CentOS 9 : krb5-1.21.1-10.el9

medium Nessus Plugin ID 312105

Synopsis

The remote CentOS host is missing one or more security updates for krb5-devel.

Description

The remote CentOS Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the krb5-1.21.1-10.el9 build changelog.

- In MIT Kerberos 5 (aka krb5) before 1.22.3, there is an integer underflow and resultant out-of-bounds read if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, possibly causing the process to terminate in parse_message. (CVE-2026-40356)

- In MIT Kerberos 5 (aka krb5) before 1.22.3, there is a NULL pointer dereference if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, causing the process to terminate in parse_nego_message.
(CVE-2026-40355)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the CentOS 9 Stream krb5-devel package.

See Also

https://kojihub.stream.centos.org/koji/buildinfo?buildID=108845

Plugin Details

Severity: Medium

ID: 312105

File Name: centos9_krb5-1_21_1-10_108845.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 5/4/2026

Updated: 5/4/2026

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2026-40356

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:krb5-devel, p-cpe:/a:centos:centos:krb5-tests, p-cpe:/a:centos:centos:krb5-pkinit, p-cpe:/a:centos:centos:krb5-server-ldap, p-cpe:/a:centos:centos:krb5-workstation, p-cpe:/a:centos:centos:krb5-libs, p-cpe:/a:centos:centos:krb5-xrealmauthz, p-cpe:/a:centos:centos:krb5-server, p-cpe:/a:centos:centos:libkadm5, cpe:/a:centos:centos:9

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 4/28/2026

Vulnerability Publication Date: 4/28/2026

Reference Information

CVE: CVE-2026-40355, CVE-2026-40356