From: Ankur Tyagi <[email protected]> Details: https://nvd.nist.gov/vuln/detail/CVE-2025-3576
As mentioned[1], vulnerability is fixed since upstream 1.21 [1] https://security-tracker.debian.org/tracker/CVE-2025-3576 Signed-off-by: Ankur Tyagi <[email protected]> --- meta-oe/recipes-connectivity/krb5/krb5_1.21.3.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta-oe/recipes-connectivity/krb5/krb5_1.21.3.bb b/meta-oe/recipes-connectivity/krb5/krb5_1.21.3.bb index b38a0768e1..572c33a271 100644 --- a/meta-oe/recipes-connectivity/krb5/krb5_1.21.3.bb +++ b/meta-oe/recipes-connectivity/krb5/krb5_1.21.3.bb @@ -38,6 +38,8 @@ SRC_URI[sha256sum] = "b7a4cd5ead67fb08b980b21abd150ff7217e85ea320c9ed0c6dadd3048 CVE_PRODUCT = "kerberos" CVE_VERSION = "5-${PV}" +CVE_STATUS[CVE-2025-3576] = "fixed-version: The vulnerability has been fixed in the current version (1.21.3)" + S = "${WORKDIR}/${BP}/src" DEPENDS = "bison-native ncurses util-linux e2fsprogs e2fsprogs-native openssl"
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#123322): https://lists.openembedded.org/g/openembedded-devel/message/123322 Mute This Topic: https://lists.openembedded.org/mt/117189433/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
