Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to have unspecified impact via vectors involving automatic deletion of security contexts on error.
The product calls free() twice on the same memory address.
Link | Tags |
---|---|
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf | third party advisory patch |
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598 | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/ | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1488873 | issue tracking patch vdb entry third party advisory |