Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2007.0466 -- [RedHat] krb5 security update 27 June 2007 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kadmind Publisher: Red Hat Operating System: Red Hat Enterprise Linux Impact: Root Compromise Access: Remote/Unauthenticated CVE Names: CVE-2007-2798 CVE-2007-2443 CVE-2007-2442 Ref: AL-2007.0078 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2007-0384.html https://rhn.redhat.com/errata/RHSA-2007-0562.html Comment: This bulletin contains two Red Hat advisories describing vulnerabilities in MIT Kerberos. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Critical: krb5 security update Advisory ID: RHSA-2007:0384-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0384.html Issue date: 2007-06-26 Updated on: 2007-06-26 Product: Red Hat Enterprise Linux CVE Names: CVE-2007-2442 CVE-2007-2443 CVE-2007-2798 - - --------------------------------------------------------------------- 1. Summary: Updated krb5 packages that fix several security flaws are now available for Red Hat Enterprise Linux 2.1 and 3. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Problem description: Kerberos is a network authentication system which allows clients and servers to authenticate to each other through use of symmetric encryption and a trusted third party, the KDC. kadmind is the KADM5 administration server. David Coffey discovered an uninitialized pointer free flaw in the RPC library used by kadmind. A remote unauthenticated attacker who can access kadmind could trigger this flaw and cause kadmind to crash or potentially execute arbitrary code as root. (CVE-2007-2442) David Coffey also discovered an overflow flaw in the RPC library used by kadmind. On Red Hat Enterprise Linux, exploitation of this flaw is limited to a denial of service. A remote unauthenticated attacker who can access kadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-2443) A stack buffer overflow flaw was found in kadmind. An authenticated attacker who can access kadmind could trigger this flaw and potentially execute arbitrary code on the Kerberos server. (CVE-2007-2798) For Red Hat Enterprise Linux 2.1, several portability bugs which would lead to unexpected crashes on the ia64 platform have also been fixed. Users of krb5-server are advised to update to these erratum packages which contain backported fixes to correct these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bug IDs fixed (http://bugzilla.redhat.com/): 241590 - kadmin core dumps on ia64 245547 - CVE-2007-2442 krb5 RPC library unitialized pointer free 245548 - CVE-2007-2443 krb5 RPC library stack overflow 245549 - CVE-2007-2798 krb5 kadmind buffer overflow 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/krb5-1.2.2-47.src.rpm c0a472af62885afe44869b685187b346 krb5-1.2.2-47.src.rpm i386: 125ca9d18f3020e3f4f9fbb2f9f826bb krb5-devel-1.2.2-47.i386.rpm d579acc559fc428f2ae971acb848ef7d krb5-libs-1.2.2-47.i386.rpm 76d8f32be9bf0686034940f56c5be90d krb5-server-1.2.2-47.i386.rpm 44dbf354346c59c318097f867aea368a krb5-workstation-1.2.2-47.i386.rpm ia64: 2a4c48bdf2cb8dac81f671dfde23e755 krb5-devel-1.2.2-47.ia64.rpm 0ab61f4ec73d0d61b074a1d7cae707d5 krb5-libs-1.2.2-47.ia64.rpm 08c6d5c92fd584d3560b748254804eb5 krb5-server-1.2.2-47.ia64.rpm 3849e726f6124a0b7f80945456ddcca5 krb5-workstation-1.2.2-47.