Summary: | app-crypt/mit-krb5 uninitialized pointer free, integer conversion, stack buffer overflow (CVE-2007-{2442|2443|2798}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Heath Caldwell (RETIRED) <hncaldwell> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | henson, kerberos |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.us-cert.gov/cas/techalerts/TA07-177A.html | ||
Whiteboard: | B0? [glsa] jaervosz | ||
Package list: | Runtime testing required: | --- |
Description
Heath Caldwell (RETIRED)
![]() Kerberos please provide the updated ebuild. mit-krb5-1.5.2-r3 and mit-krb5-1.5.3 both solve this bug. Please stable both, if possible. Sorry for calling arches SO late, I've been out of the loop for a few weeks. Arches please test and mark stable mit-krb5-1.5.2-r3 or mit-krb5-1.5.3. Target keywords are: "alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86" alpha/ia64/x86 stable amd64 stable ppc stable Both stable for HPPA. sparc stable. =app-crypt/mit-krb5-1.5.3 stable on ppc64 GLSA 200707-11, thanks to everybody ! |