CVE-2024-37370

Updated: 2024-10-11 17:30:05.326101

Description:

In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated
AlmaLinux 9.2 ESU krb5 1.20.1 7.5 HIGH Released CLSA-2024:1726769331 2024-09-19 14:24:54
CentOS 6 ELS krb5 1.10.3 7.5 HIGH Ignored 2024-10-11 17:30:05
CentOS 7 ELS krb5 1.15.1 7.5 HIGH Released CLSA-2024:1726840907 2024-10-01 17:32:21
CentOS 8.4 ELS krb5 1.18.2-8.3 7.5 HIGH Released CLSA-2024:1726769233 2024-09-19 14:24:53
CentOS 8.5 ELS krb5 1.18.2-14 7.5 HIGH Released CLSA-2024:1726769396 2024-09-19 14:24:52
CloudLinux 6 ELS krb5 1.10.3 7.5 HIGH Ignored 2024-10-11 17:30:06
CloudLinux 7 ELS krb5 1.15.1 7.5 HIGH Released CLSA-2024:1726841437 2024-10-01 17:32:21
Oracle Linux 6 ELS krb5 1.10.3 7.5 HIGH Ignored 2024-10-11 17:30:05
Ubuntu 16.04 ELS krb5 1.13.2 7.5 HIGH Released CLSA-2024:1727287657 2024-09-25 14:28:30
Ubuntu 18.04 ELS krb5 1.16-2 7.5 HIGH Released CLSA-2024:1727288271 2024-09-25 14:28:34

Statement

We have reasoned not to port the fix for this CVE since upstream changes are too intrusive. affecting pkinit, encryption/decryption and tag parsing functionality.