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/krb5-1.2.2-47.src.rpm c0a472af62885afe44869b685187b346 krb5-1.2.2-47.src.rpm ia64: 2a4c48bdf2cb8dac81f671dfde23e755 krb5-devel-1.2.2-47.ia64.rpm 0ab61f4ec73d0d61b074a1d7cae707d5 krb5-libs-1.2.2-47.ia64.rpm 08c6d5c92fd584d3560b748254804eb5 krb5-server-1.2.2-47.ia64.rpm 3849e726f6124a0b7f80945456ddcca5 krb5-workstation-1.2.2-47.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/krb5-1.2.2-47.src.rpm c0a472af62885afe44869b685187b346 krb5-1.2.2-47.src.rpm i386: 125ca9d18f3020e3f4f9fbb2f9f826bb krb5-devel-1.2.2-47.i386.rpm d579acc559fc428f2ae971acb848ef7d krb5-libs-1.2.2-47.i386.rpm 76d8f32be9bf0686034940f56c5be90d krb5-server-1.2.2-47.i386.rpm 44dbf354346c59c318097f867aea368a krb5-workstation-1.2.2-47.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/krb5-1.2.2-47.src.rpm c0a472af62885afe44869b685187b346 krb5-1.2.2-47.src.rpm i386: 125ca9d18f3020e3f4f9fbb2f9f826bb krb5-devel-1.2.2-47.i386.rpm d579acc559fc428f2ae971acb848ef7d krb5-libs-1.2.2-47.i386.rpm 76d8f32be9bf0686034940f56c5be90d krb5-server-1.2.2-47.i386.rpm 44dbf354346c59c318097f867aea368a krb5-workstation-1.2.2-47.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/krb5-1.2.7-66.src.rpm 3c8baf93bf7295fa4d54ddfe70a1d64c krb5-1.2.7-66.src.rpm i386: ac401d5a3e5a7d29e807c230f4c10c32 krb5-debuginfo-1.2.7-66.i386.rpm 4539662077e2665841719421577fabf0 krb5-devel-1.2.7-66.i386.rpm 254ab5c46c2ba7f24f43b34ed9e7d198 krb5-libs-1.2.7-66.i386.rpm 0e3c37a98128874c57ba3abbadc38b84 krb5-server-1.2.7-66.i386.rpm 4ebc7d0ce73b684e41e77faf24eaba01 krb5-workstation-1.2.7-66.i386.rpm ia64: ac401d5a3e5a7d29e807c230f4c10c32 krb5-debuginfo-1.2.7-66.i386.rpm b8cd4e290bf54897fb9c11deeaf1212c krb5-debuginfo-1.2.7-66.ia64.rpm 529e3dfe9091f87d2650a6344c53166b krb5-devel-1.2.7-66.ia64.rpm 254ab5c46c2ba7f24f43b34ed9e7d198 krb5-libs-1.2.7-66.i386.rpm b62a442ee20acbabaab8ead16fdedd3b krb5-libs-1.2.7-66.ia64.rpm 788c56657cb17d70ba6bc8234fc7fec9 krb5-server-1.2.7-66.ia64.rpm e19f3d0be15fc78f7bad73fff5d85bb6 krb5-workstation-1.2.7-66.ia64.rpm ppc: 05b40a6263d6749601e1e8f865b60b80 krb5-debuginfo-1.2.7-66.ppc.rpm 3fdb2910f4ac90a6e6092ff0c330d415 krb5-debuginfo-1.2.7-66.ppc64.rpm e2101aaee531d1172bbd8b711fa991f3 krb5-devel-1.2.7-66.ppc.rpm 5377f429ed05bffd2b33e7ad194d608b krb5-libs-1.2.7-66.ppc.rpm 36af2aba242b084e1e97c9d922fb07e8 krb5-libs-1.2.7-66.ppc64.rpm fdd47ad4d343841edc410ff09c956891 krb5-server-1.2.7-66.ppc.rpm 4ef7b91f106e902fcccf185a5ecb18f7 