"There will be an MIT krb5 security advisory on November 15, 2022, with corresponding patch releases 1.20.1 and 1.19.4. The KDC, kadmind, and GSS and Kerberos application servers are affected. The impact is significantly reduced on 64-bit platforms."
" An authenticated attacker may be able to cause a KDC or kadmind process to crash by reading beyond the bounds of allocated memory, creating a denial of service. A privileged attacker may similarly be able to cause a Kerberos or GSS application service to crash. On a 32-bit platform, an authenticated attacker may be able to cause heap corruption in a KDC or kadmind process, possibly leading to remote code execution. A privileged attacker may similarly be able to cause heap corruption in a Kerberos or GSS application service running on a 32-bit platform. An attacker with the privileges of a cross-realm KDC may be able to extract secrets from a KDC process's memory by having them copied into the PAC of a new ticket. ... * Upcoming releases in the krb5-1.19 and krb5-1.20 series will contain fixes for these vulnerabilities." I guess we're still waiting.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=71f7fd3da4b44921e34d9ab58d00a8ae9b925d4a commit 71f7fd3da4b44921e34d9ab58d00a8ae9b925d4a Author: Eray Aslan <eras@gentoo.org> AuthorDate: 2022-11-28 11:39:18 +0000 Commit: Eray Aslan <eras@gentoo.org> CommitDate: 2022-11-28 11:39:18 +0000 app-crypt/mit-krb5: drop 1.20 Bug: https://bugs.gentoo.org/879875 Signed-off-by: Eray Aslan <eras@gentoo.org> app-crypt/mit-krb5/Manifest | 1 - app-crypt/mit-krb5/mit-krb5-1.20.ebuild | 148 -------------------------------- 2 files changed, 149 deletions(-)