UbuntuUpdates.org

Package "krb5-admin-server"

Name: krb5-admin-server

Description:

MIT Kerberos master server (kadmind)

Latest version: 1.17-6ubuntu4.9
Release: focal (20.04)
Level: updates
Repository: universe
Head package: krb5
Homepage: http://web.mit.edu/kerberos/

Links


Download "krb5-admin-server"


Other versions of "krb5-admin-server" in Focal

Repository Area Version
base universe 1.17-6ubuntu4
security universe 1.17-6ubuntu4.9

Changelog

Version: 1.17-6ubuntu4.9 2025-03-03 21:06:57 UTC

  krb5 (1.17-6ubuntu4.9) focal-security; urgency=medium

  * SECURITY UPDATE: denial of service via two memory leaks
    - debian/patches/CVE-2024-26458.patch: fix two unlikely memory leaks in
      src/lib/gssapi/krb5/k5sealv3.c, src/lib/rpc/pmap_rmt.c.
    - CVE-2024-26458
    - CVE-2024-26461
  * SECURITY UPDATE: kadmind DoS via iprop log file
    - debian/patches/CVE-2025-24528.patch: prevent overflow when
      calculating ulog block size in src/lib/kdb/kdb_log.c.
    - CVE-2025-24528

 -- Marc Deslauriers <email address hidden> Tue, 25 Feb 2025 12:27:13 -0500

Source diff to previous version
CVE-2024-26458 Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.
CVE-2024-26461 Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.
CVE-2025-24528 Prevent overflow when calculating ulog block size

Version: 1.17-6ubuntu4.8 2025-02-05 09:06:56 UTC

  krb5 (1.17-6ubuntu4.8) focal-security; urgency=medium

  * SECURITY UPDATE: Use of MD5-based message authentication over plaintext
    communications could lead to forgery attacks.
    - debian/patches/CVE-2024-3596.patch: Secure Response Authenticator
      by adding support for the Message-Authenticator attribute in non-EAP
      authentication methods.
    - debian/patches/0018-Convert-OTP-and-kdcproxy-tests-to-python3.patch:
      Convert tests/t_otp.py to python 3. Remove util/paste-kdcproxy.py and
      refactor it into util/wsgiref-kdcproxy.py to avoid paste dependency.
    - debian/patches/0019-More-python3-fixes-for-t_daemon.py: Replace a map
      with a list comprehension and update calls to StringIO in
      lib/krad/t_daemon.py.
    - CVE-2024-3596
  * Update libk5crypto3 symbols: add k5_hmac_md5 symbol.

 -- Nicolas Campuzano Jimenez <email address hidden> Sat, 25 Jan 2025 17:18:49 -0500

Source diff to previous version
CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject,

Version: 1.17-6ubuntu4.7 2024-08-22 21:07:10 UTC

  krb5 (1.17-6ubuntu4.7) focal; urgency=medium

  * Fix a memory leak in krb5_gss_inquire_cred (LP: #2060666)

 -- Ponnuvel Palaniyappan <email address hidden> Thu, 08 Aug 2024 11:06:56 +0100

Source diff to previous version
2060666 [SRU] Memory leak in krb5 version 1.17

Version: 1.17-6ubuntu4.6 2024-08-08 08:07:12 UTC

  krb5 (1.17-6ubuntu4.6) focal-security; urgency=medium

  * SECURITY UPDATE: Invalid token requests
    - debian/patches/CVE-2024-37370.patch: Fix vulnerabilities in GSS
    message token handling
    - CVE-2024-37370
    - CVE-2024-37371

 -- Bruce Cable <email address hidden> Mon, 15 Jul 2024 13:47:15 +1000

Source diff to previous version
CVE-2024-37370 In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the
CVE-2024-37371 In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens wi

Version: 1.17-6ubuntu4.4 2023-11-06 12:13:11 UTC

  krb5 (1.17-6ubuntu4.4) focal-security; urgency=medium

  * SECURITY UPDATE: freeing of uninitialized memory
    - debian/patches/CVE-2023-36054.patch: ensure array count consistency in
      kadm5 RPC.
    - CVE-2023-36054

 -- Camila Camargo de Matos <email address hidden> Tue, 24 Oct 2023 13:53:43 -0300

CVE-2023-36054 lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated u



About   -   Send Feedback to @ubuntu_updates