krb5-workstation-1.2.7-66.ppc.rpm s390: 30005e9116e97a5ce1f1bfbbdf52225c krb5-debuginfo-1.2.7-66.s390.rpm dbeb7841edded59a0585ae3caf807495 krb5-devel-1.2.7-66.s390.rpm 9a0bb39351602a096dffc95007de2359 krb5-libs-1.2.7-66.s390.rpm 7440dda54fa3a23702ae78725f864aa3 krb5-server-1.2.7-66.s390.rpm d1c7fd28d6bbb4dbbe259f0239997f46 krb5-workstation-1.2.7-66.s390.rpm s390x: 30005e9116e97a5ce1f1bfbbdf52225c krb5-debuginfo-1.2.7-66.s390.rpm b536151f4b3aff84e985008e8b6e84bf krb5-debuginfo-1.2.7-66.s390x.rpm a16888885ce6231b6e83e86e43882aa0 krb5-devel-1.2.7-66.s390x.rpm 9a0bb39351602a096dffc95007de2359 krb5-libs-1.2.7-66.s390.rpm 8cddf8d55a7475eb60e21d8966010ea4 krb5-libs-1.2.7-66.s390x.rpm 09ef57a4b90409b7f2930afed65a57d9 krb5-server-1.2.7-66.s390x.rpm 031df9b0b3514aaffeba15844098323e krb5-workstation-1.2.7-66.s390x.rpm x86_64: ac401d5a3e5a7d29e807c230f4c10c32 krb5-debuginfo-1.2.7-66.i386.rpm 02d01b6ca0f41bd5fed897c46d6510e3 krb5-debuginfo-1.2.7-66.x86_64.rpm 1c70754189ca4fbd1a37c60d6b8a5ac4 krb5-devel-1.2.7-66.x86_64.rpm 254ab5c46c2ba7f24f43b34ed9e7d198 krb5-libs-1.2.7-66.i386.rpm a9f69c0d1c72d7292d0aa99275120b65 krb5-libs-1.2.7-66.x86_64.rpm 3808cda78fdeae3cb6315dbdad962703 krb5-server-1.2.7-66.x86_64.rpm 0fc7048dbb02e0d49d8a3b46fcb7c9a6 krb5-workstation-1.2.7-66.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/krb5-1.2.7-66.src.rpm 3c8baf93bf7295fa4d54ddfe70a1d64c krb5-1.2.7-66.src.rpm i386: ac401d5a3e5a7d29e807c230f4c10c32 krb5-debuginfo-1.2.7-66.i386.rpm 4539662077e2665841719421577fabf0 krb5-devel-1.2.7-66.i386.rpm 254ab5c46c2ba7f24f43b34ed9e7d198 krb5-libs-1.2.7-66.i386.rpm 0e3c37a98128874c57ba3abbadc38b84 krb5-server-1.2.7-66.i386.rpm 4ebc7d0ce73b684e41e77faf24eaba01 krb5-workstation-1.2.7-66.i386.rpm x86_64: ac401d5a3e5a7d29e807c230f4c10c32 krb5-debuginfo-1.2.7-66.i386.rpm 02d01b6ca0f41bd5fed897c46d6510e3 krb5-debuginfo-1.2.7-66.x86_64.rpm 1c70754189ca4fbd1a37c60d6b8a5ac4 krb5-devel-1.2.7-66.x86_64.rpm 254ab5c46c2ba7f24f43b34ed9e7d198 krb5-libs-1.2.7-66.i386.rpm a9f69c0d1c72d7292d0aa99275120b65 krb5-libs-1.2.7-66.x86_64.rpm 3808cda78fdeae3cb6315dbdad962703 krb5-server-1.2.7-66.x86_64.rpm 0fc7048dbb02e0d49d8a3b46fcb7c9a6 krb5-workstation-1.2.7-66.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/krb5-1.2.7-66.src.rpm 3c8baf93bf7295fa4d54ddfe70a1d64c krb5-1.2.7-66.src.rpm i386: ac401d5a3e5a7d29e807c230f4c10c32 krb5-debuginfo-1.2.7-66.i386.rpm 4539662077e2665841719421577fabf0 krb5-devel-1.2.7-66.i386.rpm 254ab5c46c2ba7f24f43b34ed9e7d198 krb5-libs-1.2.7-66.i386.rpm 0e3c37a98128874c57ba3abbadc38b84 krb5-server-1.2.7-66.i386.rpm 4ebc7d0ce73b684e41e77faf24eaba01 krb5-workstation-1.2.7-66.i386.rpm ia64: ac401d5a3e5a7d29e807c230f4c10c32 krb5-debuginfo-1.2.7-66.i386.rpm b8cd4e290bf54897fb9c11deeaf1212c krb5-debuginfo-1.2.7-66.ia64.rpm 529e3dfe9091f87d2650a6344c53166b krb5-devel-1.2.7-66.ia64.rpm 254ab5c46c2ba7f24f43b34ed9e7d198 krb5-libs-1.2.7-66.i386.rpm