Описание
ELSA-2008-0164: Critical: krb5 security and bugfix update (CRITICAL)
[1.6.1-17.el5_1.1]
- add preliminary patch to fix use of uninitialized pointer / double-free in KDC (CVE-2008-0062,CVE-2008-0063) (#432620, #432621)
- add backported patch to fix use-after-free in libgssapi_krb5 (CVE-2007-5901) (#415321)
- add backported patch to fix double-free in libgssapi_krb5 (CVE-2007-5971) (#415351)
- add preliminary patch to fix incorrect handling of high-numbered descriptors in the RPC library (CVE-2008-0947) (#433596)
- fix storage of delegated krb5 credentials when they've been wrapped up in spnego (#436460)
- return a delegated credential handle even if the application didn't pass a location to store the flags which would be used to indicate that credentials were delegated (#436465)
- add patch to fall back to TCP kpasswd servers for kdc-unreachable, can't-resolve-server, and response-too-big errors (#436467)
- use the right sequence numbers when generating password-set/change requests for kpasswd servers after the first one (#436468)
- backport from 1.6.3 to initialize a library-allocated get_init_creds_opt structure the same way we would one which was allocated by the calling application, to restore kinit's traditional behavior of doing a password change right when it detects an expired password (#436470)
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
krb5-devel
1.6.1-17.el5_1.1
krb5-libs
1.6.1-17.el5_1.1
krb5-server
1.6.1-17.el5_1.1
krb5-workstation
1.6.1-17.el5_1.1
Oracle Linux i386
krb5-devel
1.6.1-17.el5_1.1
krb5-libs
1.6.1-17.el5_1.1
krb5-server
1.6.1-17.el5_1.1
krb5-workstation
1.6.1-17.el5_1.1
Ссылки на источники
Связанные уязвимости
Use-after-free vulnerability in the gss_indicate_mechs function in lib/gssapi/mechglue/g_initialize.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors. NOTE: this might be the result of a typo in the source code.
Use-after-free vulnerability in the gss_indicate_mechs function in lib/gssapi/mechglue/g_initialize.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors. NOTE: this might be the result of a typo in the source code.
Use-after-free vulnerability in the gss_indicate_mechs function in lib/gssapi/mechglue/g_initialize.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors. NOTE: this might be the result of a typo in the source code.
Use-after-free vulnerability in the gss_indicate_mechs function in lib ...
Use-after-free vulnerability in the gss_indicate_mechs function in lib/gssapi/mechglue/g_initialize.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors. NOTE: this might be the result of a typo in the source code.