ELSA-2012-1131

ELSA-2012-1131 - krb5 security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2012-07-31

Description


[1.9-33.2]
- pull up the patch to correct a possible NULL pointer dereference in
kadmind (CVE-2012-1013, #827517)

[1.9-33.1]
- add candidate patch from upstream to fix freeing uninitialized pointer in
the KDC (MITKRB5-SA-2012-001, CVE-2012-1015, #839859)


Related CVEs


CVE-2012-1013
CVE-2012-1015

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) krb5-1.9-33.el6_3.2.src.rpmb95643a7e3324365b8b0118e21efd716ELSA-2016-0493
krb5-devel-1.9-33.el6_3.2.i686.rpm699f3aa7a4353cf0f89fe7d247b9f448ELSA-2016-0493
krb5-libs-1.9-33.el6_3.2.i686.rpm0060e638683fa02659e33850ed7a10faELSA-2016-0493
krb5-pkinit-openssl-1.9-33.el6_3.2.i686.rpm2609e63a48f2b9ba589802356512b789ELSA-2016-0493
krb5-server-1.9-33.el6_3.2.i686.rpmc2619c869fb42fee7a198b1fe8128eb6ELSA-2016-0493
krb5-server-ldap-1.9-33.el6_3.2.i686.rpm25bedf77ba78e4916990652dbc9dc705ELSA-2016-0493
krb5-workstation-1.9-33.el6_3.2.i686.rpm83d3b4c3713868da0dee7f896ddac8ebELSA-2016-0493
Oracle Linux 6 (x86_64) krb5-1.9-33.el6_3.2.src.rpmb95643a7e3324365b8b0118e21efd716ELSA-2016-0493
krb5-devel-1.9-33.el6_3.2.i686.rpm699f3aa7a4353cf0f89fe7d247b9f448ELSA-2016-0493
krb5-devel-1.9-33.el6_3.2.x86_64.rpm17f3a0d8cb7fd4e9ed5426a907860de8ELSA-2016-0493
krb5-libs-1.9-33.el6_3.2.i686.rpm0060e638683fa02659e33850ed7a10faELSA-2016-0493
krb5-libs-1.9-33.el6_3.2.x86_64.rpmd2955e33f7dd639ff9660349617b4ad6ELSA-2016-0493
krb5-pkinit-openssl-1.9-33.el6_3.2.x86_64.rpme5425711b64243e97809976e2d9be973ELSA-2016-0493
krb5-server-1.9-33.el6_3.2.x86_64.rpmb642a93b719013b11df11dba1b077e9eELSA-2016-0493
krb5-server-ldap-1.9-33.el6_3.2.i686.rpm25bedf77ba78e4916990652dbc9dc705ELSA-2016-0493
krb5-server-ldap-1.9-33.el6_3.2.x86_64.rpm94ed9658cffeaea63af6564b79e3bdeeELSA-2016-0493
krb5-workstation-1.9-33.el6_3.2.x86_64.rpm5b68c0a2083a78178596a22851cf8ed1ELSA-2016-0493



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete