UbuntuUpdates.org

Package "krb5"

Name: krb5

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • MIT Kerberos master server (kadmind)
  • MIT Kerberos GSS Sample applications
  • TLS plugin for MIT Kerberos
  • MIT Kerberos key server (KDC)

Latest version: 1.19.2-2ubuntu0.4
Release: jammy (22.04)
Level: security
Repository: universe

Links



Other versions of "krb5" in Jammy

Repository Area Version
base main 1.19.2-2
base universe 1.19.2-2
security main 1.19.2-2ubuntu0.4
updates main 1.19.2-2ubuntu0.4
updates universe 1.19.2-2ubuntu0.4

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.19.2-2ubuntu0.4 2024-08-08 06:07:12 UTC

  krb5 (1.19.2-2ubuntu0.4) jammy-security; urgency=medium

  * SECURITY UPDATE: Invalid token requests
    - debian/patches/CVE-2024-37370.patch: Fix vulnerabilities in GSS
    message token handling
    - CVE-2024-37370
    - CVE-2024-37371

 -- Bruce Cable <email address hidden> Mon, 15 Jul 2024 13:46:10 +1000

Source diff to previous version
CVE-2024-37370 In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the
CVE-2024-37371 In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens wi

Version: 1.19.2-2ubuntu0.3 2023-11-06 11:13:41 UTC

  krb5 (1.19.2-2ubuntu0.3) jammy-security; urgency=medium

  * SECURITY UPDATE: freeing of uninitialized memory
    - debian/patches/CVE-2023-36054.patch: ensure array count consistency in
      kadm5 RPC.
    - CVE-2023-36054

 -- Camila Camargo de Matos <email address hidden> Tue, 24 Oct 2023 13:59:06 -0300

Source diff to previous version

Version: 1.19.2-2ubuntu0.1 2023-01-25 20:07:08 UTC

  krb5 (1.19.2-2ubuntu0.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Integer overflow
    - debian/patches/CVE-2022-42898.patch: add buffer length checks in
      krb5_pac_parse() in src/lib/krb5/krb/pac.c and a test case for
      invalid buffers in src/lib/krb5/krb/t_pac.c.
    - CVE-2022-42898

 -- Rodrigo Figueiredo Zaiden <email address hidden> Fri, 20 Jan 2023 08:34:37 -0300

CVE-2022-42898 PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC,



About   -   Send Feedback to @ubuntu_updates