Double Free Affecting krb5-pkinit package, versions <0:1.12.2-14.el7


medium

Snyk CVSS

    Attack Complexity High
    Confidentiality High
    Integrity High
    Availability High
Expand this section
NVD
8.1 high
Expand this section
Red Hat
4.3 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-ORACLE7-KRB5PKINIT-2491902
  • published 10 Apr 2022
  • disclosed 14 Aug 2014

How to fix?

Upgrade Oracle:7 krb5-pkinit to version 0:1.12.2-14.el7 or higher.
This issue was patched in ELSA-2015-0439.

NVD Description

Note: Versions mentioned in the description apply only to the upstream krb5-pkinit package and not the krb5-pkinit package as distributed by Oracle:7. See How to fix? for Oracle:7 relevant fixed versions and status.

Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via network traffic that appears to come from an intended acceptor, but specifies a security mechanism different from the one proposed by the initiator.