Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-7067

Опубликовано: 16 мая 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-7067: krb5 security update (MODERATE)

[1.21.1-6.0.1]

  • Fixed race condition in krb5_set_password() [Orabug: 33609767]

[1.21.1-6]

  • Prevent overflow when calculating ulog block size (CVE-2025-24528) Resolves: RHEL-76759

[1.21.1-5]

  • Support PKCS11 EC client certs in PKINIT Resolves: RHEL-74374
  • kdb5_util: fix DB entry flags on modification Resolves: RHEL-56059
  • Add ECDH support for PKINIT (RFC5349) Resolves: RHEL-4902

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

krb5-libs

1.21.1-6.0.1.el9

krb5-pkinit

1.21.1-6.0.1.el9

krb5-server

1.21.1-6.0.1.el9

krb5-server-ldap

1.21.1-6.0.1.el9

krb5-workstation

1.21.1-6.0.1.el9

libkadm5

1.21.1-6.0.1.el9

krb5-devel

1.21.1-6.0.1.el9

Oracle Linux x86_64

krb5-libs

1.21.1-6.0.1.el9

krb5-pkinit

1.21.1-6.0.1.el9

krb5-server

1.21.1-6.0.1.el9

krb5-server-ldap

1.21.1-6.0.1.el9

krb5-workstation

1.21.1-6.0.1.el9

krb5-devel

1.21.1-6.0.1.el9

libkadm5

1.21.1-6.0.1.el9

Связанные CVE

Связанные уязвимости

CVSS3: 7.1
ubuntu
3 месяца назад

In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.

CVSS3: 6.5
redhat
около 2 лет назад

In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.

CVSS3: 7.1
nvd
3 месяца назад

In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.

CVSS3: 7.1
msrc
3 месяца назад

In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.

CVSS3: 7.1
debian
3 месяца назад

In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation ...