Skip to navigation

Bug Fix Advisory krb5 bug fix update

Advisory: RHBA-2013:0319-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-02-20
Last updated on: 2013-02-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated krb5 packages that fix several bugs are now available for Red Hat
Enterprise Linux 6.

Kerberos is a network authentication system which allows clients and servers to
authenticate to each other using symmetric encryption and a trusted third-party,
the Key Distribution Center (KDC).

The krb5 packages have been upgraded to upstream version 1.10.3, which provides
a number of bug fixes over the previous version, including better support of
cross-domain trust functionality in other packages. (BZ#823926)

This update fixes the following bugs:

* Older versions of the libsmbclient package incorrectly depended on the
krb5_locate_kdc() function, which is no longer supported. Consequently,
applications which used older versions of libsmbclient became incompatible after
the Kerberos library update. With this update, an explicit conflict with older
versions of libsmbclient has been added. As a result, an incompatible
combination cannot be installed. (BZ#771687)

* Previously, when the krb5-auth-dialog application was used and the prompter
was left hanging for a long period of time, a large clock skew was mistakenly
recorded. This clock drift was applied in the next kinit session. Consequently,
the klist function reported an incorrect expiration time. This bug has been
fixed, and the spurious time offset no longer occurs in the described scenario.
(BZ#773496)

* Previously, when a list of trusted roots of a PKINIT client included the KDC's
certificates, certain KDC implementations omitted such anchors from the list of
certificates in the signed data structure. Consequently, the client failed to
verify the KDC's signature on the signed data. With this update, a backported
fix has been included to allow the client to use its own copies of relevant
certificates. As a result, the verification no longer fails in the
aforementioned scenario. (BZ#834718)

* Prior to this update, attempts to use the kinit command with a keytab file
often failed when the keytab file did not contain the Advanced Encryption
Standard (AES) keys, but the client's libraries and the KDC both supported AES.
The strongest supported encryption type (AES) was chosen by default, even though
it was not present in keytab. Consequently, a mismatch error occurred. The bug
has been fixed, and keytabs containing any of the supported encryption types are
now correctly processed. (BZ#837855)

* Previously, the krb5 package did not handle the timeout variable properly. In
certain cases, the timeout variable became a negative number. Consequently, the
client entered a loop while checking for responses. With this update, the client
logic has been modified and the described error no longer occurs. (BZ#838548)

* Prior to this update, the passwd utility failed when used by an Identity
Management client. Consequently, an error occurred with the following message:

token manipulation error

The bug has been fixed, and the passwd utility now works with Identity
Management as expected. (BZ#839017)

* Due to a previous update to a locally-applied patch, files created by the
libkrb5 library were given correct SELinux labels. However, each flushing of the
replay cache caused the file context configuration to be reloaded to ensure that
the correct label is applied to the newly-created replacement replay cache file.
This resulted in large performance degradation in applications which accept
authentication and use replay caches. With this update, the context
configuration is only loaded when the context configuration file has been
modified and the configuration is now freed only when the library is unloaded or
the calling application exits, thus greatly lowering the impact of this problem.
(BZ#845125, BZ#846472)

All users of krb5 are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
krb5-1.10.3-10.el6.src.rpm
File outdated by:  RHBA-2014:0359
    MD5: ab77cc968a7c5a4e5c717b8dc249b7fd
SHA-256: 761a54111d80fc6eb6ccb0ade2b4471752ea779db8ddede6b2e106c9f65dd5a8
 
IA-32:
krb5-debuginfo-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: c4c998d9defcb2de834eda8fefbc302b
SHA-256: ef42749127b56e56fd09a9a43701f010ef5571010aed2acfa324ca68e4c5a04e
krb5-devel-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 73a9284f1f375fc5476431e23c1b33ff
SHA-256: 418306cf51b0cdf781345ffbda92b2a83c9b586878cd180bf66fea81504f6131
krb5-libs-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 83344bb24bd0bc9c0d5f1fe169f8e99c
SHA-256: fbccd4aa660369445d086ab38434ecaf3f39db4f1f6d5de7428de6d468ea64c7
krb5-pkinit-openssl-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: b9484cac7afe2c4567a681b6dd9408fc
SHA-256: 4a5c29365e24e934834517126505fe42c527bc8f208637c75b2a220d6a6ebcbd
krb5-server-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 1d85e4532cb852bf493044ea28736bd3
SHA-256: 77c99de9b238d789c23a3ab97aa79cb012a97c07b265e51a3dc1bab5faf7290c
krb5-server-ldap-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 11fc1b04463d37ac440158d51ddef126
SHA-256: bbfda689c8e8b7af6645c93afb02aaf4ac89fff88d2ceba80937bd5ad3e40f8f
krb5-workstation-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: caa02828a5f261573353c7b35362a4ec
SHA-256: fb5ba47068b897e7a8212d2f36f2624578fb8a9dc4b73e1ca3d47fe444fd1b84
 
