<<< Date Index >>>     <<< Thread Index >>>

[ MDKSA-2007:008 ] - Updated kerberos packages fix vulnerability



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:008
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : krb5
 Date    : January 10, 2007
 Affected: 2006.0, 2007.0, Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 A vulnerability in the RPC library in Kerberos 1.4.x and 1.5.x as used
 in the kadmind administration daemon calls an uninitialized function
 pointer in freed memory, which could allow a remote attacker to cause a
 Denial of Service and possibly execute arbitrary code via unspecified
 vectors.

 Updated packages are patched to address this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143
 http://www.cert.org/advisories/481564
 http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 a60e03243b204a7b0281d32aff6c7877  
2006.0/i586/ftp-client-krb5-1.4.2-1.2.20060mdk.i586.rpm
 98552d247f0bd6231310715dd1fbb4a4  
2006.0/i586/ftp-server-krb5-1.4.2-1.2.20060mdk.i586.rpm
 50eff45fd46afd3e04147cbd98fa99cd  
2006.0/i586/krb5-server-1.4.2-1.2.20060mdk.i586.rpm
 58b570956596827c6c83db43b3b6ec4d  
2006.0/i586/krb5-workstation-1.4.2-1.2.20060mdk.i586.rpm
 63f2980118e016c51bb8707d6f32eec5  
2006.0/i586/libkrb53-1.4.2-1.2.20060mdk.i586.rpm
 362a93222614d35ea479318701695b9a  
2006.0/i586/libkrb53-devel-1.4.2-1.2.20060mdk.i586.rpm
 19336d7d0cbc13f337b6d883e19c90c0  
2006.0/i586/telnet-client-krb5-1.4.2-1.2.20060mdk.i586.rpm
 474a525a042f18b8f20c1353d34f4d94  
2006.0/i586/telnet-server-krb5-1.4.2-1.2.20060mdk.i586.rpm 
 4e9722344646e273932c56b85edb747d  2006.0/SRPMS/krb5-1.4.2-1.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 f3c2542c797907b053505c229aabb7bc  
2006.0/x86_64/ftp-client-krb5-1.4.2-1.2.20060mdk.x86_64.rpm
 478f693737b4aeb347c143c768d311aa  
2006.0/x86_64/ftp-server-krb5-1.4.2-1.2.20060mdk.x86_64.rpm
 be81c7a72bf4c58888f87b8e1de6138e  
2006.0/x86_64/krb5-server-1.4.2-1.2.20060mdk.x86_64.rpm
 f257c6013dcc018fd888e99ebd1979e9  
2006.0/x86_64/krb5-workstation-1.4.2-1.2.20060mdk.x86_64.rpm
 2caec1d3046bc492c5fff8acea793d6b  
2006.0/x86_64/lib64krb53-1.4.2-1.2.20060mdk.x86_64.rpm
 e42da64bf42609db45cfcf870c86e38c  
2006.0/x86_64/lib64krb53-devel-1.4.2-1.2.20060mdk.x86_64.rpm
 119e125072bda0a478d0fc6f599c65d1  
2006.0/x86_64/telnet-client-krb5-1.4.2-1.2.20060mdk.x86_64.rpm
 8d14872dd37351092def43f732ad91d9  
2006.0/x86_64/telnet-server-krb5-1.4.2-1.2.20060mdk.x86_64.rpm 
 4e9722344646e273932c56b85edb747d  2006.0/SRPMS/krb5-1.4.2-1.2.20060mdk.src.rpm

