CVE-2025-24528

EUVD-2026-2883
In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
mitreCNA
7.1 HIGH
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
mitkerberos_5
1.7 ≤
𝑥
< 1.22
CNA
Debian logo
Debian Releases
Debian Product
Codename
krb5
bookworm
1.20.1-2+deb12u4
fixed
bookworm (security)
vulnerable
bullseye
vulnerable
bullseye (security)
1.18.3-6+deb11u7
fixed
forky
1.22.1-2
fixed
sid
1.22.1-2
fixed
trixie
1.21.3-5
fixed