A flaw was found in krb5. With incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file. This issue can trigger a process crash and lead to a denial of service.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat rhel Els |
|
CPEs | cpe:/o:redhat:rhel_els:7 | |
Vendors & Products |
Redhat
Redhat rhel Els |
Thu, 13 Feb 2025 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in krb5. With incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file. This issue can trigger a process crash and lead to a denial of service. | |
Title | krb5: overflow when calculating ulog block size | |
Weaknesses | CWE-787 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

No data.

No data.

No data.
