{"id":"DSA-757-1","summary":"krb5 - buffer overflow, double-free memory","modified":"2026-03-09T01:42:00.507801659Z","published":"2005-07-17T00:00:00Z","upstream":["CVE-2005-1174","CVE-2005-1175","CVE-2005-1689","DEBIAN-CVE-2005-1174","DEBIAN-CVE-2005-1175","DEBIAN-CVE-2005-1689"],"affected":[{"package":{"name":"krb5","ecosystem":"Debian:3.0","purl":"pkg:deb/debian/krb5?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.4-5woody10"}]}],"versions":["1.2.4-5woody6","1.2.4-5woody7","1.2.4-5woody8"],"database_specific":{"source":"https://storage.googleapis.com/debian-osv/dsa-osv/DSA-757-1.json"}},{"package":{"name":"krb5","ecosystem":"Debian:3.1","purl":"pkg:deb/debian/krb5?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.6-2sarge2"}]}],"versions":["1.3.6-2","1.3.6-2sarge1"],"database_specific":{"source":"https://storage.googleapis.com/debian-osv/dsa-osv/DSA-757-1.json"}}],"schema_version":"1.7.3"}