x86_64:
krb5-debuginfo-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: c4c998d9defcb2de834eda8fefbc302b
SHA-256: ef42749127b56e56fd09a9a43701f010ef5571010aed2acfa324ca68e4c5a04e
krb5-debuginfo-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 717569b7d012156f652e02bb2bc0ed8d
SHA-256: 1f1051fed9b469440f82377d14b997ef8da64befbfe50abb444dee9878752b33
krb5-devel-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 73a9284f1f375fc5476431e23c1b33ff
SHA-256: 418306cf51b0cdf781345ffbda92b2a83c9b586878cd180bf66fea81504f6131
krb5-devel-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 4f0c1de13f3f655fc9b7b4a5ed985014
SHA-256: fa1a88c9ad405f292d29bd7f4b7ce33f48272b16e2e0f615ea8f04e6b02762c0
krb5-libs-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 83344bb24bd0bc9c0d5f1fe169f8e99c
SHA-256: fbccd4aa660369445d086ab38434ecaf3f39db4f1f6d5de7428de6d468ea64c7
krb5-libs-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: e01687e2a773ab15e71987ac0f93e4d9
SHA-256: 8b70b8ec02f55b95c85936456c103a3e79aaccec977fb408fec48aa8d90fe018
krb5-pkinit-openssl-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 434d6a54ef3cc4a71400a35298f28f65
SHA-256: 26f3ad4f7d56a4d063e1b461a454ad7aedc5150d1b765d55b6dce720534d599a
krb5-server-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 91adca82c64aa0c853ff8436fe8f455b
SHA-256: a05b43345009895a472cb207d400e6590051c1d3dd319264c43fd9155c0c2cb0
krb5-server-ldap-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 11fc1b04463d37ac440158d51ddef126
SHA-256: bbfda689c8e8b7af6645c93afb02aaf4ac89fff88d2ceba80937bd5ad3e40f8f
krb5-server-ldap-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 0e7c96b6cfebd5f0db11ce2661addef6
SHA-256: e77f016b561bdfcc6f338b29c58356c0bcb612927325663e68c13eb0e66db835
krb5-workstation-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: b8cba491af252a375e315c7044904793
SHA-256: 3b60e34b91cf5aba6a2306b137462ae80c0c7a5baa60a690c485201b66674ba5
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
krb5-1.10.3-10.el6.src.rpm
File outdated by:  RHBA-2014:0359
    MD5: ab77cc968a7c5a4e5c717b8dc249b7fd
SHA-256: 761a54111d80fc6eb6ccb0ade2b4471752ea779db8ddede6b2e106c9f65dd5a8
 