b62a442ee20acbabaab8ead16fdedd3b krb5-libs-1.2.7-66.ia64.rpm 788c56657cb17d70ba6bc8234fc7fec9 krb5-server-1.2.7-66.ia64.rpm e19f3d0be15fc78f7bad73fff5d85bb6 krb5-workstation-1.2.7-66.ia64.rpm x86_64: ac401d5a3e5a7d29e807c230f4c10c32 krb5-debuginfo-1.2.7-66.i386.rpm 02d01b6ca0f41bd5fed897c46d6510e3 krb5-debuginfo-1.2.7-66.x86_64.rpm 1c70754189ca4fbd1a37c60d6b8a5ac4 krb5-devel-1.2.7-66.x86_64.rpm 254ab5c46c2ba7f24f43b34ed9e7d198 krb5-libs-1.2.7-66.i386.rpm a9f69c0d1c72d7292d0aa99275120b65 krb5-libs-1.2.7-66.x86_64.rpm 3808cda78fdeae3cb6315dbdad962703 krb5-server-1.2.7-66.x86_64.rpm 0fc7048dbb02e0d49d8a3b46fcb7c9a6 krb5-workstation-1.2.7-66.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/krb5-1.2.7-66.src.rpm 3c8baf93bf7295fa4d54ddfe70a1d64c krb5-1.2.7-66.src.rpm i386: ac401d5a3e5a7d29e807c230f4c10c32 krb5-debuginfo-1.2.7-66.i386.rpm 4539662077e2665841719421577fabf0 krb5-devel-1.2.7-66.i386.rpm 254ab5c46c2ba7f24f43b34ed9e7d198 krb5-libs-1.2.7-66.i386.rpm 0e3c37a98128874c57ba3abbadc38b84 krb5-server-1.2.7-66.i386.rpm 4ebc7d0ce73b684e41e77faf24eaba01 krb5-workstation-1.2.7-66.i386.rpm ia64: ac401d5a3e5a7d29e807c230f4c10c32 krb5-debuginfo-1.2.7-66.i386.rpm b8cd4e290bf54897fb9c11deeaf1212c krb5-debuginfo-1.2.7-66.ia64.rpm 529e3dfe9091f87d2650a6344c53166b krb5-devel-1.2.7-66.ia64.rpm 254ab5c46c2ba7f24f43b34ed9e7d198 krb5-libs-1.2.7-66.i386.rpm b62a442ee20acbabaab8ead16fdedd3b krb5-libs-1.2.7-66.ia64.rpm 788c56657cb17d70ba6bc8234fc7fec9 krb5-server-1.2.7-66.ia64.rpm e19f3d0be15fc78f7bad73fff5d85bb6 krb5-workstation-1.2.7-66.ia64.rpm x86_64: ac401d5a3e5a7d29e807c230f4c10c32 krb5-debuginfo-1.2.7-66.i386.rpm 02d01b6ca0f41bd5fed897c46d6510e3 krb5-debuginfo-1.2.7-66.x86_64.rpm 1c70754189ca4fbd1a37c60d6b8a5ac4 krb5-devel-1.2.7-66.x86_64.rpm 254ab5c46c2ba7f24f43b34ed9e7d198 krb5-libs-1.2.7-66.i386.rpm a9f69c0d1c72d7292d0aa99275120b65 krb5-libs-1.2.7-66.x86_64.rpm 3808cda78fdeae3cb6315dbdad962703 krb5-server-1.2.7-66.x86_64.rpm 0fc7048dbb02e0d49d8a3b46fcb7c9a6 krb5-workstation-1.2.7-66.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2007 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFGgWEYXlSAg2UNWIIRAnycAJ9cglm0MSwvcqd1LgjpEPmrIbfWCwCgoeC1 mZu/YPgNLm3RIgEJj1kcG1E= =E+6R - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Important: krb5 security update Advisory ID: RHSA-2007:0562-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0562.html Issue date: 2007-06-26 Updated on: 2007-06-26 Product: Red Hat Enterprise Linux CVE Names: CVE-2007-2442 CVE-2007-2443 CVE-2007-2798 - - --------------------------------------------------------------------- 1. Summary: Updated krb5 packages that fix several security flaws are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Problem description: Kerberos is a network authentication system which allows clients and servers to authenticate to each other through use of symmetric encryption and a trusted third party, the KDC. kadmind