CVE-2015-8629

Priority
Description
The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT
Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not
verify whether '\0' characters exist as expected, which allows remote
authenticated users to obtain sensitive information or cause a denial of
service (out-of-bounds read) via a crafted string.
Notes
ratliffuse of kadmind by touch and core is not supported
Package
Source: krb5 (LP Ubuntu Debian)
Upstream:released (1.14+dfsg-1)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 ESM (Trusty Tahr):released (1.12+dfsg-2ubuntu5.4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (1.13.2+dfsg-5)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.14.3+dfsg-2ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (1.14.3+dfsg-2ubuntu1)
Ubuntu 20.04 (Focal Fossa):not-affected (1.14.3+dfsg-2ubuntu1)
Patches:
Upstream:https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2020-04-24 03:19:19 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)