#17313 closed enhancement (fixed)
krb5-1.20.1
Reported by: | Bruce Dubbs | Owned by: | Bruce Dubbs |
---|---|---|---|
Priority: | elevated | Milestone: | 11.3 |
Component: | BOOK | Version: | git |
Severity: | normal | Keywords: | |
Cc: |
Description ¶
New point version.
Change History (5)
comment:1 by , 2 years ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:2 by , 2 years ago
comment:3 by , 2 years ago
Resolution: | → fixed |
---|---|
Status: | assigned → closed |
Fixed at commits
de8ae35b4a Update to nghttp2-1.51.0. 11672910e0 Update to xfsprogs-6.0.0. 7756281c69 Update to sysstat-12.7.1. e0e8726f9b U:pdate to krb5-1.20.1.
comment:4 by , 2 years ago
Priority: | normal → elevated |
---|
Note:
See TracTickets
for help on using tickets.
Major changes in 1.20.1 (2022-11-15)
The CVE is where Kerberos libraries and AD DC failed to guard against integer overflows when parsing a PAC on a 32-bit system, which allowed an attacker with a forged PAC to corrupt the heap.
It does not seem to affect 64-bit systems.