It was discovered that Kerberos incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause Kerberos to consume memory,leading to a denial of service. (CVE-2024-26458, CVE-2024-26461)
It was discovered that Kerberos incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause Kerberos to consume memory,leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26462)
It was discovered that the Kerberos kadmind daemon incorrectly handled log files when incremental propagation was enabled. An authenticated attacker could use this issue to cause kadmind to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-24528)
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "krb5-admin-server",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "krb5-gss-samples",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "krb5-k5tls",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "krb5-kdc",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "krb5-kdc-ldap",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "krb5-kpropd",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "krb5-locales",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "krb5-multidev",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "krb5-otp",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "krb5-pkinit",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "krb5-user",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "libgssapi-krb5-2",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "libgssrpc4",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "libk5crypto3",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "libkadm5clnt-mit11",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "libkadm5srv-mit11",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "libkdb5-9",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "libkrad-dev",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "libkrad0",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "libkrb5-3",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "libkrb5-dev",
"binary_version": "1.17-6ubuntu4.9"
},
{
"binary_name": "libkrb5support0",
"binary_version": "1.17-6ubuntu4.9"
}
]
}
{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "negligible",
"type": "Ubuntu"
}
],
"id": "CVE-2024-26458"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2024-26461"
},
{
"severity": [
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2025-24528"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "krb5-admin-server",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "krb5-gss-samples",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "krb5-k5tls",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "krb5-kdc",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "krb5-kdc-ldap",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "krb5-kpropd",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "krb5-locales",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "krb5-multidev",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "krb5-otp",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "krb5-pkinit",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "krb5-user",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "libgssapi-krb5-2",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "libgssrpc4",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "libk5crypto3",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "libkadm5clnt-mit12",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "libkadm5srv-mit12",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "libkdb5-10",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "libkrad-dev",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "libkrad0",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "libkrb5-3",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "libkrb5-dev",
"binary_version": "1.19.2-2ubuntu0.6"
},
{
"binary_name": "libkrb5support0",
"binary_version": "1.19.2-2ubuntu0.6"
}
]
}
{
"ecosystem": "Ubuntu:22.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "negligible",
"type": "Ubuntu"
}
],
"id": "CVE-2024-26458"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2024-26461"
},
{
"severity": [
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2025-24528"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "krb5-admin-server",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "krb5-gss-samples",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "krb5-k5tls",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "krb5-kdc",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "krb5-kdc-ldap",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "krb5-kpropd",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "krb5-locales",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "krb5-multidev",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "krb5-otp",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "krb5-pkinit",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "krb5-user",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "libgssapi-krb5-2",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "libgssrpc4t64",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "libk5crypto3",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "libkadm5clnt-mit12",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "libkadm5srv-mit12",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "libkdb5-10t64",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "libkrad-dev",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "libkrad0",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "libkrb5-3",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "libkrb5-dev",
"binary_version": "1.20.1-6ubuntu2.5"
},
{
"binary_name": "libkrb5support0",
"binary_version": "1.20.1-6ubuntu2.5"
}
]
}
{
"ecosystem": "Ubuntu:24.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "negligible",
"type": "Ubuntu"
}
],
"id": "CVE-2024-26458"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2024-26461"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2024-26462"
},
{
"severity": [
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2025-24528"
}
]
}