{"id":"USN-7314-1","summary":"krb5 vulnerabilities","details":"It was discovered that Kerberos incorrectly handled certain memory\noperations. A remote attacker could possibly use this issue to cause\nKerberos to consume memory,leading to a denial of service. (CVE-2024-26458,\nCVE-2024-26461)\n\nIt was discovered that Kerberos incorrectly handled certain memory\noperations. A remote attacker could possibly use this issue to cause\nKerberos to consume memory,leading to a denial of service. This issue only\naffected Ubuntu 24.04 LTS. (CVE-2024-26462)\n\nIt was discovered that the Kerberos kadmind daemon incorrectly handled log\nfiles when incremental propagation was enabled. An authenticated attacker\ncould use this issue to cause kadmind to crash, resulting in a denial of\nservice, or possibly execute arbitrary code. (CVE-2025-24528)\n","modified":"2026-04-22T10:56:04.510559Z","published":"2025-03-03T12:40:28Z","related":["UBUNTU-CVE-2024-26458","UBUNTU-CVE-2024-26461","UBUNTU-CVE-2024-26462","UBUNTU-CVE-2025-24528"],"upstream":["CVE-2024-26458","CVE-2024-26461","CVE-2024-26462","CVE-2025-24528","UBUNTU-CVE-2024-26458","UBUNTU-CVE-2024-26461","UBUNTU-CVE-2024-26462","UBUNTU-CVE-2025-24528"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7314-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26458"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26461"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26462"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-24528"}],"affected":[{"package":{"name":"krb5","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/krb5@1.17-6ubuntu4.9?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.17-6ubuntu4.9"}]}],"versions":["1.17-6","1.17-6ubuntu3","1.17-6ubuntu4","1.17-6ubuntu4.1","1.17-6ubuntu4.2","1.17-6ubuntu4.3","1.17-6ubuntu4.4","1.17-6ubuntu4.6","1.17-6ubuntu4.7","1.17-6ubuntu4.8"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"krb5-admin-server","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"krb5-gss-samples","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"krb5-k5tls","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"krb5-kdc","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"krb5-kdc-ldap","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"krb5-kpropd","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"krb5-locales","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"krb5-multidev","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"krb5-otp","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"krb5-pkinit","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"krb5-user","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"libgssapi-krb5-2","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"libgssrpc4","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"libk5crypto3","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"libkadm5clnt-mit11","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"libkadm5srv-mit11","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"libkdb5-9","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"libkrad0","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"libkrb5-3","binary_version":"1.17-6ubuntu4.9"},{"binary_name":"libkrb5support0","binary_version":"1.17-6ubuntu4.9"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7314-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}],"id":"CVE-2024-26458"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2024-26461"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-24528"}]}}},{"package":{"name":"krb5","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/krb5@1.19.2-2ubuntu0.6?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.19.2-2ubuntu0.6"}]}],"versions":["1.18.3-6","1.18.3-7","1.19.2-0ubuntu1","1.19.2-1","1.19.2-2","1.19.2-2ubuntu0.1","1.19.2-2ubuntu0.2","1.19.2-2ubuntu0.3","1.19.2-2ubuntu0.4","1.19.2-2ubuntu0.5"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"krb5-admin-server","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"krb5-gss-samples","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"krb5-k5tls","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"krb5-kdc","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"krb5-kdc-ldap","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"krb5-kpropd","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"krb5-locales","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"krb5-multidev","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"krb5-otp","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"krb5-pkinit","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"krb5-user","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"libgssapi-krb5-2","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"libgssrpc4","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"libk5crypto3","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"libkadm5clnt-mit12","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"libkadm5srv-mit12","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"libkdb5-10","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"libkrad0","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"libkrb5-3","binary_version":"1.19.2-2ubuntu0.6"},{"binary_name":"libkrb5support0","binary_version":"1.19.2-2ubuntu0.6"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7314-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}],"id":"CVE-2024-26458"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2024-26461"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-24528"}]}}},{"package":{"name":"krb5","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/krb5@1.20.1-6ubuntu2.5?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.20.1-6ubuntu2.5"}]}],"versions":["1.20.1-3ubuntu1","1.20.1-5build1","1.20.1-6ubuntu1","1.20.1-6ubuntu2","1.20.1-6ubuntu2.1","1.20.1-6ubuntu2.2","1.20.1-6ubuntu2.3","1.20.1-6ubuntu2.4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"krb5-admin-server","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"krb5-gss-samples","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"krb5-k5tls","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"krb5-kdc","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"krb5-kdc-ldap","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"krb5-kpropd","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"krb5-locales","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"krb5-multidev","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"krb5-otp","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"krb5-pkinit","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"krb5-user","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"libgssapi-krb5-2","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"libgssrpc4t64","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"libk5crypto3","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"libkadm5clnt-mit12","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"libkadm5srv-mit12","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"libkdb5-10t64","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"libkrad0","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"libkrb5-3","binary_version":"1.20.1-6ubuntu2.5"},{"binary_name":"libkrb5support0","binary_version":"1.20.1-6ubuntu2.5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7314-1.json","cves_map":{"ecosystem":"Ubuntu:24.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}],"id":"CVE-2024-26458"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2024-26461"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-26462"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-24528"}]}}}],"schema_version":"1.7.5"}