is the KADM5 administration server. David Coffey discovered an uninitialized pointer free flaw in the RPC library used by kadmind. On Red Hat Enterprise Linux 4 and 5, glibc detects attempts to free invalid pointers. A remote unauthenticated attacker who can access kadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-2442) David Coffey also discovered an overflow flaw in the RPC library used by kadmind. On Red Hat Enterprise Linux, exploitation of this flaw is limited to a denial of service. A remote unauthenticated attacker who can access kadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-2443) A stack buffer overflow flaw was found in kadmind. An authenticated attacker who can access kadmind could trigger this flaw and potentially execute arbitrary code on the Kerberos server. (CVE-2007-2798) Users of krb5-server are advised to update to these erratum packages which contain backported fixes to correct these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bug IDs fixed (http://bugzilla.redhat.com/): 245547 - CVE-2007-2442 krb5 RPC library unitialized pointer free 245548 - CVE-2007-2443 krb5 RPC library stack overflow 245549 - CVE-2007-2798 krb5 kadmind buffer overflow 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/krb5-1.3.4-49.src.rpm 31d66f8b81a412d2b527a1d2e34a6e29 krb5-1.3.4-49.src.rpm i386: 9e3db992036d070d8932180873098150 krb5-debuginfo-1.3.4-49.i386.rpm cb0671a2c26fea448cc88e973513de5e krb5-devel-1.3.4-49.i386.rpm a98a07dbc3bb70a29be7abf1f9413514 krb5-libs-1.3.4-49.i386.rpm 4ae9d98926bb5b88562d2a9df1d5b019 krb5-server-1.3.4-49.i386.rpm 292e2aba8e5f54b252d8c2dcae346c2c krb5-workstation-1.3.4-49.i386.rpm ia64: 9e3db992036d070d8932180873098150 krb5-debuginfo-1.3.4-49.i386.rpm 9b548a0ef35ea35fd9679ccf42703ec6 krb5-debuginfo-1.3.4-49.ia64.rpm 14661d7ee6d5005c074bbed129cfac43 krb5-devel-1.3.4-49.ia64.rpm a98a07dbc3bb70a29be7abf1f9413514 krb5-libs-1.3.4-49.i386.rpm 09a2550dc627f1eeda901a1884a04a2f krb5-libs-1.3.4-49.ia64.rpm 03c9f1f5d4bcc5921574167506a67fcd krb5-server-1.3.4-49.ia64.rpm 5292efc768b6d6f2ee260a906fc3e46e krb5-workstation-1.3.4-49.ia64.rpm ppc: cb1bea183c6b23d42f5b4b1628327dee krb5-debuginfo-1.3.4-49.ppc.rpm 814e5b231faabb8ef6431329883113ef krb5-debuginfo-1.3.4-49.ppc64.rpm 1b94755c3809a53ee8a65a5579019a3e krb5-devel-1.3.4-49.ppc.rpm 3eb28a977ad52918f2d5df8bc3a24a3b krb5-libs-1.3.4-49.ppc.rpm 79782bc2122f93deaba0de971bfa1eb6 krb5-libs-1.3.4-49.ppc64.rpm 1ae8f9b1d1f8e27280888b75af8138a7 krb5-server-1.3.4-49.ppc.rpm e490dc881325c56e368f70d34c0b7b67 krb5-workstation-1.3.4-49.ppc.rpm s390: f7aa904838a1309887da54444097bcd8 krb5-debuginfo-1.3.4-49.s390.rpm 4949a26a347fbc4604c86dae30d5d187 krb5-devel-1.3.4-49.s390.rpm 87af5e561f5f50397b0523ebed0bc4d0 krb5-libs-1.3.4-49.s390.rpm 05f6afee497706fd56f8a29260b46a82 krb5-server-1.3.4-49.s390.rpm f08171179038a61920c2ca261d91bb67 krb5-workstation-1.3.4-49.s390.rpm s390x: