-42898, CVE-2022-44640,
Whiteboard:
Platform: 2021.1 ROSA Vulnerability identifier:
RPM Package: ISO-related:
Bad POT generating: Upstream:

Description Yury 2023-10-18 20:26:20 MSK
Please patch CVEs for package heimdal version 7.7.0
  
INFO (CVEs are): heimdal 7.7.0
 cves found
CVE-2021-44758
Desc: Heimdal before 7.7.1 allows attackers to cause a NULL pointer dereference in a SPNEGO acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero initial_response value to send_accept.
Link: https://nvd.nist.gov/vuln/detail/CVE-2021-44758
Severity: HIGH
CVE-2022-41916
Desc: Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions prior to 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal's PKI certificate validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as any third-party applications using Heimdal's libhx509. Users should upgrade to Heimdal 7.7.1 or 7.8. There are no known workarounds for this issue.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-41916
Severity: HIGH
CVE-2022-42898
Desc: PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-42898
Severity: HIGH
CVE-2022-44640
Desc: Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC).
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-44640
Severity: CRITICAL
Comment 1 Vladimir Potapov 2023-10-20 13:10:03 MSK
*** Bug 13726 has been marked as a duplicate of this bug. ***
Comment 2 Vladimir Potapov 2023-10-20 13:10:17 MSK
*** Bug 13534 has been marked as a duplicate of this bug. ***
Comment 3 Aleksandr Proklov 2023-11-21 07:59:19 MSK
предлагаю закрыть уязвимости обновлением версии, разработчики помимо этих уязвимостей закрыли еще несколько.

--------------------------------------------------------
openldap	2.4.59-6

- исправлен конфликт между heimdal-devel и krb5-devel

https://abf.io/build_lists/4832928
https://abf.io/build_lists/4832929 (x64)
https://abf.io/build_lists/4832930
https://abf.io/build_lists/4832931
https://abf.io/build_lists/4832932

--------------------------------------------------------
heimdal	7.8.0-1

https://abf.io/build_lists/4832953 (x64)
https://abf.io/build_lists/4832954
https://abf.io/build_lists/4832955
https://abf.io/build_lists/4832956
https://abf.io/build_lists/4832957
Comment 4 Dmitry Postnikov 2023-11-21 22:17:01 MSK
*****************************
Обновление отослано в Тестинг
Comment 5 Vladimir Potapov 2023-11-24 11:43:32 MSK
openldap-2.4.59-6
https://abf.io/build_lists/4832928
https://abf.io/build_lists/4832929 (x64)
https://abf.io/build_lists/4832930
https://abf.io/build_lists/4832931
https://abf.io/build_lists/4832932

heimdal-7.8.0-1
https://abf.io/build_lists/4832953 (x64)
https://abf.io/build_lists/4832954
https://abf.io/build_lists/4832955
https://abf.io/build_lists/4832956
https://abf.io/build_lists/4832957
****************************** Advisory ************************
CVEs fix by update
****************************************************************
QA Verified
Comment 6 Eduard 2024-05-14 11:56:39 MSK
*******************************************************
Secteam_verified
*******************************************************
https://abf.rosalinux.ru/advisories/ROSA-SA-2024-2419
*******************************************************