ELSA-2008-0164

ELSA-2008-0164 - Critical: krb5 security and bugfix update

Type:SECURITY
Impact:CRITICAL
Release Date:2008-03-18

Description


[1.6.1-17.el5_1.1]
- add preliminary patch to fix use of uninitialized pointer / double-free in
KDC (CVE-2008-0062,CVE-2008-0063) (#432620, #432621)
- add backported patch to fix use-after-free in libgssapi_krb5
(CVE-2007-5901)
(#415321)
- add backported patch to fix double-free in libgssapi_krb5 (CVE-2007-5971)
(#415351)
- add preliminary patch to fix incorrect handling of high-numbered
descriptors
in the RPC library (CVE-2008-0947) (#433596)
- fix storage of delegated krb5 credentials when they've been wrapped up in
spnego (#436460)
- return a delegated credential handle even if the application didn't pass a
location to store the flags which would be used to indicate that
credentials
were delegated (#436465)
- add patch to fall back to TCP kpasswd servers for kdc-unreachable,
can't-resolve-server, and response-too-big errors (#436467)
- use the right sequence numbers when generating password-set/change
requests
for kpasswd servers after the first one (#436468)
- backport from 1.6.3 to initialize a library-allocated get_init_creds_opt
structure the same way we would one which was allocated by the calling
application, to restore kinit's traditional behavior of doing a password
change right when it detects an expired password (#436470)


Related CVEs


CVE-2007-5901
CVE-2007-5971
CVE-2008-0062
CVE-2008-0063
CVE-2008-0947

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) krb5-1.6.1-17.el5_1.1.src.rpma38dcf6bea07e04b9718b5c454d6c091edf1582252c0b4f7f91b7ac70d4343b8ELSA-2014-1255el5_u1_i386_patch
krb5-devel-1.6.1-17.el5_1.1.i386.rpmcf2ee4dc0eea6b617b61c2373cd0629c301952e1e4a10d6ee1cebf64961621d8ELSA-2014-1255el5_u1_i386_patch
krb5-libs-1.6.1-17.el5_1.1.i386.rpme427f18e032a0c39ca05092b6036e0547b91204d033c57bdf9a00539a5237851ELSA-2014-1255el5_u1_i386_patch
krb5-server-1.6.1-17.el5_1.1.i386.rpm5b2c485bfef281729f6c938429da60b0856923d399f4675ebe089126eb9a3b91ELSA-2014-1255el5_u1_i386_patch
krb5-workstation-1.6.1-17.el5_1.1.i386.rpm675a67eab93f760c19fe57410e54965719b3a9da369cdc7febe905d79da396edELSA-2014-1255el5_u1_i386_patch
Oracle Linux 5 (x86_64) krb5-1.6.1-17.el5_1.1.src.rpma38dcf6bea07e04b9718b5c454d6c091edf1582252c0b4f7f91b7ac70d4343b8ELSA-2014-1255el5_u1_x86_64_patch
krb5-devel-1.6.1-17.el5_1.1.i386.rpmcf2ee4dc0eea6b617b61c2373cd0629c301952e1e4a10d6ee1cebf64961621d8ELSA-2014-1255el5_u1_x86_64_patch
krb5-devel-1.6.1-17.el5_1.1.x86_64.rpm7a7519840e9208a75b8cc131f8486d9bd6e25af6c4d19bf5f8f413e2a01bbb42ELSA-2014-1255el5_u1_x86_64_patch
krb5-libs-1.6.1-17.el5_1.1.i386.rpme427f18e032a0c39ca05092b6036e0547b91204d033c57bdf9a00539a5237851ELSA-2014-1255el5_u1_x86_64_patch
krb5-libs-1.6.1-17.el5_1.1.x86_64.rpm8d4fd3a26766ffcaa9268740e1f7fb292ace3357e479ca6c1bb85c6ee11b0ea3ELSA-2014-1255el5_u1_x86_64_patch
krb5-server-1.6.1-17.el5_1.1.x86_64.rpm29f387cff3231ced6bd5331741a9a334bd53186b3702619df83e5fef508c8283ELSA-2014-1255el5_u1_x86_64_patch
krb5-workstation-1.6.1-17.el5_1.1.x86_64.rpm138a8a7b20018383dd8336b3d2a7b58a6ad2a275312dc7d81efb570486cbe6e3ELSA-2014-1255el5_u1_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete