CVE-2022-42898
Publication date 25 December 2022
Last updated 11 July 2025
Ubuntu priority
Cvss 3 Severity Score
Description
PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
Status
| Package | Ubuntu Release | Status | 
|---|---|---|
| heimdal | 25.10 questing | 
                                Vulnerable 
                                
                               | 
| 25.04 plucky | 
                                Vulnerable 
                                
                               | |
| 24.04 LTS noble | 
                                Vulnerable 
                                
                               | |
| 22.04 LTS jammy | 
                                Vulnerable 
                                
                               | |
| 20.04 LTS focal | 
                                Fixed 7.7.0+dfsg-1ubuntu1.3 
                                
                               | |
| 18.04 LTS bionic | 
                                Fixed 7.5.0+dfsg-1ubuntu0.3 
                                
                               | |
| 16.04 LTS xenial | 
                                Fixed 1.7~git20150920+dfsg-4ubuntu1.16.04.1+esm3 
                                
                                   | |
| 14.04 LTS trusty | 
                                Fixed 1.6~git20131207+dfsg-1ubuntu1.2+esm3 
                                
                                   | |
| samba | 25.10 questing | 
                                Not affected 
                                
                               | 
| 25.04 plucky | 
                                Not affected 
                                
                               | |
| 24.04 LTS noble | 
                                Not affected 
                                
                               | |
| 22.04 LTS jammy | 
                                Fixed 2:4.15.13+dfsg-0ubuntu1 
                                
                               | |
| 20.04 LTS focal | 
                                Fixed 2:4.15.13+dfsg-0ubuntu0.20.04.1 
                                
                               | |
| 18.04 LTS bionic | 
                                Fixed 2:4.7.6+dfsg~ubuntu-0ubuntu2.29+esm1 
                                
                                   | |
| 16.04 LTS xenial | 
                                Fixed 2:4.3.11+dfsg-0ubuntu0.16.04.34+esm2 
                                
                                   | |
| 14.04 LTS trusty | 
                                Fixed 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm13 
                                
                                   | |
| krb5 | 25.10 questing | 
                                Not affected 
                                
                               | 
| 25.04 plucky | 
                                Not affected 
                                
                               | |
| 24.04 LTS noble | 
                                Not affected 
                                
                               | |
| 22.04 LTS jammy | 
                                Fixed 1.19.2-2ubuntu0.1 
                                
                               | |
| 20.04 LTS focal | 
                                Fixed 1.17-6ubuntu4.2 
                                
                               | |
| 18.04 LTS bionic | 
                                Fixed 1.16-2ubuntu0.3 
                                
                               | |
| 16.04 LTS xenial | 
                                Fixed 1.13.2+dfsg-5ubuntu2.2+esm3 
                                
                                   | |
| 14.04 LTS trusty | 
                                Fixed 1.12+dfsg-2ubuntu5.4+esm3 
                                
                                   | 
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu Pro 30-day free trialNotes
mdeslaur
Per upstream Samba advisory, this is only an issue on 32-bit systems.
rodrigo-zaiden
a regression in heimdal was reported by samba and fixed in https://github.com/heimdal/heimdal/pull/1025
mdeslaur
See samba bug for samba regression fix not yet commited The focal samba update was temporarily reverted by USN 5822-2 because it introduced regressions. It was later updated again with USN 5936-1.
Patch details
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score |  | 
| Attack vector | Network | 
| Attack complexity | Low | 
| Privileges required | Low | 
| User interaction | None | 
| Scope | Unchanged | 
| Confidentiality | High | 
| Integrity impact | High | 
| Availability impact | High | 
| Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 
References
Related Ubuntu Security Notices (USN)
- USN-5800-1
- Heimdal vulnerabilities
- 12 January 2023
- USN-5822-1
- Samba vulnerabilities
- 24 January 2023
- USN-5828-1
- Kerberos vulnerabilities
- 25 January 2023
- USN-5936-1
- Samba vulnerabilities
- 8 March 2023
- USN-7582-1
- Samba vulnerabilities
- 19 June 2025