f7aa904838a1309887da54444097bcd8 krb5-debuginfo-1.3.4-49.s390.rpm 5d4ce43cf23e05dcecf3925206b45f73 krb5-debuginfo-1.3.4-49.s390x.rpm 960e8a982fceea58ea7b617c00445dd0 krb5-devel-1.3.4-49.s390x.rpm 87af5e561f5f50397b0523ebed0bc4d0 krb5-libs-1.3.4-49.s390.rpm 24c67d15da32251725ec76b4aeaec7ad krb5-libs-1.3.4-49.s390x.rpm 19c506e2e0c8c6592e799cd7e95bc1d4 krb5-server-1.3.4-49.s390x.rpm 17d13fc645f2c8c9c2ee6adc31e16a26 krb5-workstation-1.3.4-49.s390x.rpm x86_64: 9e3db992036d070d8932180873098150 krb5-debuginfo-1.3.4-49.i386.rpm 5418edb6f780481f4fc581ea931c0249 krb5-debuginfo-1.3.4-49.x86_64.rpm 203b9502c0d5603f21da65eff1aac97e krb5-devel-1.3.4-49.x86_64.rpm a98a07dbc3bb70a29be7abf1f9413514 krb5-libs-1.3.4-49.i386.rpm 5a52bd88b120e3fbc675b6f83e001679 krb5-libs-1.3.4-49.x86_64.rpm 90e96766548f63e93928bb5d6a1b6c2a krb5-server-1.3.4-49.x86_64.rpm eb922c5ad814e73069f201ac703b3c40 krb5-workstation-1.3.4-49.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/krb5-1.3.4-49.src.rpm 31d66f8b81a412d2b527a1d2e34a6e29 krb5-1.3.4-49.src.rpm i386: 9e3db992036d070d8932180873098150 krb5-debuginfo-1.3.4-49.i386.rpm cb0671a2c26fea448cc88e973513de5e krb5-devel-1.3.4-49.i386.rpm a98a07dbc3bb70a29be7abf1f9413514 krb5-libs-1.3.4-49.i386.rpm 4ae9d98926bb5b88562d2a9df1d5b019 krb5-server-1.3.4-49.i386.rpm 292e2aba8e5f54b252d8c2dcae346c2c krb5-workstation-1.3.4-49.i386.rpm x86_64: 9e3db992036d070d8932180873098150 krb5-debuginfo-1.3.4-49.i386.rpm 5418edb6f780481f4fc581ea931c0249 krb5-debuginfo-1.3.4-49.x86_64.rpm 203b9502c0d5603f21da65eff1aac97e krb5-devel-1.3.4-49.x86_64.rpm a98a07dbc3bb70a29be7abf1f9413514 krb5-libs-1.3.4-49.i386.rpm 5a52bd88b120e3fbc675b6f83e001679 krb5-libs-1.3.4-49.x86_64.rpm 90e96766548f63e93928bb5d6a1b6c2a krb5-server-1.3.4-49.x86_64.rpm eb922c5ad814e73069f201ac703b3c40 krb5-workstation-1.3.4-49.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/krb5-1.3.4-49.src.rpm 31d66f8b81a412d2b527a1d2e34a6e29 krb5-1.3.4-49.src.rpm i386: 9e3db992036d070d8932180873098150 krb5-debuginfo-1.3.4-49.i386.rpm cb0671a2c26fea448cc88e973513de5e krb5-devel-1.3.4-49.i386.rpm a98a07dbc3bb70a29be7abf1f9413514 krb5-libs-1.3.4-49.i386.rpm 4ae9d98926bb5b88562d2a9df1d5b019 krb5-server-1.3.4-49.i386.rpm 292e2aba8e5f54b252d8c2dcae346c2c krb5-workstation-1.3.4-49.i386.rpm ia64: 9e3db992036d070d8932180873098150 krb5-debuginfo-1.3.4-49.i386.rpm 9b548a0ef35ea35fd9679ccf42703ec6 krb5-debuginfo-1.3.4-49.ia64.rpm 14661d7ee6d5005c074bbed129cfac43 krb5-devel-1.3.4-49.ia64.rpm a98a07dbc3bb70a29be7abf1f9413514 krb5-libs-1.3.4-49.i386.rpm 09a2550dc627f1eeda901a1884a04a2f krb5-libs-1.3.4-49.ia64.rpm 03c9f1f5d4bcc5921574167506a67fcd krb5-server-1.3.4-49.ia64.rpm 5292efc768b6d6f2ee260a906fc3e46e krb5-workstation-1.3.4-49.ia64.rpm x86_64: 9e3db992036d070d8932180873098150 krb5-debuginfo-1.3.4-49.i386.rpm 5418edb6f780481f4fc581ea931c0249 krb5-debuginfo-1.3.4-49.x86_64.rpm 203b9502c0d5603f21da65eff1aac97e krb5-devel-1.3.4-49.x86_64.rpm a98a07dbc3bb70a29be7abf1f9413514 krb5-libs-1.3.4-49.i386.rpm 5a52bd88b120e3fbc675b6f83e001679 krb5-libs-1.3.4-49.x86_64.rpm 90e96766548f63e93928bb5d6a1b6c2a krb5-server-1.3.4-49.x86_64.rpm eb922c5ad814e73069f201ac703b3c40 krb5-workstation-1.3.4-49.