x86_64:
krb5-debuginfo-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: c4c998d9defcb2de834eda8fefbc302b
SHA-256: ef42749127b56e56fd09a9a43701f010ef5571010aed2acfa324ca68e4c5a04e
krb5-debuginfo-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 717569b7d012156f652e02bb2bc0ed8d
SHA-256: 1f1051fed9b469440f82377d14b997ef8da64befbfe50abb444dee9878752b33
krb5-devel-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 73a9284f1f375fc5476431e23c1b33ff
SHA-256: 418306cf51b0cdf781345ffbda92b2a83c9b586878cd180bf66fea81504f6131
krb5-devel-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 4f0c1de13f3f655fc9b7b4a5ed985014
SHA-256: fa1a88c9ad405f292d29bd7f4b7ce33f48272b16e2e0f615ea8f04e6b02762c0
krb5-libs-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 83344bb24bd0bc9c0d5f1fe169f8e99c
SHA-256: fbccd4aa660369445d086ab38434ecaf3f39db4f1f6d5de7428de6d468ea64c7
krb5-libs-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: e01687e2a773ab15e71987ac0f93e4d9
SHA-256: 8b70b8ec02f55b95c85936456c103a3e79aaccec977fb408fec48aa8d90fe018
krb5-pkinit-openssl-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 434d6a54ef3cc4a71400a35298f28f65
SHA-256: 26f3ad4f7d56a4d063e1b461a454ad7aedc5150d1b765d55b6dce720534d599a
krb5-server-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 91adca82c64aa0c853ff8436fe8f455b
SHA-256: a05b43345009895a472cb207d400e6590051c1d3dd319264c43fd9155c0c2cb0
krb5-server-ldap-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 11fc1b04463d37ac440158d51ddef126
SHA-256: bbfda689c8e8b7af6645c93afb02aaf4ac89fff88d2ceba80937bd5ad3e40f8f
krb5-server-ldap-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 0e7c96b6cfebd5f0db11ce2661addef6
SHA-256: e77f016b561bdfcc6f338b29c58356c0bcb612927325663e68c13eb0e66db835
krb5-workstation-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: b8cba491af252a375e315c7044904793
SHA-256: 3b60e34b91cf5aba6a2306b137462ae80c0c7a5baa60a690c485201b66674ba5
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
krb5-1.10.3-10.el6.src.rpm
File outdated by:  RHBA-2014:0359
    MD5: ab77cc968a7c5a4e5c717b8dc249b7fd
SHA-256: 761a54111d80fc6eb6ccb0ade2b4471752ea779db8ddede6b2e106c9f65dd5a8
 
IA-32:
krb5-debuginfo-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: c4c998d9defcb2de834eda8fefbc302b
SHA-256: ef42749127b56e56fd09a9a43701f010ef5571010aed2acfa324ca68e4c5a04e
krb5-devel-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 73a9284f1f375fc5476431e23c1b33ff
SHA-256: 418306cf51b0cdf781345ffbda92b2a83c9b586878cd180bf66fea81504f6131
krb5-libs-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 83344bb24bd0bc9c0d5f1fe169f8e99c
SHA-256: fbccd4aa660369445d086ab38434ecaf3f39db4f1f6d5de7428de6d468ea64c7
krb5-pkinit-openssl-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: b9484cac7afe2c4567a681b6dd9408fc
SHA-256: 4a5c29365e24e934834517126505fe42c527bc8f208637c75b2a220d6a6ebcbd
krb5-server-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 1d85e4532cb852bf493044ea28736bd3
SHA-256: 77c99de9b238d789c23a3ab97aa79cb012a97c07b265e51a3dc1bab5faf7290c
krb5-server-ldap-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 11fc1b04463d37ac440158d51ddef126
SHA-256: bbfda689c8e8b7af6645c93afb02aaf4ac89fff88d2ceba80937bd5ad3e40f8f
krb5-workstation-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: caa02828a5f261573353c7b35362a4ec
SHA-256: fb5ba47068b897e7a8212d2f36f2624578fb8a9dc4b73e1ca3d47fe444fd1b84
 
