Summary: | <app-crypt/mit-krb5-{1.8.3-r4,1.9-r2}: KDC double-free when PKINIT enabled (CVE-2011-0284) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Eray Aslan <eras> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | kerberos |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Eray Aslan
![]() +*mit-krb5-1.9-r2 (16 Mar 2011) +*mit-krb5-1.8.3-r4 (16 Mar 2011) + + 16 Mar 2011; Eray Aslan <eras@gentoo.org> +mit-krb5-1.8.3-r4.ebuild, + +mit-krb5-1.9-r2.ebuild, +files/CVE-2011-0284.patch: + version bump - security bug #359129 + @security: =app-crypt/mit-krb5-1.8.3-r4 should be stabilized. Thanks. Arches, please test and mark stable: =app-crypt/mit-krb5-1.8.3-r4 Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86" amd64 ok ppc/ppc64 stable Stable for HPPA. x86 stable. alpha/arm/ia64/m68k/s390/sh/sparc stable amd64 done. Thanks Agostino Thanks, everyone. Added to existing GLSA request. This issue was resolved and addressed in GLSA 201201-13 at http://security.gentoo.org/glsa/glsa-201201-13.xml by GLSA coordinator Sean Amoss (ackle). |