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/krb5-1.3.4-49.src.rpm 31d66f8b81a412d2b527a1d2e34a6e29 krb5-1.3.4-49.src.rpm i386: 9e3db992036d070d8932180873098150 krb5-debuginfo-1.3.4-49.i386.rpm cb0671a2c26fea448cc88e973513de5e krb5-devel-1.3.4-49.i386.rpm a98a07dbc3bb70a29be7abf1f9413514 krb5-libs-1.3.4-49.i386.rpm 4ae9d98926bb5b88562d2a9df1d5b019 krb5-server-1.3.4-49.i386.rpm 292e2aba8e5f54b252d8c2dcae346c2c krb5-workstation-1.3.4-49.i386.rpm ia64: 9e3db992036d070d8932180873098150 krb5-debuginfo-1.3.4-49.i386.rpm 9b548a0ef35ea35fd9679ccf42703ec6 krb5-debuginfo-1.3.4-49.ia64.rpm 14661d7ee6d5005c074bbed129cfac43 krb5-devel-1.3.4-49.ia64.rpm a98a07dbc3bb70a29be7abf1f9413514 krb5-libs-1.3.4-49.i386.rpm 09a2550dc627f1eeda901a1884a04a2f krb5-libs-1.3.4-49.ia64.rpm 03c9f1f5d4bcc5921574167506a67fcd krb5-server-1.3.4-49.ia64.rpm 5292efc768b6d6f2ee260a906fc3e46e krb5-workstation-1.3.4-49.ia64.rpm x86_64: 9e3db992036d070d8932180873098150 krb5-debuginfo-1.3.4-49.i386.rpm 5418edb6f780481f4fc581ea931c0249 krb5-debuginfo-1.3.4-49.x86_64.rpm 203b9502c0d5603f21da65eff1aac97e krb5-devel-1.3.4-49.x86_64.rpm a98a07dbc3bb70a29be7abf1f9413514 krb5-libs-1.3.4-49.i386.rpm 5a52bd88b120e3fbc675b6f83e001679 krb5-libs-1.3.4-49.x86_64.rpm 90e96766548f63e93928bb5d6a1b6c2a krb5-server-1.3.4-49.x86_64.rpm eb922c5ad814e73069f201ac703b3c40 krb5-workstation-1.3.4-49.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/krb5-1.5-26.src.rpm 54a438d47dd34ba75bdbcfb53e9f3832 krb5-1.5-26.src.rpm i386: 69770998edd0e2d5ca23f423091ef90f krb5-debuginfo-1.5-26.i386.rpm 875d59fc81595614b3335e5d56748edb krb5-libs-1.5-26.i386.rpm 88c301cc700f2d211c900f7c3837b619 krb5-workstation-1.5-26.i386.rpm x86_64: 69770998edd0e2d5ca23f423091ef90f krb5-debuginfo-1.5-26.i386.rpm 9c4fbfa8b727102963f2d0212e0b6ef3 krb5-debuginfo-1.5-26.x86_64.rpm 875d59fc81595614b3335e5d56748edb krb5-libs-1.5-26.i386.rpm ba62d04600f6c5cc8d30d309e9d72bf1 krb5-libs-1.5-26.x86_64.rpm 6500bf11d424a8249d5f375c23f01f73 krb5-workstation-1.5-26.x86_64.rpm RHEL Desktop Workstation (v. 5 client): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/krb5-1.5-26.src.rpm 54a438d47dd34ba75bdbcfb53e9f3832 krb5-1.5-26.src.rpm i386: 69770998edd0e2d5ca23f423091ef90f krb5-debuginfo-1.5-26.i386.rpm 0e031dbfc8ae4ce42c1554d9859f4439 krb5-devel-1.5-26.i386.rpm 87ae5719718af36d6857fd88c99ee4d5 krb5-server-1.5-26.i386.rpm x86_64: 69770998edd0e2d5ca23f423091ef90f krb5-debuginfo-1.5-26.i386.rpm 9c4fbfa8b727102963f2d0212e0b6ef3 krb5-debuginfo-1.5-26.x86_64.rpm 0e031dbfc8ae4ce42c1554d9859f4439 krb5-devel-1.5-26.i386.rpm 8c43a19f27676d6a98b679685467ad2a krb5-devel-1.5-26.x86_64.rpm 0fddf58301fb29cfb89d68c6d3ced90c krb5-server-1.5-26.