From: Ankur Tyagi <[email protected]>

Details: https://nvd.nist.gov/vuln/detail/CVE-2025-3576

As mentioned[1], vulnerability is fixed since upstream 1.21

[1] https://security-tracker.debian.org/tracker/CVE-2025-3576

Signed-off-by: Ankur Tyagi <[email protected]>
---
 meta-oe/recipes-connectivity/krb5/krb5_1.21.3.bb | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/meta-oe/recipes-connectivity/krb5/krb5_1.21.3.bb 
b/meta-oe/recipes-connectivity/krb5/krb5_1.21.3.bb
index b38a0768e1..572c33a271 100644
--- a/meta-oe/recipes-connectivity/krb5/krb5_1.21.3.bb
+++ b/meta-oe/recipes-connectivity/krb5/krb5_1.21.3.bb
@@ -38,6 +38,8 @@ SRC_URI[sha256sum] = 
"b7a4cd5ead67fb08b980b21abd150ff7217e85ea320c9ed0c6dadd3048
 CVE_PRODUCT = "kerberos"
 CVE_VERSION = "5-${PV}"
 
+CVE_STATUS[CVE-2025-3576] = "fixed-version: The vulnerability has been fixed 
in the current version (1.21.3)"
+
 S = "${WORKDIR}/${BP}/src"
 
 DEPENDS = "bison-native ncurses util-linux e2fsprogs e2fsprogs-native openssl"
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#123322): 
https://lists.openembedded.org/g/openembedded-devel/message/123322
Mute This Topic: https://lists.openembedded.org/mt/117189433/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to