diff options
author | Catalin Enache <catalin.enache@windriver.com> | 2017-09-15 12:45:45 +0300 |
---|---|---|
committer | Martin Jansa <Martin.Jansa@gmail.com> | 2017-09-18 10:18:12 +0200 |
commit | 532b5cbb40d58ef1d17a8555bf615c1304ef9dcc (patch) | |
tree | fb0dd352599c2cf7e3f991c2a29f89ac7992e188 /meta-oe/recipes-support/poco/poco_1.7.8.bb | |
parent | 532401f4d3f7411cbdd9ba9470c1ee4618a6d801 (diff) | |
download | meta-openembedded-532b5cbb40d58ef1d17a8555bf615c1304ef9dcc.tar.gz |
krb5: CVE-2017-11462
Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to
have unspecified impact via vectors involving automatic deletion of
security contexts on error.
Reference:
https://nvd.nist.gov/vuln/detail/CVE-2017-11462
Upstream patch:
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
Signed-off-by: Catalin Enache <catalin.enache@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Diffstat (limited to 'meta-oe/recipes-support/poco/poco_1.7.8.bb')
0 files changed, 0 insertions, 0 deletions