plugins/preauth/pkinit/pkinit_crypto_openssl.c in MIT Kerberos 5 (aka krb5)
through 1.15.2 mishandles Distinguished Name (DN) fields, which allows
remote attackers to execute arbitrary code or cause a denial of service
(buffer overflow and application crash) in situations involving untrusted
X.509 data, related to the get_matching_data and X509_NAME_oneline_ex
functions. NOTE: this has security relevance only in use cases outside of
the MIT Kerberos distribution, e.g., the use of get_matching_data in KDC
certauth plugin code that is specific to Red Hat.
Source: krb5 (LP Ubuntu Debian)
Upstream:released (1.15.2-2)
Ubuntu 12.04 ESM (Precise Pangolin):needs-triage
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.15.2-2)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (1.15.2-2)
Ubuntu 19.04 (Disco Dingo):not-affected (1.15.2-2)
More Information

Updated: 2019-01-14 21:24:20 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)