UbuntuUpdates.org

Package "krb5-multidev"

Name: krb5-multidev

Description:

development files for MIT Kerberos without Heimdal conflict

Latest version: 1.19.2-2ubuntu0.4
Release: jammy (22.04)
Level: security
Repository: main
Head package: krb5
Homepage: http://web.mit.edu/kerberos/

Links


Download "krb5-multidev"


Other versions of "krb5-multidev" in Jammy

Repository Area Version
base main 1.19.2-2
updates main 1.19.2-2ubuntu0.4

Changelog

Version: 1.19.2-2ubuntu0.4 2024-08-08 06:07:11 UTC

  krb5 (1.19.2-2ubuntu0.4) jammy-security; urgency=medium

  * SECURITY UPDATE: Invalid token requests
    - debian/patches/CVE-2024-37370.patch: Fix vulnerabilities in GSS
    message token handling
    - CVE-2024-37370
    - CVE-2024-37371

 -- Bruce Cable <email address hidden> Mon, 15 Jul 2024 13:46:10 +1000

Source diff to previous version
CVE-2024-37370 In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the
CVE-2024-37371 In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens wi

Version: 1.19.2-2ubuntu0.3 2023-11-06 11:13:40 UTC

  krb5 (1.19.2-2ubuntu0.3) jammy-security; urgency=medium

  * SECURITY UPDATE: freeing of uninitialized memory
    - debian/patches/CVE-2023-36054.patch: ensure array count consistency in
      kadm5 RPC.
    - CVE-2023-36054

 -- Camila Camargo de Matos <email address hidden> Tue, 24 Oct 2023 13:59:06 -0300

Source diff to previous version

Version: 1.19.2-2ubuntu0.1 2023-01-25 20:07:06 UTC

  krb5 (1.19.2-2ubuntu0.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Integer overflow
    - debian/patches/CVE-2022-42898.patch: add buffer length checks in
      krb5_pac_parse() in src/lib/krb5/krb/pac.c and a test case for
      invalid buffers in src/lib/krb5/krb/t_pac.c.
    - CVE-2022-42898

 -- Rodrigo Figueiredo Zaiden <email address hidden> Fri, 20 Jan 2023 08:34:37 -0300

CVE-2022-42898 PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC,



About   -   Send Feedback to @ubuntu_updates