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/krb5-1.5-26.src.rpm 54a438d47dd34ba75bdbcfb53e9f3832 krb5-1.5-26.src.rpm i386: 69770998edd0e2d5ca23f423091ef90f krb5-debuginfo-1.5-26.i386.rpm 0e031dbfc8ae4ce42c1554d9859f4439 krb5-devel-1.5-26.i386.rpm 875d59fc81595614b3335e5d56748edb krb5-libs-1.5-26.i386.rpm 87ae5719718af36d6857fd88c99ee4d5 krb5-server-1.5-26.i386.rpm 88c301cc700f2d211c900f7c3837b619 krb5-workstation-1.5-26.i386.rpm ia64: 69770998edd0e2d5ca23f423091ef90f krb5-debuginfo-1.5-26.i386.rpm a0f8f3df4bbdb5e94ff556946e83a60e krb5-debuginfo-1.5-26.ia64.rpm 5ef813b691ab5a95f2b7af3cfcf21bf0 krb5-devel-1.5-26.ia64.rpm 875d59fc81595614b3335e5d56748edb krb5-libs-1.5-26.i386.rpm c25c1b5f6ae401c0728b58c98d6fabd5 krb5-libs-1.5-26.ia64.rpm 8063d46e7fd2afd3966eb38ac8833f8e krb5-server-1.5-26.ia64.rpm 96ce7fd870d01058e5ccb37160f07d58 krb5-workstation-1.5-26.ia64.rpm ppc: cc6950cde10d3e9b5327ae4eadb757ab krb5-debuginfo-1.5-26.ppc.rpm 6b3d8dd0c4c01c582995d85d277e9a3c krb5-debuginfo-1.5-26.ppc64.rpm c401f61001797ec5e397baee3517d3e6 krb5-devel-1.5-26.ppc.rpm 55f2c0ea136eee94cd39fb3a5294bc62 krb5-devel-1.5-26.ppc64.rpm 8f64c9b4ba5ca67e1a9329a8dc5df14a krb5-libs-1.5-26.ppc.rpm 2f54d3558e176b07de92d34893202525 krb5-libs-1.5-26.ppc64.rpm 3c69961f371ad75f4149e5c30d9f6f08 krb5-server-1.5-26.ppc.rpm ebada313d9561eabcde7f6b564c759cd krb5-workstation-1.5-26.ppc.rpm s390x: 8a08d38f1a832aa1c705df1590391ba9 krb5-debuginfo-1.5-26.s390.rpm 580abd3b672ca61323110f079222acb1 krb5-debuginfo-1.5-26.s390x.rpm 18ce9444dba20d59d422aec6fd917867 krb5-devel-1.5-26.s390.rpm 9f8f941f62fa7ebc843e01f55fad337c krb5-devel-1.5-26.s390x.rpm 85a77396b0595f996844ecc751d3e812 krb5-libs-1.5-26.s390.rpm b9cae4f992f458f94c05437403e11d63 krb5-libs-1.5-26.s390x.rpm 6c68e84c637613a5847d002a5fbbe8f0 krb5-server-1.5-26.s390x.rpm 04c192622a4b8cdd77d2a7b975b78f55 krb5-workstation-1.5-26.s390x.rpm x86_64: 69770998edd0e2d5ca23f423091ef90f krb5-debuginfo-1.5-26.i386.rpm 9c4fbfa8b727102963f2d0212e0b6ef3 krb5-debuginfo-1.5-26.x86_64.rpm 0e031dbfc8ae4ce42c1554d9859f4439 krb5-devel-1.5-26.i386.rpm 8c43a19f27676d6a98b679685467ad2a krb5-devel-1.5-26.x86_64.rpm 875d59fc81595614b3335e5d56748edb krb5-libs-1.5-26.i386.rpm ba62d04600f6c5cc8d30d309e9d72bf1 krb5-libs-1.5-26.x86_64.rpm 0fddf58301fb29cfb89d68c6d3ced90c krb5-server-1.5-26.x86_64.rpm 6500bf11d424a8249d5f375c23f01f73 krb5-workstation-1.5-26.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2007 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFGgWEvXlSAg2UNWIIRAgR9AJ0fr6dNUpVnlchc61BFJMUPuwr1zACgj0TI gX8igBrxPqScFGmUU33fGbE= =rUM/ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRoGbQCh9+71yA2DNAQL79QP/QKukTGMYPYLvyGu9G1i75p7CK+gmUlkY +up2+27TkoYpFQFzEVpiHduGwnZ0EcXywLSMuyRGG5vZITh3Wy3kkx2e0RJaHMBk jOn6l8+lJGt6J5MGrj4Nt2f1ktZA51JKhJzxJGk2Uu2WAI/R21ypz7v5cAcWJrED aCyx3ZWNkV0= =JQ9G -----END PGP SIGNATURE-----