OESA-2023-1527

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1527
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1527.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2023-1527
Upstream
Published
2023-08-26T11:05:43Z
Modified
2025-08-12T05:21:04.123819Z
Summary
krb5 security update
Details

Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography.

Security Fix(es):

lib/kadm5/kadmrpcxdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because xdrkadm5principalentrec does not validate the relationship between nkeydata and the keydata array count.(CVE-2023-36054)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP3 / krb5

Package

Name
krb5
Purl
pkg:rpm/openEuler/krb5&distro=openEuler-20.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.18.2-8.oe1

Ecosystem specific

{
    "x86_64": [
        "krb5-client-1.18.2-8.oe1.x86_64.rpm",
        "krb5-libs-1.18.2-8.oe1.x86_64.rpm",
        "krb5-debuginfo-1.18.2-8.oe1.x86_64.rpm",
        "krb5-debugsource-1.18.2-8.oe1.x86_64.rpm",
        "krb5-devel-1.18.2-8.oe1.x86_64.rpm",
        "krb5-server-1.18.2-8.oe1.x86_64.rpm",
        "krb5-1.18.2-8.oe1.x86_64.rpm"
    ],
    "src": [
        "krb5-1.18.2-8.oe1.src.rpm"
    ],
    "aarch64": [
        "krb5-libs-1.18.2-8.oe1.aarch64.rpm",
        "krb5-debuginfo-1.18.2-8.oe1.aarch64.rpm",
        "krb5-1.18.2-8.oe1.aarch64.rpm",
        "krb5-devel-1.18.2-8.oe1.aarch64.rpm",
        "krb5-server-1.18.2-8.oe1.aarch64.rpm",
        "krb5-client-1.18.2-8.oe1.aarch64.rpm",
        "krb5-debugsource-1.18.2-8.oe1.aarch64.rpm"
    ],
    "noarch": [
        "krb5-help-1.18.2-8.oe1.noarch.rpm"
    ]
}