UbuntuUpdates.org

Package "krb5"

Name: krb5

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • documentation for MIT Kerberos
  • internationalization support for MIT Kerberos
  • development files for MIT Kerberos without Heimdal conflict
  • MIT Kerberos runtime libraries - krb5 GSS-API Mechanism

Latest version: 1.20.1-6ubuntu2.5
Release: noble (24.04)
Level: updates
Repository: main

Links



Other versions of "krb5" in Noble

Repository Area Version
base universe 1.20.1-6ubuntu2
base main 1.20.1-6ubuntu2
security main 1.20.1-6ubuntu2.5
security universe 1.20.1-6ubuntu2.5
updates universe 1.20.1-6ubuntu2.5

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.20.1-6ubuntu2.5 2025-03-03 21:07:02 UTC

  krb5 (1.20.1-6ubuntu2.5) noble-security; urgency=medium

  * SECURITY UPDATE: denial of service via two memory leaks
    - debian/patches/CVE-2024-26458.patch: fix two unlikely memory leaks in
      src/lib/gssapi/krb5/k5sealv3.c, src/lib/rpc/pmap_rmt.c.
    - CVE-2024-26458
    - CVE-2024-26461
  * SECURITY UPDATE: denial of service via memory leak
    - debian/patches/CVE-2024-26462.patch: fix leak in KDC NDR encoding in
      src/kdc/ndr.c.
    - CVE-2024-26462
  * SECURITY UPDATE: kadmind DoS via iprop log file
    - debian/patches/CVE-2025-24528.patch: prevent overflow when
      calculating ulog block size in src/lib/kdb/kdb_log.c.
    - CVE-2025-24528

 -- Marc Deslauriers <email address hidden> Tue, 25 Feb 2025 10:30:21 -0500

Source diff to previous version
CVE-2024-26458 Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.
CVE-2024-26461 Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.
CVE-2024-26462 Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.
CVE-2025-24528 Prevent overflow when calculating ulog block size

Version: 1.20.1-6ubuntu2.4 2025-02-13 21:06:49 UTC

  krb5 (1.20.1-6ubuntu2.4) noble-security; urgency=medium

  * No-change rebuild to solve a build issue on armhf.

 -- Marc Deslauriers <email address hidden> Thu, 13 Feb 2025 07:23:16 -0500

Source diff to previous version

Version: 1.20.1-6ubuntu2.3 2025-02-05 09:07:00 UTC

  krb5 (1.20.1-6ubuntu2.3) noble-security; urgency=medium

  * SECURITY UPDATE: Use of MD5-based message authentication over plaintext
    communications could lead to forgery attacks.
    - debian/patches/CVE-2024-3596.patch: Secure Response Authenticator
      by adding support for the Message-Authenticator attribute in non-EAP
      authentication methods.
    - CVE-2024-3596
  * Update libk5crypto3 symbols: add k5_hmac_md5 symbol.

 -- Nicolas Campuzano Jimenez <email address hidden> Tue, 28 Jan 2025 00:57:01 -0500

Source diff to previous version
CVE-2024-3596 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject,

Version: 1.20.1-6ubuntu2.2 2024-11-14 23:07:01 UTC

  krb5 (1.20.1-6ubuntu2.2) noble; urgency=medium

  * SRU: LP: #2083480: No-change rebuild to disable frame pointers on
    ppc64el and s390x.

 -- Matthias Klose <email address hidden> Wed, 02 Oct 2024 14:40:50 +0200

Source diff to previous version

Version: 1.20.1-6ubuntu2.1 2024-08-08 08:07:16 UTC

  krb5 (1.20.1-6ubuntu2.1) noble-security; urgency=medium

  * SECURITY UPDATE: Invalid token requests
    - debian/patches/CVE-2024-37370.patch: Fix vulnerabilities in GSS
    message token handling
    - CVE-2024-37370
    - CVE-2024-37371

 -- Bruce Cable <email address hidden> Mon, 15 Jul 2024 13:27:45 +1000

CVE-2024-37370 In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the
CVE-2024-37371 In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens wi



About   -   Send Feedback to @ubuntu_updates