ELSA-2011-1379

ELSA-2011-1379 - krb5 security update

Type:SECURITY
Severity:MODERATE
Release Date:2011-10-18

Description



[1.9-9.2]
- apply upstream patch to fix a null pointer derference with the LDAP kdb
backend (CVE-2011-1527), an assertion failure with multiple kdb backends
(CVE-2011-1528), and a null pointer dereference with multiple kdb backends
(CVE-2011-1529) (#740084)


Related CVEs


CVE-2011-1527
CVE-2011-1528
CVE-2011-1529

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) krb5-1.9-9.el6_1.2.src.rpmc69a7398f24266a91cac2510ffdce018ELSA-2016-0493
krb5-devel-1.9-9.el6_1.2.i686.rpm79c2fd2e9ca7fe0a595ba347bc54f139ELSA-2016-0493
krb5-libs-1.9-9.el6_1.2.i686.rpm3e1f67b1654b28ffc5a5b331a081f1f0ELSA-2016-0493
krb5-pkinit-openssl-1.9-9.el6_1.2.i686.rpm2b7ee1102e570b9921254b71eb6c034dELSA-2016-0493
krb5-server-1.9-9.el6_1.2.i686.rpm3ff4022d780456b5f0863674040c378dELSA-2016-0493
krb5-server-ldap-1.9-9.el6_1.2.i686.rpmf97cc59e9b7a7903274e5253736842abELSA-2016-0493
krb5-workstation-1.9-9.el6_1.2.i686.rpme4535a751b8385e135a7321ac0a24512ELSA-2016-0493
Oracle Linux 6 (x86_64) krb5-1.9-9.el6_1.2.src.rpmc69a7398f24266a91cac2510ffdce018ELSA-2016-0493
krb5-devel-1.9-9.el6_1.2.i686.rpm79c2fd2e9ca7fe0a595ba347bc54f139ELSA-2016-0493
krb5-devel-1.9-9.el6_1.2.x86_64.rpmb3cceb04e27b73c5997e6b4ce21e9addELSA-2016-0493
krb5-libs-1.9-9.el6_1.2.i686.rpm3e1f67b1654b28ffc5a5b331a081f1f0ELSA-2016-0493
krb5-libs-1.9-9.el6_1.2.x86_64.rpm50781d45f13647d34c2d8f199d7ba2aeELSA-2016-0493
krb5-pkinit-openssl-1.9-9.el6_1.2.x86_64.rpm7ca77046e442d2fb4276392d14470738ELSA-2016-0493
krb5-server-1.9-9.el6_1.2.x86_64.rpm64311bc2ac46149e9e441780a0338289ELSA-2016-0493
krb5-server-ldap-1.9-9.el6_1.2.i686.rpmf97cc59e9b7a7903274e5253736842abELSA-2016-0493
krb5-server-ldap-1.9-9.el6_1.2.x86_64.rpm1f1c65489e9bd8ae4844f9b355532077ELSA-2016-0493
krb5-workstation-1.9-9.el6_1.2.x86_64.rpm875d5849698983bbdb002a2e700b7cefELSA-2016-0493



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete