Описание
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.21.3-3 |
| esm-infra-legacy/trusty | released | 1.12+dfsg-2ubuntu5.4+esm5 |
| esm-infra/bionic | released | 1.16-2ubuntu0.4+esm2 |
| esm-infra/focal | released | 1.17-6ubuntu4.6 |
| esm-infra/xenial | released | 1.13.2+dfsg-5ubuntu2.2+esm5 |
| focal | released | 1.17-6ubuntu4.6 |
| jammy | released | 1.19.2-2ubuntu0.4 |
| mantic | ignored | end of life, was needed |
| noble | released | 1.20.1-6ubuntu2.1 |
| oracular | not-affected | 1.21.3-3 |
Показывать по
9.1 Critical
CVSS3
Связанные уязвимости
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause inva ...
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
9.1 Critical
CVSS3