vulnerability
Red Hat: CVE-2024-37371: krb5: GSS message token handling (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:L/Au:N/C:C/I:N/A:C) | 06/28/2024 | 07/24/2024 | 03/17/2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:C)
Published
06/28/2024
Added
07/24/2024
Modified
03/17/2025
Description
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
Solution(s)
redhat-upgrade-krb5-debuginforedhat-upgrade-krb5-debugsourceredhat-upgrade-krb5-develredhat-upgrade-krb5-devel-debuginforedhat-upgrade-krb5-libsredhat-upgrade-krb5-libs-debuginforedhat-upgrade-krb5-pkinitredhat-upgrade-krb5-pkinit-debuginforedhat-upgrade-krb5-serverredhat-upgrade-krb5-server-debuginforedhat-upgrade-krb5-server-ldapredhat-upgrade-krb5-server-ldap-debuginforedhat-upgrade-krb5-workstationredhat-upgrade-krb5-workstation-debuginforedhat-upgrade-libkadm5redhat-upgrade-libkadm5-debuginforedhat-upgrade-mecabredhat-upgrade-mecab-debuginforedhat-upgrade-mecab-debugsourceredhat-upgrade-mecab-develredhat-upgrade-mecab-ipadicredhat-upgrade-mecab-ipadic-eucjpredhat-upgrade-mysqlredhat-upgrade-mysql-commonredhat-upgrade-mysql-debuginforedhat-upgrade-mysql-debugsourceredhat-upgrade-mysql-develredhat-upgrade-mysql-devel-debuginforedhat-upgrade-mysql-errmsgredhat-upgrade-mysql-libsredhat-upgrade-mysql-libs-debuginforedhat-upgrade-mysql-serverredhat-upgrade-mysql-server-debuginforedhat-upgrade-mysql-testredhat-upgrade-mysql-test-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.