UbuntuUpdates.org

Package "libkadm5srv-mit12"

Name: libkadm5srv-mit12

Description:

MIT Kerberos runtime libraries - KDC and Admin Server

Latest version: 1.19.2-2ubuntu0.4
Release: jammy (22.04)
Level: updates
Repository: main
Head package: krb5
Homepage: http://web.mit.edu/kerberos/

Links


Download "libkadm5srv-mit12"


Other versions of "libkadm5srv-mit12" in Jammy

Repository Area Version
base main 1.19.2-2
security main 1.19.2-2ubuntu0.4

Changelog

Version: 1.19.2-2ubuntu0.4 2024-08-08 08:07:14 UTC

  krb5 (1.19.2-2ubuntu0.4) jammy-security; urgency=medium

  * SECURITY UPDATE: Invalid token requests
    - debian/patches/CVE-2024-37370.patch: Fix vulnerabilities in GSS
    message token handling
    - CVE-2024-37370
    - CVE-2024-37371

 -- Bruce Cable <email address hidden> Mon, 15 Jul 2024 13:46:10 +1000

Source diff to previous version
CVE-2024-37370 In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the
CVE-2024-37371 In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens wi

Version: 1.19.2-2ubuntu0.3 2023-11-06 12:13:13 UTC

  krb5 (1.19.2-2ubuntu0.3) jammy-security; urgency=medium

  * SECURITY UPDATE: freeing of uninitialized memory
    - debian/patches/CVE-2023-36054.patch: ensure array count consistency in
      kadm5 RPC.
    - CVE-2023-36054

 -- Camila Camargo de Matos <email address hidden> Tue, 24 Oct 2023 13:59:06 -0300

Source diff to previous version
CVE-2023-36054 lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated u

Version: 1.19.2-2ubuntu0.2 2023-05-10 15:07:19 UTC

  krb5 (1.19.2-2ubuntu0.2) jammy; urgency=medium

  * d/kdc.conf: Do not specify master key type to avoid weak crypto for
    new realms. Existing realms will not be changed. (LP: #1981697)

 -- Andreas Hasenack <email address hidden> Thu, 06 Apr 2023 19:21:06 -0300

Source diff to previous version
1981697 KDC: weak crypto in default settings

Version: 1.19.2-2ubuntu0.1 2023-01-25 23:07:04 UTC

  krb5 (1.19.2-2ubuntu0.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Integer overflow
    - debian/patches/CVE-2022-42898.patch: add buffer length checks in
      krb5_pac_parse() in src/lib/krb5/krb/pac.c and a test case for
      invalid buffers in src/lib/krb5/krb/t_pac.c.
    - CVE-2022-42898

 -- Rodrigo Figueiredo Zaiden <email address hidden> Fri, 20 Jan 2023 08:34:37 -0300

CVE-2022-42898 PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC,



About   -   Send Feedback to @ubuntu_updates