PPC:
krb5-debuginfo-1.10.3-10.el6.ppc.rpm
File outdated by:  RHBA-2014:0359
    MD5: 5f62b13d5bd855de20c760f100d9b57b
SHA-256: c50dc1a302f73455acb8d80a028bf86952587c93234a3612709c81e08700cf8d
krb5-debuginfo-1.10.3-10.el6.ppc64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 53d8d97bd7da90ed874c675785a95f46
SHA-256: 15ba71ddadecbc3cae8417e3711eab573cc70bc970b2e620ddde63c61ca3dcf1
krb5-devel-1.10.3-10.el6.ppc.rpm
File outdated by:  RHBA-2014:0359
    MD5: f8e5371137e4c9156352c9ad77126ff4
SHA-256: c787cb47950ba3dc1cf8b9998902fbaf76fd8c9401aa05ec634c079640fd9d63
krb5-devel-1.10.3-10.el6.ppc64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 60559bc02df16ed3967a0dda7981c1d0
SHA-256: 6a76b0254f3752c41181015cafbee793641abc2ea9bde495c9edc95e554ddee4
krb5-libs-1.10.3-10.el6.ppc.rpm
File outdated by:  RHBA-2014:0359
    MD5: 78cce4a3b0c10f4f00d6c43cf5f40ad9
SHA-256: 3d07aff486a825d8cf3bf01d3f85a634e094be820723c62889c82ddf16c34d3d
krb5-libs-1.10.3-10.el6.ppc64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 052c7cb98fcbd19c1c9a2b7806d5361f
SHA-256: 0f113cc6e8c559e7944d7902d666ecaef1a49a67da4045ea3957ab27e8735923
krb5-pkinit-openssl-1.10.3-10.el6.ppc64.rpm
File outdated by:  RHBA-2014:0359
    MD5: b17893aad4f3717839d8f11ebc1fe7d3
SHA-256: 867893bf343943e301a8e1e54104040b0ae01abb6407f31cb33f54b645998dca
krb5-server-1.10.3-10.el6.ppc64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 12d77eba20a758a6ce9c473b637277f6
SHA-256: 2f049a1b596b7412e43e6baa3fbe9e7e16928f21e682c8cd852cca88246c1e72
krb5-server-ldap-1.10.3-10.el6.ppc.rpm
File outdated by:  RHBA-2014:0359
    MD5: 3f8db264c443eac99348bc05c2c36d53
SHA-256: 95577ebe68e1fccf2aec1bef77012be39cdff4060f56ca237a152d13fae17d4b
krb5-server-ldap-1.10.3-10.el6.ppc64.rpm
File outdated by:  RHBA-2014:0359
    MD5: ce049d740c1dc321d3f7d7444a7cef31
SHA-256: 09ae0fe92bb02548eabb091b965be94276d4b9c6e414740d2188678aa73615f9
krb5-workstation-1.10.3-10.el6.ppc64.rpm
File outdated by:  RHBA-2014:0359
    MD5: fce808afb334c7de079185473b0d045c
SHA-256: 3a63ebc9f3682acccbdd8b2c1c74e950fc2e8f70500bd1e9beb49ff59d458bd9
 
s390x:
krb5-debuginfo-1.10.3-10.el6.s390.rpm
File outdated by:  RHBA-2014:0359
    MD5: 325085befecaae1e1eeb9fdf771f92af
SHA-256: 29aa3cdea7badbe0ca6a028f53d2fcbfae5759a18fe9a9a469484f323bbdcb5c
krb5-debuginfo-1.10.3-10.el6.s390x.rpm
File outdated by:  RHBA-2014:0359
    MD5: 2297b8b5af3617e80ec0af9ef50bdcb7
SHA-256: ce0290b180bcba67f8a8bfcf14e8dbff0c4ffa449c6519ec636f4e1df17ec3e9
krb5-devel-1.10.3-10.el6.s390.rpm
File outdated by:  RHBA-2014:0359
    MD5: abaaad111166b2761b9d61479b728e2c
SHA-256: dd91e591521d8666f1043c31f04b9d83332e11624476eac51329fa46f9f75d3b
krb5-devel-1.10.3-10.el6.s390x.rpm
File outdated by:  RHBA-2014:0359
    MD5: 5d19155a885d227b8e8a0fbfc7465414
SHA-256: 7ac77a17af9f57b7effff396fed0348f6540512cd947f79e3a48577d767f81d5
krb5-libs-1.10.3-10.el6.s390.rpm
File outdated by:  RHBA-2014:0359
    MD5: 226fd6c530cfb8f307cc1952ebd93d86
SHA-256: d95c3cd5300212a9b2556c5257aeecf72d5df787a49ab49e809a5a7ed556cd10
krb5-libs-1.10.3-10.el6.s390x.rpm
File outdated by:  RHBA-2014:0359
    MD5: 73366e4f1e240e1fafa6a539ba1c8005
SHA-256: 6c80227fe5b6e9a8b41321b43632384444c9f5687c617862df03d892f88048f1
krb5-pkinit-openssl-1.10.3-10.el6.s390x.rpm
File outdated by:  RHBA-2014:0359
    MD5: efcedd30d99339bf003719481a227bbd
SHA-256: 4567e42d03a620cb49bd36ad189f2359ee919c88a2c0896022eb95cd643ddb50
krb5-server-1.10.3-10.el6.s390x.rpm
File outdated by:  RHBA-2014:0359
    MD5: cc8a6cd2e3147f3d69ff783b59aa7d6e
SHA-256: 57beadefdfa4e11d1a421e032b58b6d2d7a0fcb2dc9691d06a95777a65e61a4b
krb5-server-ldap-1.10.3-10.el6.s390.rpm
File outdated by:  RHBA-2014:0359
    MD5: b3debb873b3fe4bc438d753f22747e8e
SHA-256: 193882db0e9f872648d2fab9a3e01c350747389e2751c6223c603d80abf2b738
krb5-server-ldap-1.10.3-10.el6.s390x.rpm
File outdated by:  RHBA-2014:0359
    MD5: 4b3cb53b35f76185324741942e176254
SHA-256: 4c0361a7644d3b1d259ffa896abb6a8dac1b09831d28c49427aa41fd72d8d654
krb5-workstation-1.10.3-10.el6.s390x.rpm
File outdated by:  RHBA-2014:0359
    MD5: 66f16c7124b90fff6fe15bbfb6168504
SHA-256: 551837026fb21688f311ac6c258930e958947023d712b7742f9db5cbe9f503ea
 
