|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-1175: krb5 KDC heap corruption by random free (CAN-2005-1174, MITKRB5-SA-2005-002) | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Ludwig Nussel <lnussel> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | mc, patch-request, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | All | ||
| Whiteboard: | CVE-2005-1175: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: | krb5-1.4-VUL-0-krb5-overflow.dif | ||
|
Description
Ludwig Nussel
2005-04-27 07:06:57 UTC
Created attachment 35646 [details]
krb5-1.4-VUL-0-krb5-overflow.dif
changing summary to better distinct this bug and a new oneI'll enter in a few minutes. SM-Tracker-1455 Ok, I think you can start submitting the updated packages now. Coordinated release will be in ~2 weeks. Bug #86768 and bug# 91600 should be part of it. The author of pam_krb5 doesn't respond to my mail. The MIT folks (Tom Yu) don't care much about the NULL reference I think (low response). So, we should fix and release them all together to keep our work-load low. Well I think the pam_krb5 module on sourceforge is dead. I think we can simply release. Ok, I will submit packages for 9.3 today. Do we need new patchinfos with all the bugs inside? Yes we do.. I'll take care of it later. The package is submitted and you take care of the patchinfo. I reassign these Bugs to you now The date has passed but http://web.mit.edu/kerberos/advisories/ doesn't list the advisory so it looks like it's not public yet. public now, gentoo released an advisory updates released CVE-2005-1175: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) |