Out-of-bounds Write Affecting libkadm5 package, versions <0:1.21.1-6.el9


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.21% (43rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Out-of-bounds Write vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL9-LIBKADM5-10119992
  • published13 May 2025
  • disclosed28 Jan 2024

Introduced: 28 Jan 2024

CVE-2025-24528  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

Upgrade RHEL:9 libkadm5 to version 0:1.21.1-6.el9 or higher.
This issue was patched in RHSA-2025:7067.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libkadm5 package and not the libkadm5 package as distributed by RHEL. See How to fix? for RHEL:9 relevant fixed versions and status.

In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.

CVSS Base Scores

version 3.1