ELSA-2009-0408

ELSA-2009-0408 - krb5 security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2009-04-07

Description



[1.6.1-31.el5_3.3]
- update to revised patch for CVE-2009-0844/CVE-2009-0845

[1.6.1-31.el5_3.2]
- add fix for potential buffer read overrun in the SPNEGO GSSAPI mechanism
(#490635, CVE-2009-0844)
- add fix for NULL pointer dereference when handling certain error cases
in the SPNEGO GSSAPI mechanism (#490635, CVE-2009-0845)
- add fix for attempt to free uninitialized pointer in the ASN.1 decoder
(#490635, CVE-2009-0846)
- add fix for bug in length validation in the ASN.1 decoder (CVE-2009-0847)

[1.6.1-31.el5_3.1]
- add backport of svn patch to fix a bug in how the gssapi library
handles certain error cases in gss_accept_sec_context (CVE-2009-0845,


Related CVEs


CVE-2009-0844
CVE-2009-0845
CVE-2009-0846

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) krb5-1.6.1-31.el5_3.3.src.rpm9bb9aa1eff7523196d631da5249baeafELSA-2014-1255
krb5-devel-1.6.1-31.el5_3.3.i386.rpmaca4a1270b0ddebcb3b037d35ef0818dELSA-2014-1255
krb5-libs-1.6.1-31.el5_3.3.i386.rpm362f543320168a39fdd7fad70e64dfb6ELSA-2014-1255
krb5-server-1.6.1-31.el5_3.3.i386.rpm1f30173941be05baa67dec5ed392cb9fELSA-2014-1255
krb5-workstation-1.6.1-31.el5_3.3.i386.rpmacb6b1906a960da0c59084e309dc81ccELSA-2014-1255
Oracle Linux 5 (x86_64) krb5-1.6.1-31.el5_3.3.src.rpm9bb9aa1eff7523196d631da5249baeafELSA-2014-1255
krb5-devel-1.6.1-31.el5_3.3.i386.rpmaca4a1270b0ddebcb3b037d35ef0818dELSA-2014-1255
krb5-devel-1.6.1-31.el5_3.3.x86_64.rpm201ed15edf5961efd6d1de502ddfb103ELSA-2014-1255
krb5-libs-1.6.1-31.el5_3.3.i386.rpm362f543320168a39fdd7fad70e64dfb6ELSA-2014-1255
krb5-libs-1.6.1-31.el5_3.3.x86_64.rpm0907e148cb024515deea07b3e7aa9fb5ELSA-2014-1255
krb5-server-1.6.1-31.el5_3.3.x86_64.rpm489703a418b4158994e4dc11393646bcELSA-2014-1255
krb5-workstation-1.6.1-31.el5_3.3.x86_64.rpmc476cc4c6f8b4df02c25db669caf48bfELSA-2014-1255



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete