DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: Red Hat Product Security does not consider this as a security flaw. Password changes aren't expected to invalidate existing sessions. Though this is how Kerberos behaves: incrementing kvno will not invalidate any existing service tickets. This is not a concern because the lifetime on service tickets should be set appropriately (initially only a global, now also more finely configurable with the kdcpolicy plugin). This belief is reinforced by our use of mod_session: existing sessions there aren't terminated, but instead wait for expiration
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References

No reference.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: REJECTED

Assigner: redhat

Published:

Updated: 2020-06-03T13:50:09

Reserved: 2019-11-27T00:00:00

Link: CVE-2020-1703

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Rejected

Published: 2020-06-03T14:15:12.780

Modified: 2023-11-07T03:19:27.760

Link: CVE-2020-1703

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses

No weakness.