CVE-2007-4743 Incorrect fix for CVE-2007-3999

Related Vulnerabilities: CVE-2007-4743   CVE-2007-3999  

Debian Bug report logs - #441209
CVE-2007-4743 Incorrect fix for CVE-2007-3999

version graph

Package: krb5; Maintainer for krb5 is Sam Hartman <hartmans@debian.org>;

Reported by: Nico Golde <nion@debian.org>

Date: Fri, 7 Sep 2007 13:06:01 UTC

Severity: grave

Tags: security

Found in version 1.6.dfsg.1-7

Done: Nico Golde <nion@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Sam Hartman <hartmans@debian.org>:
Bug#441209; Package krb5. (full text, mbox, link).


Acknowledgement sent to Nico Golde <nion@debian.org>:
New Bug report received and forwarded. Copy sent to Sam Hartman <hartmans@debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: submit@bugs.debian.org
Subject: CVE-2007-4743 Incorrect fix for CVE-2007-3999
Date: Fri, 7 Sep 2007 15:04:54 +0200
[Message part 1 (text/plain, inline)]
Package: krb5
Version: 1.6.dfsg.1-7
Severity: grave
Tags: security

Hi,
a CVE was published for krb5.
CVE-2007-4743[0]:
The original patch for CVE-2007-3999 in svc_auth_gss.c in the
RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by
the Kerberos administration daemon (kadmind) and other applications that use
krb5, does not correctly check the buffer length in some environments and
architectures, which might allow remote attackers to conduct a buffer overflow
attack.

Please include the CVE id in your fix. I have an NMU package ready, if you
have no time or you are not fast enough I would also NMU the package :)

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4743

Kind regards
Nico
-- 
Nico Golde - http://ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
[Message part 2 (application/pgp-signature, inline)]

Reply sent to Nico Golde <nion@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Nico Golde <nion@debian.org>:
Bug acknowledged by developer. (full text, mbox, link).


Message #10 received at 441209-done@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: 441209-done@bugs.debian.org
Subject: Re: CVE-2007-4743 Incorrect fix for CVE-2007-3999
Date: Fri, 7 Sep 2007 15:25:30 +0200
[Message part 1 (text/plain, inline)]
Hi,
I don't know how you uploaded a package on 4 September with 
an updated patch published on 5 September. Anyway, cool you 
did, so I close this bug.
Kind regards
Nico

-- 
Nico Golde - http://ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
[Message part 2 (application/pgp-signature, inline)]

Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sat, 06 Oct 2007 07:25:21 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:35:55 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.