CVE-2007-5971
Published: 5 December 2007
Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/krb5/k5sealv3.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors.
Notes
Author | Note |
---|---|
kees | upstream did not publish a security update for this issue |
Priority
Status
Package | Release | Status |
---|---|---|
krb5 Launchpad, Ubuntu, Debian |
dapper |
Released
(1.4.3-5ubuntu0.11)
|
edgy |
Ignored
(end of life, was needed)
|
|
feisty |
Ignored
(end of life, was needed)
|
|
gutsy |
Ignored
(end of life, was needed)
|
|
hardy |
Released
(1.6.dfsg.3~beta1-2ubuntu1.4)
|
|
intrepid |
Not vulnerable
|
|
jaunty |
Released
(1.6.dfsg.4~beta1-5ubuntu2.3)
|
|
karmic |
Not vulnerable
|
|
lucid |
Not vulnerable
|
|
upstream |
Released
|
|
Patches: upstream: http://src.mit.edu/fisheye/browse/krb5/trunk/src/lib/gssapi/krb5/k5sealv3.c?r1=19672&r2=20180 |