Package "libkrb5-dev"
Name: |
libkrb5-dev
|
Description: |
headers and development libraries for MIT Kerberos
|
Latest version: |
1.17-6ubuntu4.9 |
Release: |
focal (20.04) |
Level: |
security |
Repository: |
main |
Head package: |
krb5 |
Homepage: |
http://web.mit.edu/kerberos/ |
Links
Download "libkrb5-dev"
Other versions of "libkrb5-dev" in Focal
Changelog
krb5 (1.17-6ubuntu4.9) focal-security; urgency=medium
* SECURITY UPDATE: denial of service via two memory leaks
- debian/patches/CVE-2024-26458.patch: fix two unlikely memory leaks in
src/lib/gssapi/krb5/k5sealv3.c, src/lib/rpc/pmap_rmt.c.
- CVE-2024-26458
- CVE-2024-26461
* SECURITY UPDATE: kadmind DoS via iprop log file
- debian/patches/CVE-2025-24528.patch: prevent overflow when
calculating ulog block size in src/lib/kdb/kdb_log.c.
- CVE-2025-24528
-- Marc Deslauriers <email address hidden> Tue, 25 Feb 2025 12:27:13 -0500
|
Source diff to previous version |
CVE-2024-26458 |
Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c. |
CVE-2024-26461 |
Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c. |
CVE-2025-24528 |
Prevent overflow when calculating ulog block size |
|
krb5 (1.17-6ubuntu4.8) focal-security; urgency=medium
* SECURITY UPDATE: Use of MD5-based message authentication over plaintext
communications could lead to forgery attacks.
- debian/patches/CVE-2024-3596.patch: Secure Response Authenticator
by adding support for the Message-Authenticator attribute in non-EAP
authentication methods.
- debian/patches/0018-Convert-OTP-and-kdcproxy-tests-to-python3.patch:
Convert tests/t_otp.py to python 3. Remove util/paste-kdcproxy.py and
refactor it into util/wsgiref-kdcproxy.py to avoid paste dependency.
- debian/patches/0019-More-python3-fixes-for-t_daemon.py: Replace a map
with a list comprehension and update calls to StringIO in
lib/krad/t_daemon.py.
- CVE-2024-3596
* Update libk5crypto3 symbols: add k5_hmac_md5 symbol.
-- Nicolas Campuzano Jimenez <email address hidden> Sat, 25 Jan 2025 17:18:49 -0500
|
Source diff to previous version |
CVE-2024-3596 |
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, |
|
krb5 (1.17-6ubuntu4.6) focal-security; urgency=medium
* SECURITY UPDATE: Invalid token requests
- debian/patches/CVE-2024-37370.patch: Fix vulnerabilities in GSS
message token handling
- CVE-2024-37370
- CVE-2024-37371
-- Bruce Cable <email address hidden> Mon, 15 Jul 2024 13:47:15 +1000
|
Source diff to previous version |
CVE-2024-37370 |
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the |
CVE-2024-37371 |
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens wi |
|
krb5 (1.17-6ubuntu4.4) focal-security; urgency=medium
* SECURITY UPDATE: freeing of uninitialized memory
- debian/patches/CVE-2023-36054.patch: ensure array count consistency in
kadm5 RPC.
- CVE-2023-36054
-- Camila Camargo de Matos <email address hidden> Tue, 24 Oct 2023 13:53:43 -0300
|
Source diff to previous version |
CVE-2023-36054 |
lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated u |
|
krb5 (1.17-6ubuntu4.3) focal-security; urgency=medium
* SECURITY UPDATE: Null pointer dereference issue
- debian/patches/CVE-2021-36222.patch: Fix KDC null deref on bad
encrypted challenge
- debian/patches/CVE-2021-37750.patch: Fix KDC null deref on TGS inner
body null server
- CVE-2021-36222
- CVE-2021-37750
-- Nishit Majithia <email address hidden> Wed, 15 Mar 2023 19:47:40 +0530
|
CVE-2021-36222 |
ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows rem |
CVE-2021-37750 |
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_re |
|
About
-
Send Feedback to @ubuntu_updates