Описание
ELSA-2011-0356: krb5 security update (IMPORTANT)
[1.8.2-3.6]
- add revised upstream patch to fix double-free in KDC while returning typed-data with errors (CVE-2011-0284, #681564)
[1.8.2-3.5]
- add upstream patches to fix double-free in KDC while returning typed-data with errors (CVE-2011-0284, #681564)
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
krb5-devel
1.8.2-3.el6_0.6
krb5-libs
1.8.2-3.el6_0.6
krb5-pkinit-openssl
1.8.2-3.el6_0.6
krb5-server
1.8.2-3.el6_0.6
krb5-server-ldap
1.8.2-3.el6_0.6
krb5-workstation
1.8.2-3.el6_0.6
Oracle Linux i686
krb5-devel
1.8.2-3.el6_0.6
krb5-libs
1.8.2-3.el6_0.6
krb5-pkinit-openssl
1.8.2-3.el6_0.6
krb5-server
1.8.2-3.el6_0.6
krb5-server-ldap
1.8.2-3.el6_0.6
krb5-workstation
1.8.2-3.el6_0.6
Связанные CVE
Связанные уязвимости
Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.
Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.
Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.
Double free vulnerability in the prepare_error_as function in do_as_re ...
Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.