DSA-5286-1

Source
https://storage.googleapis.com/debian-osv/dsa-osv/DSA-5286-1.json
Aliases
Published
2022-11-19T00:00:00Z
Modified
2022-11-19T14:22:37.842885Z
Details

Greg Hudson discovered integer overflow flaws in the PAC parsing in krb5, the MIT implementation of Kerberos, which may result in remote code execution (in a KDC, kadmin, or GSS or Kerberos application server process), information exposure (to a cross-realm KDC acting maliciously), or denial of service (KDC or kadmind process crash).

For the stable distribution (bullseye), this problem has been fixed in version 1.18.3-6+deb11u3.

We recommend that you upgrade your krb5 packages.

For the detailed security status of krb5 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/krb5

References

Affected packages

Debian:11 / krb5

krb5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0
Fixed
1.18.3-6+deb11u3

Affected versions

1.*

1.18.3-6
1.18.3-6+deb11u1
1.18.3-6+deb11u2