CVE-2025-24528

Publication date 31 January 2025

Last updated 21 January 2026


Ubuntu priority

Cvss 3 Severity Score

7.1 · High

Score breakdown

Description

In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.

Status

Package Ubuntu Release Status
krb5 25.10 questing
Fixed 1.21.3-4ubuntu2
25.04 plucky
Fixed 1.21.3-4ubuntu2
24.10 oracular
Fixed 1.21.3-3ubuntu0.2
24.04 LTS noble
Fixed 1.20.1-6ubuntu2.5
22.04 LTS jammy
Fixed 1.19.2-2ubuntu0.6
20.04 LTS focal
Fixed 1.17-6ubuntu4.9
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
14.04 LTS trusty
Needs evaluation

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
krb5

Severity score breakdown

Parameter Value
Base score 7.1 · High
Attack vector Network
Attack complexity High
Privileges required Low
User interaction None
Scope Changed
Confidentiality None
Integrity impact Low
Availability impact High
Vector CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-7314-1
    • Kerberos vulnerabilities
    • 3 March 2025

Other references