Package "krb5-admin-server"
Name: |
krb5-admin-server
|
Description: |
MIT Kerberos master server (kadmind)
|
Latest version: |
1.17-6ubuntu4.11 |
Release: |
focal (20.04) |
Level: |
security |
Repository: |
universe |
Head package: |
krb5 |
Homepage: |
http://web.mit.edu/kerberos/ |
Links
Download "krb5-admin-server"
Other versions of "krb5-admin-server" in Focal
Changelog
krb5 (1.17-6ubuntu4.11) focal-security; urgency=medium
* SECURITY UPDATE: Use of weak cryptographic hash.
- debian/patches/CVE-2025-3576*.patch: Add allow_des3 and allow_rc4 options.
Disallow usage of des3 and rc4 unless allowed in the config. Replace
warn_des3 with warn_deprecated in ./src/lib/krb5/krb/get_in_tkt.c. Add
allow_des3 and allow_rc4 boolean in ./src/include/k5-int.h. Prevent usage
of deprecated enctypes in ./src/kdc/kdc_util.c.
- debian/patches/CVE-2025-3576-post1.patch: Add enctype comparison with
ENCTYPE_AES256_CTS_HMAC_SHA1_96 in ./src/kdc/kdc_util.c.
- debian/libk5crypto3.symbols: Add krb5int_c_deprecated_enctype symbol.
- CVE-2025-3576
-- Hlib Korzhynskyy <email address hidden> Thu, 15 May 2025 17:02:09 +0200
|
Source diff to previous version |
CVE-2025-3576 |
A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 che |
|
krb5 (1.17-6ubuntu4.9) focal-security; urgency=medium
* SECURITY UPDATE: denial of service via two memory leaks
- debian/patches/CVE-2024-26458.patch: fix two unlikely memory leaks in
src/lib/gssapi/krb5/k5sealv3.c, src/lib/rpc/pmap_rmt.c.
- CVE-2024-26458
- CVE-2024-26461
* SECURITY UPDATE: kadmind DoS via iprop log file
- debian/patches/CVE-2025-24528.patch: prevent overflow when
calculating ulog block size in src/lib/kdb/kdb_log.c.
- CVE-2025-24528
-- Marc Deslauriers <email address hidden> Tue, 25 Feb 2025 12:27:13 -0500
|
Source diff to previous version |
CVE-2024-26458 |
Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c. |
CVE-2024-26461 |
Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c. |
CVE-2025-24528 |
Prevent overflow when calculating ulog block size |
|
krb5 (1.17-6ubuntu4.8) focal-security; urgency=medium
* SECURITY UPDATE: Use of MD5-based message authentication over plaintext
communications could lead to forgery attacks.
- debian/patches/CVE-2024-3596.patch: Secure Response Authenticator
by adding support for the Message-Authenticator attribute in non-EAP
authentication methods.
- debian/patches/0018-Convert-OTP-and-kdcproxy-tests-to-python3.patch:
Convert tests/t_otp.py to python 3. Remove util/paste-kdcproxy.py and
refactor it into util/wsgiref-kdcproxy.py to avoid paste dependency.
- debian/patches/0019-More-python3-fixes-for-t_daemon.py: Replace a map
with a list comprehension and update calls to StringIO in
lib/krad/t_daemon.py.
- CVE-2024-3596
* Update libk5crypto3 symbols: add k5_hmac_md5 symbol.
-- Nicolas Campuzano Jimenez <email address hidden> Sat, 25 Jan 2025 17:18:49 -0500
|
Source diff to previous version |
CVE-2024-3596 |
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, |
|
krb5 (1.17-6ubuntu4.6) focal-security; urgency=medium
* SECURITY UPDATE: Invalid token requests
- debian/patches/CVE-2024-37370.patch: Fix vulnerabilities in GSS
message token handling
- CVE-2024-37370
- CVE-2024-37371
-- Bruce Cable <email address hidden> Mon, 15 Jul 2024 13:47:15 +1000
|
Source diff to previous version |
CVE-2024-37370 |
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the |
CVE-2024-37371 |
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens wi |
|
krb5 (1.17-6ubuntu4.4) focal-security; urgency=medium
* SECURITY UPDATE: freeing of uninitialized memory
- debian/patches/CVE-2023-36054.patch: ensure array count consistency in
kadm5 RPC.
- CVE-2023-36054
-- Camila Camargo de Matos <email address hidden> Tue, 24 Oct 2023 13:53:43 -0300
|
CVE-2023-36054 |
lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated u |
|
About
-
Send Feedback to @ubuntu_updates