mit-krb5

Description:MIT Kerberos V
Homepage:https://web.mit.edu/kerberos/www/
Location:Portage
Legend:
  • + - stable
  • ~ - unstable
  • M - hardmask
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
1.21.2 diff ~ ~ ~ ~ ~ - ~ ~ ~ ~ - ~ ~
1.21.1 diff ~ ~ ~ ~ ~ - ~ ~ ~ ~ - ~ ~
1.20.2 diff ~ ~ ~ ~ ~ - ~ ~ ~ ~ - ~ ~
1.20.1 ~ + + + ~ - ~ ~ + ~ - + +

USE flags

  • abi_mips_n32 - 64-bit (32-bit pointer) libraries
  • abi_mips_n64 - 64-bit libraries
  • abi_mips_o32 - 32-bit libraries
  • abi_s390_32 - 32-bit (s390) libraries
  • abi_s390_64 - 64-bit (s390x) libraries
  • abi_x86_32 - 32-bit (x86) libraries
  • abi_x86_64 - 64-bit (amd64) libraries
  • abi_x86_x32 - x32 ABI libraries
  • cpu_flags_x86_aes - Enable support for Intel's AES instruction set (AES-NI)
  • doc - Creates and installs the API and implementation documentation. This is only useful if you want to develop software which depends on kerberos
  • keyutils - Enable for the keyring ccache using keyutils
  • lmdb - Add support for using dev-db/lmdb for lookup tables
  • nls - Add Native Language Support (using gettext - GNU locale utilities)
  • openldap - Enable support for ldap as a database backend
  • pkinit - Enable pkinit support for the initial ticket
  • selinux - !!internal use only!! Security Enhanced Linux support, this must be set by the selinux profile or breakage will occur
  • test - Enable dependencies and/or preparations necessary to run tests (usually controlled by FEATURES=test but can be toggled independently)
  • threads - Add threads support for various packages. Usually pthreads
  • xinetd - Add support for the xinetd super-server

Security Advisory

Date Severity Title
about 4 years low MIT Kerberos 5: Denial of service
about 8 years normal MIT Kerberos 5: Multiple vulnerabilities
almost 10 years normal MIT Kerberos 5: User-assisted execution of arbitrary code
almost 11 years normal MIT Kerberos 5: Multiple vulnerabilities
almost 13 years high MIT Kerberos 5: Multiple vulnerabilities
over 15 years high MIT Kerberos 5: Multiple vulnerabilities
over 16 years high MIT Kerberos 5: Multiple vulnerabilities
about 17 years high MIT Kerberos 5: Multiple vulnerabilities
over 17 years high MIT Kerberos 5: Arbitrary remote code execution
over 17 years high MIT Kerberos 5: Arbitrary remote code execution
almost 18 years high MIT Kerberos 5: Arbitrary Remote Code Execution
over 18 years high MIT Kerberos 5: Multiple local privilege escalation vulnerabilities
over 19 years high MIT Kerberos 5: Multiple vulnerabilities
over 19 years normal mit-krb5: Multiple buffer overflows in telnet client
almost 20 years high mit-krb5: Heap overflow in libkadm5srv
about 20 years normal MIT krb5: Insecure temporary file use in send-pr.sh
about 20 years high MIT krb5: Multiple vulnerabilities
over 20 years high mit-krb5: Multiple buffer overflows in krb5_aname_to_localname

Also available in: Atom

Thank you!