{"id":"MGASA-2016-0052","summary":"Updated krb5 packages fix security vulnerability","details":"In all versions of MIT krb5, an authenticated attacker can cause kadmind\nto read beyond the end of allocated memory by sending a string without a\nterminating zero byte.  Information leakage may be possible for an\nattacker with permission to modify the database (CVE-2015-8629).\n\nIn MIT krb5 1.12 and later, an authenticated attacker with permission to\nmodify a principal entry can cause kadmind to dereference a null pointer\nby supplying a null policy value but including KADM5_POLICY in the mask\n(CVE-2015-8630).\n\nIn all versions of MIT krb5, an authenticated attacker can cause kadmind\nto leak memory by supplying a null principal name in a request which uses\none.  Repeating these requests will eventually cause kadmind to exhaust\nall available memory (CVE-2015-8631).\n","modified":"2026-04-16T06:24:36.771849913Z","published":"2016-02-05T17:26:09Z","upstream":["CVE-2015-8629","CVE-2015-8630","CVE-2015-8631"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0052.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=17642"},{"type":"WEB","url":"https://lists.fedoraproject.org/pipermail/package-announce/2016-January/176451.html"}],"affected":[{"package":{"name":"krb5","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/krb5?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.12.2-8.3.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0052.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}