Updated libgsasl packages fix security vulnerability
Discription
GNU SASL libgsasl server-side read-out-of-bounds with malicious authenticated GSS-API client. (CVE-2022-2469)Read More
References
https://bugs.mageia.org/show_bug.cgi?id=30670https://www.debian.org/security/2022/dsa-5189CVSS3
- Attack Vector
- Attack Complexity
- Privileges Required
- User Interaction
- Scope
- Confidentiality Impact
- Integrity Impact
- Availability Impact
- Network
- Low
- Low
- None
- Unchanged
- High
- None
- High
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Back to Main