x86_64:
krb5-debuginfo-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: c4c998d9defcb2de834eda8fefbc302b
SHA-256: ef42749127b56e56fd09a9a43701f010ef5571010aed2acfa324ca68e4c5a04e
krb5-debuginfo-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 717569b7d012156f652e02bb2bc0ed8d
SHA-256: 1f1051fed9b469440f82377d14b997ef8da64befbfe50abb444dee9878752b33
krb5-devel-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 73a9284f1f375fc5476431e23c1b33ff
SHA-256: 418306cf51b0cdf781345ffbda92b2a83c9b586878cd180bf66fea81504f6131
krb5-devel-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 4f0c1de13f3f655fc9b7b4a5ed985014
SHA-256: fa1a88c9ad405f292d29bd7f4b7ce33f48272b16e2e0f615ea8f04e6b02762c0
krb5-libs-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 83344bb24bd0bc9c0d5f1fe169f8e99c
SHA-256: fbccd4aa660369445d086ab38434ecaf3f39db4f1f6d5de7428de6d468ea64c7
krb5-libs-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: e01687e2a773ab15e71987ac0f93e4d9
SHA-256: 8b70b8ec02f55b95c85936456c103a3e79aaccec977fb408fec48aa8d90fe018
krb5-pkinit-openssl-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 434d6a54ef3cc4a71400a35298f28f65
SHA-256: 26f3ad4f7d56a4d063e1b461a454ad7aedc5150d1b765d55b6dce720534d599a
krb5-server-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 91adca82c64aa0c853ff8436fe8f455b
SHA-256: a05b43345009895a472cb207d400e6590051c1d3dd319264c43fd9155c0c2cb0
krb5-server-ldap-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 11fc1b04463d37ac440158d51ddef126
SHA-256: bbfda689c8e8b7af6645c93afb02aaf4ac89fff88d2ceba80937bd5ad3e40f8f
krb5-server-ldap-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 0e7c96b6cfebd5f0db11ce2661addef6
SHA-256: e77f016b561bdfcc6f338b29c58356c0bcb612927325663e68c13eb0e66db835
krb5-workstation-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: b8cba491af252a375e315c7044904793
SHA-256: 3b60e34b91cf5aba6a2306b137462ae80c0c7a5baa60a690c485201b66674ba5
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
krb5-1.10.3-10.el6.src.rpm
File outdated by:  RHBA-2014:0359
    MD5: ab77cc968a7c5a4e5c717b8dc249b7fd
SHA-256: 761a54111d80fc6eb6ccb0ade2b4471752ea779db8ddede6b2e106c9f65dd5a8
 