 Mandriva Linux 2007.0:
 a4d1443d510f1fef80ae2716f4c669ac  
2007.0/i586/ftp-client-krb5-1.4.3-6.1mdv2007.0.i586.rpm
 6ad2482bea8be0953e8804e17b5f6be6  
2007.0/i586/ftp-server-krb5-1.4.3-6.1mdv2007.0.i586.rpm
 0bdec1016065a8bb04089edd69dcaf67  
2007.0/i586/krb5-server-1.4.3-6.1mdv2007.0.i586.rpm
 c51cb207bf1d7adcb7e73ca236247e60  
2007.0/i586/krb5-workstation-1.4.3-6.1mdv2007.0.i586.rpm
 f49d9636ec2ee3be4160f004c9987407  
2007.0/i586/libkrb53-1.4.3-6.1mdv2007.0.i586.rpm
 186959cc727e6542a413e18e6606fb0e  
2007.0/i586/libkrb53-devel-1.4.3-6.1mdv2007.0.i586.rpm
 327c7461f838c7a4ca9f23500d0581ff  
2007.0/i586/telnet-client-krb5-1.4.3-6.1mdv2007.0.i586.rpm
 36c8eae2a02a09d2b93aa00518e0b879  
2007.0/i586/telnet-server-krb5-1.4.3-6.1mdv2007.0.i586.rpm 
 8b18bbe4f22325dd4ee5a99eef7e32dd  2007.0/SRPMS/krb5-1.4.3-6.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 9e8a87605787eb574739756f86f00183  
2007.0/x86_64/ftp-client-krb5-1.4.3-6.1mdv2007.0.x86_64.rpm
 0ed4b823492d3d69947610f9b95cd44a  
2007.0/x86_64/ftp-server-krb5-1.4.3-6.1mdv2007.0.x86_64.rpm
 4cfa5d7da28f635c4ddb390f16f2dd32  
2007.0/x86_64/krb5-server-1.4.3-6.1mdv2007.0.x86_64.rpm
 1546df114a3c250d7c2cf01a10daa6fc  
2007.0/x86_64/krb5-workstation-1.4.3-6.1mdv2007.0.x86_64.rpm
 13b45d5e3efbc4d5ef0025ef3eb73cd3  
2007.0/x86_64/lib64krb53-1.4.3-6.1mdv2007.0.x86_64.rpm
 5b1a6627c0ce7cfa165f0a594b031a3b  
2007.0/x86_64/lib64krb53-devel-1.4.3-6.1mdv2007.0.x86_64.rpm
 18aedb28ddfc99096925047b21a7bd2c  
2007.0/x86_64/telnet-client-krb5-1.4.3-6.1mdv2007.0.x86_64.rpm
 cc35d21b8c920f9379b6e0868dec98fd  
2007.0/x86_64/telnet-server-krb5-1.4.3-6.1mdv2007.0.x86_64.rpm 
 8b18bbe4f22325dd4ee5a99eef7e32dd  2007.0/SRPMS/krb5-1.4.3-6.1mdv2007.0.src.rpm

 Corporate 4.0:
 ddc1741afd0fabd609587f8006f9a1ea  
corporate/4.0/i586/ftp-client-krb5-1.4.3-5.1.20060mlcs4.i586.rpm
 2a5b69d4febcc3c3431a812c04a882d7  
corporate/4.0/i586/ftp-server-krb5-1.4.3-5.1.20060mlcs4.i586.rpm
 6d1ed5b8ac4bb3ddc0855501eef24baf  
corporate/4.0/i586/krb5-server-1.4.3-5.1.20060mlcs4.i586.rpm
 c5d87ffc5d7c09acb2b9915447fa6f5b  
corporate/4.0/i586/krb5-workstation-1.4.3-5.1.20060mlcs4.i586.rpm
 139ba7efec113d4bf8cf052daee30694  
corporate/4.0/i586/libkrb53-1.4.3-5.1.20060mlcs4.i586.rpm
 202c1536fbec4a847cee0f84b037c882  
corporate/4.0/i586/libkrb53-devel-1.4.3-5.1.20060mlcs4.i586.rpm
 0066928b2dccd73cda873b156d787488  
corporate/4.0/i586/telnet-client-krb5-1.4.3-5.1.20060mlcs4.i586.rpm
 bc7d767c2521955910621311a52f8dc5  
corporate/4.0/i586/telnet-server-krb5-1.4.3-5.1.20060mlcs4.i586.rpm 
 079d5b68cd5c33a1d3dcd31c37be59b7  
corporate/4.0/SRPMS/krb5-1.4.3-5.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 c7b2c83ca051117c72daaa864930dc4f  
corporate/4.0/x86_64/ftp-client-krb5-1.4.3-5.1.20060mlcs4.x86_64.rpm
 76da52f8afb94def7cf7ce7aaed54737  
corporate/4.0/x86_64/ftp-server-krb5-1.4.3-5.1.20060mlcs4.x86_64.rpm
 b1728594817b87985cb5ceb8bbd2cc56  
corporate/4.0/x86_64/krb5-server-1.4.3-5.1.20060mlcs4.x86_64.rpm
 5bef7e859d36c1d9c84606ad988c30e5  
corporate/4.0/x86_64/krb5-workstation-1.4.3-5.1.20060mlcs4.x86_64.rpm
 6a535d673befe0bfb79889b772382f1f  
corporate/4.0/x86_64/lib64krb53-1.4.3-5.1.20060mlcs4.x86_64.rpm
 3da23da5792fba1bf65cbd56eb91dead  
corporate/4.0/x86_64/lib64krb53-devel-1.4.3-5.1.20060mlcs4.x86_64.rpm
 1eaf0cd620c4c5e3685f6dc2242c191f  
corporate/4.0/x86_64/telnet-client-krb5-1.4.3-5.1.20060mlcs4.x86_64.rpm
 a0676ac080ced1911ffed68055afac3e  
corporate/4.0/x86_64/telnet-server-krb5-1.4.3-5.1.20060mlcs4.x86_64.rpm 
 079d5b68cd5c33a1d3dcd31c37be59b7  
corporate/4.0/SRPMS/krb5-1.4.3-5.1.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFpYwMmqjQ0CJFipgRAnt1AKCpDRqKBrTK8N3GjUdTkr+Kkvze1wCeKy5d
GmWwPOZ59ZFvM/BsVBsEAvg=
=nQrK
-----END PGP SIGNATURE-----