Summary: | <app-crypt/mit-krb5-1.15.2-r1: Remote Code Execution vulnerability | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | GLSAMaker/CVETool Bot <glsamaker> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | normal | CC: | kerberos |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B1 [noglsa cve] | ||
Package list: |
=app-crypt/mit-krb5-1.15.2-r1
|
Runtime testing required: | --- |
Description
GLSAMaker/CVETool Bot
![]() @Maintainers could you confirm if we are affected? Thank you app-crypt/mit-krb5-1.15.2 is vulnerable. Arches, please test and mark stable =app-crypt/mit-krb5-1.15.2-r1 Target Keywords = alpha amd64 arm ~arm64 hppa ia64 ~mips ppc ppc64 ~s390 ~sh sparc x86 amd64 stable x86 stable hppa stable ppc/ppc64 stable arm stable ia64 stable Stable on alpha. GLSA request filed. @maintainer(s), please clean the vulnerable version from the tree (note that sparc is now an exp profile and has a previous stable keyword). After further discussion with other team members, this vulnerability is not relevant to Gentoo. It only impacts Redhat's MIT KRB5 implementation due to additional code/changes. Upstream is not impacted and as such Gentoo is not. |