Package: krb5
Version: 1.6.dfsg.1-7
Severity: grave
Tags: security

Hi,
a CVE was published for krb5.
CVE-2007-4743[0]:
The original patch for CVE-2007-3999 in svc_auth_gss.c in the
RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by
the Kerberos administration daemon (kadmind) and other applications that use
krb5, does not correctly check the buffer length in some environments and
architectures, which might allow remote attackers to conduct a buffer overflow
attack.

Please include the CVE id in your fix. I have an NMU package ready, if you
have no time or you are not fast enough I would also NMU the package :)

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4743

Kind regards
Nico
-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpggVvR68cw2.pgp
Description: PGP signature

Reply via email to