Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-24528

Опубликовано: 16 янв. 2026
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.1

Описание

In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.

РелизСтатусПримечание
devel

released

1.21.3-4ubuntu2
esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

needs-triage

esm-infra/focal

released

1.17-6ubuntu4.9
esm-infra/xenial

needs-triage

focal

released

1.17-6ubuntu4.9
jammy

released

1.19.2-2ubuntu0.6
noble

released

1.20.1-6ubuntu2.5
oracular

released

1.21.3-3ubuntu0.2
plucky

released

1.21.3-4ubuntu2

Показывать по

EPSS

Процентиль: 43%
0.00206
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
около 2 лет назад

In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.

CVSS3: 7.1
nvd
3 месяца назад

In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.

CVSS3: 7.1
msrc
3 месяца назад

In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.

CVSS3: 7.1
debian
3 месяца назад

In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation ...

suse-cvrf
около 1 года назад

Security update for crypto-policies, krb5

EPSS

Процентиль: 43%
0.00206
Низкий

7.1 High

CVSS3