Headline
Ubuntu Security Notice USN-5849-1
Ubuntu Security Notice 5849-1 - Helmut Grohne discovered that Heimdal GSSAPI incorrectly handled logical conditions that are related to memory management operations. An attacker could possibly use this issue to cause a denial of service.
==========================================================================
Ubuntu Security Notice USN-5849-1
February 08, 2023
heimdal vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Summary:
Heimdal could be made to crash if it received specially crafted
input.
Software Description:
- heimdal: Heimdal Kerberos Network Authentication Protocol
Details:
Helmut Grohne discovered that Heimdal GSSAPI incorrectly handled logical
conditions that are related to memory management operations.
An attacker could possibly use this issue to cause a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
libgssapi3-heimdal 7.7.0+dfsg-1ubuntu1.4
Ubuntu 18.04 LTS:
libgssapi3-heimdal 7.5.0+dfsg-1ubuntu0.4
Ubuntu 16.04 ESM:
libgssapi3-heimdal 1.7~git20150920+dfsg-4ubuntu1.16.04.1+esm4
Ubuntu 14.04 ESM:
libgssapi3-heimdal 1.6~git20131207+dfsg-1ubuntu1.2+esm4
After a standard system update you need to restart any application
using Heimdal libraries to make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5849-1
CVE-2022-45142
Package Information:
https://launchpad.net/ubuntu/+source/heimdal/7.7.0+dfsg-1ubuntu1.4
https://launchpad.net/ubuntu/+source/heimdal/7.5.0+dfsg-1ubuntu0.4
Related news
Gentoo Linux Security Advisory 202310-6 - Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC. Versions greater than or equal to 7.8.0-r1 are affected.
The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.
Debian Linux Security Advisory 5344-1 - Helmut Grohne discovered a flaw in Heimdal, an implementation of Kerberos 5 that aims to be compatible with MIT Kerberos. The backports of fixes for CVE-2022-3437 accidentally inverted important memory comparisons in the arcfour-hmac-md5 and rc4-hmac integrity check handlers for gssapi, resulting in incorrect validation of message integrity codes.