cvelist/2020/1xxx/CVE-2020-1703.json

18 lines
1.1 KiB
JSON
Raw Normal View History

2019-11-27 17:00:59 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-1703",
2020-06-03 14:01:28 +00:00
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
2019-11-27 17:00:59 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-06-03 14:01:28 +00:00
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: Red Hat Product Security does not consider this as a security flaw. Password changes aren't expected to invalidate existing sessions. Though this is how Kerberos behaves: incrementing kvno will not invalidate any existing service tickets. This is not a concern because the lifetime on service tickets should be set appropriately (initially only a global, now also more finely configurable with the kdcpolicy plugin). This belief is reinforced by our use of mod_session: existing sessions there aren't terminated, but instead wait for expiration."
2019-11-27 17:00:59 +00:00
}
]
}
2020-06-03 14:01:28 +00:00
}