Back to bug 674325

Who When What Removed Added
Jan Lieskovsky 2011-02-01 13:37:54 UTC CC dpal, jplans, nalin
Jan Lieskovsky 2011-02-01 13:39:00 UTC Priority medium high
Whiteboard public=20110208,reported=20110120,source=redhat,impact=important,cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C/,rhel-3/krb5=notaffected,rhel-4/krb5=notaffected,rhel-5/krb5=notaffected,rhel-6/krb5=affected/cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C fedora-all/krb5=affected/cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C public=20110208,reported=20110120,source=secalert,impact=important,cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C/,rhel-3/krb5=notaffected,rhel-4/krb5=notaffected,rhel-5/krb5=notaffected,rhel-6/krb5=affected/cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C fedora-all/krb5=affected/cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C
Severity medium high
Jan Lieskovsky 2011-02-02 09:35:05 UTC CC zmraz
Jan Lieskovsky 2011-02-03 07:45:52 UTC Whiteboard public=20110208,reported=20110120,source=secalert,impact=important,cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C/,rhel-3/krb5=notaffected,rhel-4/krb5=notaffected,rhel-5/krb5=notaffected,rhel-6/krb5=affected/cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C fedora-all/krb5=affected/cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C public=20110308,reported=20110120,source=secalert,impact=important,cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C/,rhel-3/krb5=notaffected,rhel-4/krb5=notaffected,rhel-5/krb5=notaffected,rhel-6/krb5=affected/cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C fedora-all/krb5=affected/cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C
Jan Lieskovsky 2011-02-04 11:01:27 UTC Summary EMBARGOED krb5 (krb5kdc): Double-free flaw by handling error messages upon receiving certain AS_REQ's EMBARGOED CVE-2011-0284 krb5 (krb5kdc): Double-free flaw by handling error messages upon receiving certain AS_REQ's (MITKRB5-SA-2011-003)
Alias CVE-2011-0284
Jan Lieskovsky 2011-02-04 14:55:53 UTC Flags needinfo?(nalin)
Nalin Dahyabhai 2011-02-04 15:06:46 UTC Flags needinfo?(nalin)
Vincent Danen 2011-02-11 17:29:02 UTC URL http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
CC vdanen
Vincent Danen 2011-02-11 18:37:48 UTC Whiteboard public=20110308,reported=20110120,source=secalert,impact=important,cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C/,rhel-3/krb5=notaffected,rhel-4/krb5=notaffected,rhel-5/krb5=notaffected,rhel-6/krb5=affected/cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C fedora-all/krb5=affected/cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C public=20110315,reported=20110120,source=secalert,impact=important,cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C/,rhel-3/krb5=notaffected,rhel-4/krb5=notaffected,rhel-5/krb5=notaffected,rhel-6/krb5=affected/cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C fedora-all/krb5=affected/cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C
Jan Lieskovsky 2011-03-02 15:34:28 UTC Depends On 681564
Jan Lieskovsky 2011-03-02 15:34:43 UTC Depends On 681565
Tomas Hoger 2011-03-15 19:25:01 UTC Group security, qe_staff
Summary EMBARGOED CVE-2011-0284 krb5 (krb5kdc): Double-free flaw by handling error messages upon receiving certain AS_REQ's (MITKRB5-SA-2011-003) CVE-2011-0284 krb5 (krb5kdc): Double-free flaw by handling error messages upon receiving certain AS_REQ's (MITKRB5-SA-2011-003)
Tomas Hoger 2011-03-15 19:25:22 UTC Attachment #476397 Attachment is private 1 0
Huzaifa S. Sidhpurwala 2011-03-16 10:17:03 UTC Depends On 688094
Tomas Hoger 2011-03-16 11:05:03 UTC Whiteboard public=20110315,reported=20110120,source=secalert,impact=important,cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C/,rhel-3/krb5=notaffected,rhel-4/krb5=notaffected,rhel-5/krb5=notaffected,rhel-6/krb5=affected/cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C fedora-all/krb5=affected/cvss2=7.9/AV:A/AC:M/Au:N/C:C/I:C/A:C public=20110315,reported=20110120,source=secalert,impact=important,cvss2=5/AV:N/AC:L/Au:N/C:N/I:N/A:P,rhel-3/krb5=notaffected,rhel-4/krb5=notaffected,rhel-5/krb5=notaffected,rhel-6/krb5=affected,fedora-all/krb5=affected
Simon Green 2013-07-03 13:20:09 UTC CC zmraz ebenes
Vincent Danen 2013-11-05 16:55:28 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2013-11-05 11:55:28 UTC
Martin Prpič 2015-07-31 12:34:44 UTC Whiteboard public=20110315,reported=20110120,source=secalert,impact=important,cvss2=5/AV:N/AC:L/Au:N/C:N/I:N/A:P,rhel-3/krb5=notaffected,rhel-4/krb5=notaffected,rhel-5/krb5=notaffected,rhel-6/krb5=affected,fedora-all/krb5=affected public=20110315,reported=20110120,source=upstream,impact=important,cvss2=5/AV:N/AC:L/Au:N/C:N/I:N/A:P,rhel-3/krb5=notaffected,rhel-4/krb5=notaffected,rhel-5/krb5=notaffected,rhel-6/krb5=affected,fedora-all/krb5=affected
Product Security DevOps Team 2019-09-29 12:42:02 UTC Whiteboard public=20110315,reported=20110120,source=upstream,impact=important,cvss2=5/AV:N/AC:L/Au:N/C:N/I:N/A:P,rhel-3/krb5=notaffected,rhel-4/krb5=notaffected,rhel-5/krb5=notaffected,rhel-6/krb5=affected,fedora-all/krb5=affected

Back to bug 674325