UbuntuUpdates.org

Package "libk5crypto3"

Name: libk5crypto3

Description:

MIT Kerberos runtime libraries - Crypto Library

Latest version: 1.19.2-2ubuntu0.3
Release: jammy (22.04)
Level: updates
Repository: main
Head package: krb5
Homepage: http://web.mit.edu/kerberos/

Links


Download "libk5crypto3"


Other versions of "libk5crypto3" in Jammy

Repository Area Version
base main 1.19.2-2
security main 1.19.2-2ubuntu0.3

Changelog

Version: 1.19.2-2ubuntu0.3 2023-11-06 12:13:13 UTC

  krb5 (1.19.2-2ubuntu0.3) jammy-security; urgency=medium

  * SECURITY UPDATE: freeing of uninitialized memory
    - debian/patches/CVE-2023-36054.patch: ensure array count consistency in
      kadm5 RPC.
    - CVE-2023-36054

 -- Camila Camargo de Matos <email address hidden> Tue, 24 Oct 2023 13:59:06 -0300

Source diff to previous version
CVE-2023-36054 lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated u

Version: 1.19.2-2ubuntu0.2 2023-05-10 15:07:19 UTC

  krb5 (1.19.2-2ubuntu0.2) jammy; urgency=medium

  * d/kdc.conf: Do not specify master key type to avoid weak crypto for
    new realms. Existing realms will not be changed. (LP: #1981697)

 -- Andreas Hasenack <email address hidden> Thu, 06 Apr 2023 19:21:06 -0300

Source diff to previous version
1981697 KDC: weak crypto in default settings

Version: 1.19.2-2ubuntu0.1 2023-01-25 23:07:04 UTC

  krb5 (1.19.2-2ubuntu0.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Integer overflow
    - debian/patches/CVE-2022-42898.patch: add buffer length checks in
      krb5_pac_parse() in src/lib/krb5/krb/pac.c and a test case for
      invalid buffers in src/lib/krb5/krb/t_pac.c.
    - CVE-2022-42898

 -- Rodrigo Figueiredo Zaiden <email address hidden> Fri, 20 Jan 2023 08:34:37 -0300

CVE-2022-42898 PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC,



About   -   Send Feedback to @ubuntu_updates