Bug ID 1205667
Summary VUL-0: CVE-2021-44758: heimdal -- security update
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.4
Hardware Other
URL https://smash.suse.de/issue/348699/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Basesystem
Assignee screening-team-bugs@suse.de
Reporter abergmann@suse.com
QA Contact security-team@suse.de
Found By Security Response Team
Blocker ---

openSUSE:Backports and openSUSE:Factory only.

CVE-2021-44758

Several vulnerabilities were discovered in Heimdal, an implementation of
Kerberos 5 that aims to be compatible with MIT Kerberos.

CVE-2021-3671
Joseph Sutton discovered that the Heimdal KDC does not validate that
    the server name in the TGS-REQ is present before dereferencing,
    which may result in denial of service.
CVE-2021-44758
It was discovered that Heimdal is prone to a NULL dereference in
    acceptors where an initial SPNEGO token that has no acceptable
    mechanisms, which may result in denial of service for a server
    application that uses SPNEGO.
CVE-2022-3437
Several buffer overflow flaws and non-constant time leaks were
    discovered when using 1DES, 3DES or RC4 (arcfour).
CVE-2022-41916
An out-of-bounds memory access was discovered when Heimdal
    normalizes Unicode, which may result in denial of service.
CVE-2022-42898
It was discovered that integer overflows in PAC parsing may result
    in denial of service for Heimdal KDCs or possibly Heimdal servers.
CVE-2022-44640
It was discovered that the Heimdal's ASN.1 compiler generates code
    that allows specially crafted DER encodings to invoke an invalid
    free on the decoded structure upon decode error, which may result in
    remote code execution in the Heimdal KDC.

For the stable distribution (bullseye), these problems have been fixed in
version 7.7.0+dfsg-2+deb11u2.
We recommend that you upgrade your heimdal packages.
For the detailed security status of heimdal please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/heimdal

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44758
https://security-tracker.debian.org/tracker/DSA-5287-1
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586


You are receiving this mail because: