ELSA-2007-0858

ELSA-2007-0858 - Important: krb5 security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2007-09-04

Description


[1.5-28]
- add preliminary patch to fix buffer overflow in rpcsec_gss implementation
in libgssrpc (#250973, CVE-2007-3999) and write through uninitialized
pointer in kadmind (#250976, CVE-2007-4000)


Related CVEs


CVE-2007-4000
CVE-2007-3999

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) krb5-1.5-28.src.rpm5b3f80e98c4a9054febc13ff6b65a7394e0614ca12e80a89fbd6f976c6d09fa9ELSA-2014-1255el5_ga_i386_patch
krb5-devel-1.5-28.i386.rpm4c9809dd04ad124419f09c31a9633932bb09cfb8b19c06cb8d78415d1a8acc68ELSA-2014-1255el5_ga_i386_patch
krb5-libs-1.5-28.i386.rpm8a4a6687d072da45c55818c93f834e830ace226e2b9a7037a58910ba719abda8ELSA-2014-1255el5_ga_i386_patch
krb5-server-1.5-28.i386.rpm0e0977ef26cddae1de02e3777e4122142d7ff0b3687a6210192ba53f9cab2464ELSA-2014-1255el5_ga_i386_patch
krb5-workstation-1.5-28.i386.rpmaa40e6c5970201653d9044860e40ecb2f413645a0a717a6cb27fa834b0040bffELSA-2014-1255el5_ga_i386_patch
Oracle Linux 5 (x86_64) krb5-1.5-28.src.rpm5b3f80e98c4a9054febc13ff6b65a7394e0614ca12e80a89fbd6f976c6d09fa9ELSA-2014-1255el5_ga_x86_64_patch
krb5-devel-1.5-28.i386.rpm4c9809dd04ad124419f09c31a9633932bb09cfb8b19c06cb8d78415d1a8acc68ELSA-2014-1255el5_ga_x86_64_patch
krb5-devel-1.5-28.x86_64.rpm8d277dd8fde80fdc28f4c07ed8ff80123eba7bff5fad35fdef45195b3ff922a2ELSA-2014-1255el5_ga_x86_64_patch
krb5-libs-1.5-28.i386.rpm8a4a6687d072da45c55818c93f834e830ace226e2b9a7037a58910ba719abda8ELSA-2014-1255el5_ga_x86_64_patch
krb5-libs-1.5-28.x86_64.rpm322f3ffe3821b2579cf0359f94bb68746e35d3037a2aba3577acc8f7a2082700ELSA-2014-1255el5_ga_x86_64_patch
krb5-server-1.5-28.x86_64.rpm4ba0aac8cfb57561edd61c7fb96b0f774534261671377cdffed2a5f5adfe568cELSA-2014-1255el5_ga_x86_64_patch
krb5-workstation-1.5-28.x86_64.rpmf9ed1bbb21eafeaedc1b2ae2af883494eefd63cfd6d3df19ca7959b914250cb2ELSA-2014-1255el5_ga_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete