- Issued:
- 2013-01-07
- Updated:
- 2013-01-07
RHBA-2013:0078 - Bug Fix Advisory
Synopsis
mod_auth_kerb bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated mod_auth_kerb packages that fix two bugs and add one enhancement are now
available for Red Hat Enterprise Linux 5.
Description
The mod_auth_kerb package provides a module for the Apache HTTP Server designed
to provide Kerberos authentication over HTTP. The module supports the Negotiate
authentication method, which performs full Kerberos authentication based on
ticket exchanges.
These updated mod_auth_kerb packages provide fixes for the following bugs:
- Prior to this update, the mod_auth_kerb source RPM could not be built by a
non-root user. This was because the httpd-devel package places the apxs utility,
which is needed to build the mod_auth_kerb package, into the /usr/sbin
directory. This directory is not specified in the PATH variable for non-root
users. With this update, the apxs utility is defined as being placed in the
/usr/bin directory in the "mod_auth_kerb.spec" file, and the mod_auth_kerb SRPM
can now be successfully built by non-root users. (BZ#456662)
- The "mod_auth_kerb" module did not use the Kerberos libraries in a thread-safe
way. Therefore, if mod_auth_kerb ran under a multi-threaded Apache HTTP Server,
authentication requests could terminate unexpectedly with a segmentation fault.
With this update, the thread-safety problem has been fixed, and crashes no
longer occur under these circumstances. (BZ#734098)
In addition, these updated mod_auth_kerb packages provide the following
enhancement:
- The "KrbLocalUserMapping" Apache directive has been added to allow Kerberos
principal names to be mapped to system user names. (BZ#446670)
Users are advised to upgrade to these updated mod_auth_kerb packages, which fix
these bugs and add this enhancement.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 446670 - [RFE] Include apache directive 'KrbLocalUserMapping' in 'mod_auth_kerb'
- BZ - 456662 - mod_auth_kerb does not build from SRPM
- BZ - 734098 - mod_auth_kerb threading problems
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
mod_auth_kerb-5.1-5.el5.src.rpm | SHA-256: b8712a1a501ade7c584a5fd38a9d87d42546cce1db80ffcdbcdd91c90f456db7 |
x86_64 | |
mod_auth_kerb-5.1-5.el5.x86_64.rpm | SHA-256: b2d1824ffafc7a780445ecc4bc763e48b94e89bd056ff52487550d01fc14f5b0 |
mod_auth_kerb-debuginfo-5.1-5.el5.x86_64.rpm | SHA-256: 465833752497d306dc2c3e4b9918368e1300145499e4ce7fd22c9d352a8d991e |
ia64 | |
mod_auth_kerb-5.1-5.el5.ia64.rpm | SHA-256: c9429bcd70a6e8b2f1830df77b5c764532151f8f9d7798f3fb45db9acc8dc604 |
mod_auth_kerb-debuginfo-5.1-5.el5.ia64.rpm | SHA-256: 3f7fd1b5c3fdf068c6d2ac0bfe6a3dabb8bfe25c0fad05ce81de94e0c483d699 |
i386 | |
mod_auth_kerb-5.1-5.el5.i386.rpm | SHA-256: 998b5b38d9e7af5427b5fae67b17fe50ed3a2b251ec5deb856866ef015c26d89 |
mod_auth_kerb-debuginfo-5.1-5.el5.i386.rpm | SHA-256: 929e974f889c5867a1a5579de048470819c42939d095f19f180805e4f8fee6c1 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
mod_auth_kerb-5.1-5.el5.src.rpm | SHA-256: b8712a1a501ade7c584a5fd38a9d87d42546cce1db80ffcdbcdd91c90f456db7 |
x86_64 | |
mod_auth_kerb-5.1-5.el5.x86_64.rpm | SHA-256: b2d1824ffafc7a780445ecc4bc763e48b94e89bd056ff52487550d01fc14f5b0 |
mod_auth_kerb-debuginfo-5.1-5.el5.x86_64.rpm | SHA-256: 465833752497d306dc2c3e4b9918368e1300145499e4ce7fd22c9d352a8d991e |
i386 | |
mod_auth_kerb-5.1-5.el5.i386.rpm | SHA-256: 998b5b38d9e7af5427b5fae67b17fe50ed3a2b251ec5deb856866ef015c26d89 |
mod_auth_kerb-debuginfo-5.1-5.el5.i386.rpm | SHA-256: 929e974f889c5867a1a5579de048470819c42939d095f19f180805e4f8fee6c1 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
mod_auth_kerb-5.1-5.el5.src.rpm | SHA-256: b8712a1a501ade7c584a5fd38a9d87d42546cce1db80ffcdbcdd91c90f456db7 |
s390x | |
mod_auth_kerb-5.1-5.el5.s390x.rpm | SHA-256: 9581c0e1d332cbf0b8aeee74a177e4dbefbd1d085b329d6dc77dd5585179aa17 |
mod_auth_kerb-debuginfo-5.1-5.el5.s390x.rpm | SHA-256: ccf14ddcb504d247c9ab04d555cf5d18198d90e9751ac0c51f0f9bccf9714c3f |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
mod_auth_kerb-5.1-5.el5.src.rpm | SHA-256: b8712a1a501ade7c584a5fd38a9d87d42546cce1db80ffcdbcdd91c90f456db7 |
ppc | |
mod_auth_kerb-5.1-5.el5.ppc.rpm | SHA-256: 99a22802dd24ccb20bc4414a4fb06928a5f8c36854bf1b1c34a796eb91d9a2a0 |
mod_auth_kerb-debuginfo-5.1-5.el5.ppc.rpm | SHA-256: d228cd065bf9b987f2e9ce4650faf3af9abf25fed2f9b91f581c0e9aceeb370d |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
mod_auth_kerb-5.1-5.el5.src.rpm | SHA-256: b8712a1a501ade7c584a5fd38a9d87d42546cce1db80ffcdbcdd91c90f456db7 |
x86_64 | |
mod_auth_kerb-5.1-5.el5.x86_64.rpm | SHA-256: b2d1824ffafc7a780445ecc4bc763e48b94e89bd056ff52487550d01fc14f5b0 |
mod_auth_kerb-debuginfo-5.1-5.el5.x86_64.rpm | SHA-256: 465833752497d306dc2c3e4b9918368e1300145499e4ce7fd22c9d352a8d991e |
i386 | |
mod_auth_kerb-5.1-5.el5.i386.rpm | SHA-256: 998b5b38d9e7af5427b5fae67b17fe50ed3a2b251ec5deb856866ef015c26d89 |
mod_auth_kerb-debuginfo-5.1-5.el5.i386.rpm | SHA-256: 929e974f889c5867a1a5579de048470819c42939d095f19f180805e4f8fee6c1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.