IA-32:
krb5-debuginfo-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: c4c998d9defcb2de834eda8fefbc302b
SHA-256: ef42749127b56e56fd09a9a43701f010ef5571010aed2acfa324ca68e4c5a04e
krb5-devel-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 73a9284f1f375fc5476431e23c1b33ff
SHA-256: 418306cf51b0cdf781345ffbda92b2a83c9b586878cd180bf66fea81504f6131
krb5-libs-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 83344bb24bd0bc9c0d5f1fe169f8e99c
SHA-256: fbccd4aa660369445d086ab38434ecaf3f39db4f1f6d5de7428de6d468ea64c7
krb5-pkinit-openssl-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: b9484cac7afe2c4567a681b6dd9408fc
SHA-256: 4a5c29365e24e934834517126505fe42c527bc8f208637c75b2a220d6a6ebcbd
krb5-server-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 1d85e4532cb852bf493044ea28736bd3
SHA-256: 77c99de9b238d789c23a3ab97aa79cb012a97c07b265e51a3dc1bab5faf7290c
krb5-server-ldap-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 11fc1b04463d37ac440158d51ddef126
SHA-256: bbfda689c8e8b7af6645c93afb02aaf4ac89fff88d2ceba80937bd5ad3e40f8f
krb5-workstation-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: caa02828a5f261573353c7b35362a4ec
SHA-256: fb5ba47068b897e7a8212d2f36f2624578fb8a9dc4b73e1ca3d47fe444fd1b84
 
x86_64:
krb5-debuginfo-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: c4c998d9defcb2de834eda8fefbc302b
SHA-256: ef42749127b56e56fd09a9a43701f010ef5571010aed2acfa324ca68e4c5a04e
krb5-debuginfo-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 717569b7d012156f652e02bb2bc0ed8d
SHA-256: 1f1051fed9b469440f82377d14b997ef8da64befbfe50abb444dee9878752b33
krb5-devel-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 73a9284f1f375fc5476431e23c1b33ff
SHA-256: 418306cf51b0cdf781345ffbda92b2a83c9b586878cd180bf66fea81504f6131
krb5-devel-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 4f0c1de13f3f655fc9b7b4a5ed985014
SHA-256: fa1a88c9ad405f292d29bd7f4b7ce33f48272b16e2e0f615ea8f04e6b02762c0
krb5-libs-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 83344bb24bd0bc9c0d5f1fe169f8e99c
SHA-256: fbccd4aa660369445d086ab38434ecaf3f39db4f1f6d5de7428de6d468ea64c7
krb5-libs-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: e01687e2a773ab15e71987ac0f93e4d9
SHA-256: 8b70b8ec02f55b95c85936456c103a3e79aaccec977fb408fec48aa8d90fe018
krb5-pkinit-openssl-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 434d6a54ef3cc4a71400a35298f28f65
SHA-256: 26f3ad4f7d56a4d063e1b461a454ad7aedc5150d1b765d55b6dce720534d599a
krb5-server-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 91adca82c64aa0c853ff8436fe8f455b
SHA-256: a05b43345009895a472cb207d400e6590051c1d3dd319264c43fd9155c0c2cb0
krb5-server-ldap-1.10.3-10.el6.i686.rpm
File outdated by:  RHBA-2014:0359
    MD5: 11fc1b04463d37ac440158d51ddef126
SHA-256: bbfda689c8e8b7af6645c93afb02aaf4ac89fff88d2ceba80937bd5ad3e40f8f
krb5-server-ldap-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: 0e7c96b6cfebd5f0db11ce2661addef6
SHA-256: e77f016b561bdfcc6f338b29c58356c0bcb612927325663e68c13eb0e66db835
krb5-workstation-1.10.3-10.el6.x86_64.rpm
File outdated by:  RHBA-2014:0359
    MD5: b8cba491af252a375e315c7044904793
SHA-256: 3b60e34b91cf5aba6a2306b137462ae80c0c7a5baa60a690c485201b66674ba5
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

771687 - ABI issue in MIT krb5 1.10 scheduled for RHEL 6.4
773496 - Prompter delay can cause spurious clock skew
823926 - Rebase krb5 to 1.10 for AD trust to work
834718 - backport RT#7183 to allow PKINIT to process signedData which omits the certificates list
837855 - Mismatch of enctypes between principal and princpal
845125 - Slow response when binding with GSSAPI to 389 Directory Server
846472 - Slow performance when using Kerberos
871524 - orphaned krb5kdc processes restarting IPA services



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/