Package "libgssrpc4"
  
    
    
        | Name: | 
        libgssrpc4
            
         | 
    
    
         Description: | 
        
             MIT Kerberos runtime libraries - GSS enabled ONCRPC 
         | 
    
    
        | Latest version: | 
        1.16-2ubuntu0.4 | 
    
    
        | Release: | 
        bionic (18.04) | 
    
    
        | Level: | 
        updates | 
    
    
        | Repository: | 
        main | 
    
         
            | Head package: | 
            krb5 | 
         
        
            | Homepage: | 
            http://web.mit.edu/kerberos/ | 
        
    
   
  
  
 
Links
    Download "libgssrpc4"
    
Other versions of "libgssrpc4" in Bionic
    
Changelog
    
    
    
        
        
    
    
        | 
               krb5 (1.16-2ubuntu0.4) bionic-security; urgency=medium 
  * SECURITY UPDATE: Null pointer dereference issue
     - debian/patches/CVE-2021-36222.patch: Fix KDC null deref on bad
       encrypted challenge
     - debian/patches/CVE-2021-37750.patch: Fix KDC null deref on TGS inner
       body null server
     - CVE-2021-36222
     - CVE-2021-37750 
 -- Nishit Majithia <email address hidden>  Wed, 15 Mar 2023 19:38:38 +0530 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2021-36222 | 
                ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows rem | 
                 
                
                | CVE-2021-37750 | 
                The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_re | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               krb5 (1.16-2ubuntu0.3) bionic-security; urgency=medium 
  * SECURITY UPDATE: Integer overflow
     - debian/patches/CVE-2022-42898.patch: add buffer length checks in
       krb5_pac_parse() in src/lib/krb5/krb/pac.c and a test case for
       invalid buffers in src/lib/krb5/krb/t_pac.c.
     - CVE-2022-42898
   * SECURITY UPDATE: DoS (crash) the KDC by making an S4U2Self request
     - debian/patches/CVE-2018-20217-1.patch: Ignore password attributes for
       S4U2Self requests.
     - debian/patches/CVE-2018-20217-2.patch: remove incorrect KDC assertion.
     - CVE-2018-20217 
 -- Rodrigo Figueiredo Zaiden <email address hidden>  Fri, 20 Jan 2023 07:37:35 -0300 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2022-42898 | 
                PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, | 
                 
                
                | CVE-2018-20217 | 
                A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an ol | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               krb5 (1.16-2ubuntu0.2) bionic-security; urgency=medium 
  * SECURITY UPDATE: Unbounded recursion
     - debian/patches/CVE-2020-28196.patch: adds recursion limit for ASN.1
       indefinite lenghts in src/lib/krb5/asn.1/asn1_encode.c.
     - CVE-2020-28196 
 -- <email address hidden> (Leonidas S. Barbosa)  Wed, 11 Nov 2020 11:23:49 -0300 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2020-28196 | 
                MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               krb5 (1.16-2ubuntu0.1) bionic-security; urgency=medium 
  * SECURITY UPDATE: Authenticated kadmin with permission to add principals
     to an LDAP Kerberos can DoS or bypass DN container check.
     - debian/patches/CVE-2018-5729-CVE-2018-5730.patch: Fix flaws in LDAP DN
       checking
     - CVE-2018-5729
     - CVE-2018-5730 
 -- Eduardo Barretto <email address hidden>  Fri, 11 Jan 2019 13:48:01 -0200 
         | 
    
    
        
        
            
            
                
                | CVE-2018-5729 | 
                MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NUL | 
                 
                
                | CVE-2018-5730 | 
                MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership  | 
                 
             
         | 
        
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates