Skip to navigation

Security Advisory Critical: krb5 security update

Advisory: RHSA-2011:1851-2
Type: Security Advisory
Severity: Critical
Issued on: 2011-12-27
Last updated on: 2011-12-27
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2011-4862

Details

Updated krb5 packages that fix one security issue are now available for
Red Hat Enterprise Linux 4 and 5.

The Red Hat Security Response Team has rated this update as having Critical
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Kerberos is a network authentication system which allows clients and servers
to authenticate to each other using symmetric encryption and a trusted third-
party, the Key Distribution Center (KDC).

A buffer overflow flaw was found in the MIT krb5 telnet daemon (telnetd). A
remote attacker who can access the telnet port of a target machine could use
this flaw to execute arbitrary code as root. (CVE-2011-4862)

Note that the krb5 telnet daemon is not enabled by default in any version of
Red Hat Enterprise Linux. In addition, the default firewall rules block
remote access to the telnet port. This flaw does not affect the telnet
daemon distributed in the telnet-server package.

For users who have installed the krb5-workstation package, have enabled the
telnet daemon, and have it accessible remotely, this update should be
applied immediately.

All krb5-workstation users should upgrade to these updated packages, which
contain a backported patch to correct this issue.


Solution

The krb5 telnet daemon is an xinetd service. You can determine if krb5
telnetd is enabled with the commands:

/sbin/chkconfig --list krb5-telnet
/sbin/chkconfig --list ekrb5-telnet

The output of these commands will display "on" if krb5 telnet is enabled.
krb5 telnet daemon can be immediately disabled with the commands:

/sbin/chkconfig krb5-telnet off
/sbin/chkconfig ekrb5-telnet off

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
krb5-1.6.1-63.el5_7.src.rpm
File outdated by:  RHSA-2013:0942
    MD5: c12a4950465227dac588166fd2c9a7c6
SHA-256: 8485471ce96f33bd887a7d313e364b70a71bd7b659786c0ed4d5fb5a5a1cfd85
 
IA-32:
krb5-devel-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: 713306eb619266999e008484da41c496
SHA-256: 73b410e20f1a7e714b287ddd481bb772e08ae26a21ea4a625c090b36b3a3607d
krb5-server-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: 753a20c81bab18805a78ed12afe75775
SHA-256: 9857cf1d7cf620ddf6a199394179635f4afe32d357117d781f753e26d7bfea65
krb5-server-ldap-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: 9435fcd672008511a1899b5baa305769
SHA-256: edc6afc303955b1da7a6a509f79404ce3646cd168017aca2e0a47e6544e68a58
 
x86_64:
krb5-devel-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: 713306eb619266999e008484da41c496
SHA-256: 73b410e20f1a7e714b287ddd481bb772e08ae26a21ea4a625c090b36b3a3607d
krb5-devel-1.6.1-63.el5_7.x86_64.rpm
File outdated by:  RHSA-2013:0942
    MD5: 9020be637f3d140c4684794b8f6704ba
SHA-256: 8b0ed4f9474f118bc4029583637100e16fb75fade5c4a89c1d9b2dfad148d496
krb5-server-1.6.1-63.el5_7.x86_64.rpm
File outdated by:  RHSA-2013:0942
    MD5: f3fac3c4f9fb084cfdd43d202bd66ddf
SHA-256: 58dfa2756e241e80ba9ec9d1781d3e932c6723dc88131c935099342863252bd8
krb5-server-ldap-1.6.1-63.el5_7.x86_64.rpm
File outdated by:  RHSA-2013:0942
    MD5: b7bda6e04b9420356fd1515374b66973
SHA-256: 54e20d84d794caa1f51651d709dfa5e538580c9d41d3942a7f3ea6514a67e0b3
 
Red Hat Desktop (v. 4)

SRPMS:
krb5-1.3.4-65.el4.src.rpm     MD5: 5cbdbe387ce1b6d0133c215c285e4dc5
SHA-256: adfcf759a909976fcb544f634349869e2ea59a5a963f18dd87d4bbec491473d7
 
IA-32:
krb5-devel-1.3.4-65.el4.i386.rpm     MD5: f81baa7108d3ec1e3594556fe468cff4
SHA-256: 2e4bef57620d0112bf8609b8304aafba3c2dc19e8078f1e9c6e7bb77dbe6e0f9
krb5-libs-1.3.4-65.el4.i386.rpm     MD5: 3b82fd49b0f0504058f05a7e438d4dbf
SHA-256: b9f91269241ae22fc778b1289a1a0cf59017570b652f548b97914207a760821e
krb5-server-1.3.4-65.el4.i386.rpm     MD5: 9d35c0d19130c347300684e150cc95bc
SHA-256: b4ef67ab5509bef953c64fe4af22f75eefbb04cfb879e8f5c943953fe14a9d3a
krb5-workstation-1.3.4-65.el4.i386.rpm     MD5: fc23fc1791ee0af186e0ea735b11a978
SHA-256: 3e65905be0d1fb96a820752ed049e0e33b9b44fef13f80530b4bfaeaf2754222
 
x86_64:
krb5-devel-1.3.4-65.el4.x86_64.rpm     MD5: 6bae3946c7e8849937f515bbd4acabda
SHA-256: 334eed25741af9268112d4c861f3e3ed9bedc677bb4999cf15dff161d2649f73
krb5-libs-1.3.4-65.el4.i386.rpm     MD5: 3b82fd49b0f0504058f05a7e438d4dbf
SHA-256: b9f91269241ae22fc778b1289a1a0cf59017570b652f548b97914207a760821e
krb5-libs-1.3.4-65.el4.x86_64.rpm     MD5: 87c3c49f382916ff32c181d67084d9c3
SHA-256: 8b827ca6dd66d96b0f8f066d5d78ad2da636a00a84ba0143f397755babc79b05
krb5-server-1.3.4-65.el4.x86_64.rpm     MD5: a75ebecda5f2fc0cc018dfb3deb0aa20
SHA-256: 4528d57158b7a08674cf0a9bfd8d706a7b56ee27cc4dee9226651fc3dbfac124
krb5-workstation-1.3.4-65.el4.x86_64.rpm     MD5: d0fdad42d541e216968856930bda6dd8
SHA-256: 6a24251013ed7933da2e437e81781ae12d840f2451a7fe63bc9475b45f6ebea2
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
krb5-1.6.1-63.el5_7.src.rpm
File outdated by:  RHSA-2013:0942
    MD5: c12a4950465227dac588166fd2c9a7c6
SHA-256: 8485471ce96f33bd887a7d313e364b70a71bd7b659786c0ed4d5fb5a5a1cfd85
 
IA-32:
krb5-devel-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: 713306eb619266999e008484da41c496
SHA-256: 73b410e20f1a7e714b287ddd481bb772e08ae26a21ea4a625c090b36b3a3607d
krb5-libs-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: 0bed8f896fff11b94f3efc661190b3de
SHA-256: 31f7bbb60a5beb73f1704543aba2211ecb5893ada41a6b6037d73f5d5220b467
krb5-server-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: 753a20c81bab18805a78ed12afe75775
SHA-256: 9857cf1d7cf620ddf6a199394179635f4afe32d357117d781f753e26d7bfea65
krb5-server-ldap-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: 9435fcd672008511a1899b5baa305769
SHA-256: edc6afc303955b1da7a6a509f79404ce3646cd168017aca2e0a47e6544e68a58
krb5-workstation-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: e38d17cce6ce459ab90b4a3dad0892a3
SHA-256: 73ee00350c8d4b7947546f1d7c6956efeb3f8ef3a64a121641b51f984c4e4a77
 
IA-64:
krb5-devel-1.6.1-63.el5_7.ia64.rpm
File outdated by:  RHSA-2013:0942
    MD5: 191ff68a90fb1572f70b6568ab167c54
SHA-256: 8eff886e11a8b82d38c751a938ee76b288c72ec6d42926b81e6e6bb142d8b17a
krb5-libs-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: 0bed8f896fff11b94f3efc661190b3de
SHA-256: 31f7bbb60a5beb73f1704543aba2211ecb5893ada41a6b6037d73f5d5220b467
krb5-libs-1.6.1-63.el5_7.ia64.rpm
File outdated by:  RHSA-2013:0942
    MD5: db0d8d202facac405f67652b5cbadd6b
SHA-256: 345ba0f0381701ec242f9a16e79bb31182a5778f31ad2487a159939a9132808a
krb5-server-1.6.1-63.el5_7.ia64.rpm
File outdated by:  RHSA-2013:0942
    MD5: 95d68f5786433298cafdd3537ff702a7
SHA-256: 73a6491920c99bad9559443e23f3e336deec33a173ced90f33f9006915655816
krb5-server-ldap-1.6.1-63.el5_7.ia64.rpm
File outdated by:  RHSA-2013:0942
    MD5: 5878bc016984b9c43f7a06fcadcb59bd
SHA-256: a3f0252da2b8876f1a5083f21ba86cf1b308f021fabb5093551f9251036fed0f
krb5-workstation-1.6.1-63.el5_7.ia64.rpm
File outdated by:  RHSA-2013:0942
    MD5: 77ad2a42a727af98d1a36c92ac4701c6
SHA-256: 9f44a73607ef703af95bc72ca7e43db9fe9e76ee002baa1a758d2f50d739c6ea
 
PPC:
krb5-devel-1.6.1-63.el5_7.ppc.rpm
File outdated by:  RHSA-2013:0942
    MD5: 532c4ff79bf933b3c5882ceb56e0e33c
SHA-256: b0004a6b37bc9e3072fa9bbb7c2a13cd867aeb7d052235c06628e6985081ab08
krb5-devel-1.6.1-63.el5_7.ppc64.rpm
File outdated by:  RHSA-2013:0942
    MD5: 9d02bfba9955876dc3c01d4bfe3b438e
SHA-256: c1336567f6dc59de487bfbe8160c6905136373b4fc291d7722ac4c35fc36a172
krb5-libs-1.6.1-63.el5_7.ppc.rpm
File outdated by:  RHSA-2013:0942
    MD5: a3948c9925b1ec3d2c24c7890bdf36e4
SHA-256: 1acc2a0cc1cdd6cf666027ec968c42b611ca972e3e199ab7a6a3373f5af574d9
krb5-libs-1.6.1-63.el5_7.ppc64.rpm
File outdated by:  RHSA-2013:0942
    MD5: 4ab3a49742832073c5bb037ba4cfd4d0
SHA-256: 7c383c62ceea560c9a9f9882dbf717aefbcc8ddce4134f021eedb90604e8800b
krb5-server-1.6.1-63.el5_7.ppc.rpm
File outdated by:  RHSA-2013:0942
    MD5: a2ce57f4649a02f23622e47f7ca3f4bf
SHA-256: 1838f17dc06552d81c25a84d864f5bff89a93ba14aab0fee0711719d8e7893ad
krb5-server-ldap-1.6.1-63.el5_7.ppc.rpm
File outdated by:  RHSA-2013:0942
    MD5: 4d411b914dcbb2be7f4849071f8a9894
SHA-256: f6a2353b5072fa623775e7a38c9d1a74609147f966c0854c76f3c89b6eb63139
krb5-workstation-1.6.1-63.el5_7.ppc.rpm
File outdated by:  RHSA-2013:0942
    MD5: 924760f16edff6cc0d820403a9cce25d
SHA-256: 777642e15df2120d4b566b666c60b5839cff8734237763a6c4bf8d061782bb45
 
s390x:
krb5-devel-1.6.1-63.el5_7.s390.rpm
File outdated by:  RHSA-2013:0942
    MD5: 7c8475206698301def9dfbe557e21bb5
SHA-256: 8013ed20d986322c8c79f8610125b9a40023ac6e97af7ef2f1bf95921da4f9e7
krb5-devel-1.6.1-63.el5_7.s390x.rpm
File outdated by:  RHSA-2013:0942
    MD5: 37b6b03f01fe2d34c5fd46013f01cd04
SHA-256: 2254e36e63f82de11bbf9ac2c9e8c0df293d5e201cf73d142acb0e910ba73494
krb5-libs-1.6.1-63.el5_7.s390.rpm
File outdated by:  RHSA-2013:0942
    MD5: 28385b41df44ad20db49f22a594b77e1
SHA-256: f8043a8fc4c0a0b012fbcd6ef79443999227da3a7273b3a541da46d79151e670
krb5-libs-1.6.1-63.el5_7.s390x.rpm
File outdated by:  RHSA-2013:0942
    MD5: fb30b99a44b38429463dfde2bd621308
SHA-256: 2ab8d9c5f28554413c2608af161665032eb1200e637cf79e4f99f933e2ff50b5
krb5-server-1.6.1-63.el5_7.s390x.rpm
File outdated by:  RHSA-2013:0942
    MD5: 546010778901e8223fe117bace1f27fa
SHA-256: 0b3bcf86f8490b7b9bae14f8ca261b985b4fac4896d0a69e975e6bb0f6db7754
krb5-server-ldap-1.6.1-63.el5_7.s390x.rpm
File outdated by:  RHSA-2013:0942
    MD5: c36fde853359ee24a341306e2f5610c2
SHA-256: 6a783c026fe7ebb1ce71bcac9e38a75f311a26aa525dbca5de2c6e344b30438a
krb5-workstation-1.6.1-63.el5_7.s390x.rpm
File outdated by:  RHSA-2013:0942
    MD5: 8caefd985cb919403dc90faaa6bad4ed
SHA-256: 31a6959e17721ae44b70b20eeed257329b8311eba0e86bec5ae30380334937c1
 
x86_64:
krb5-devel-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: 713306eb619266999e008484da41c496
SHA-256: 73b410e20f1a7e714b287ddd481bb772e08ae26a21ea4a625c090b36b3a3607d
krb5-devel-1.6.1-63.el5_7.x86_64.rpm
File outdated by:  RHSA-2013:0942
    MD5: 9020be637f3d140c4684794b8f6704ba
SHA-256: 8b0ed4f9474f118bc4029583637100e16fb75fade5c4a89c1d9b2dfad148d496
krb5-libs-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: 0bed8f896fff11b94f3efc661190b3de
SHA-256: 31f7bbb60a5beb73f1704543aba2211ecb5893ada41a6b6037d73f5d5220b467
krb5-libs-1.6.1-63.el5_7.x86_64.rpm
File outdated by:  RHSA-2013:0942
    MD5: 0fecb4965429c3b5fa5212c9fa5f774f
SHA-256: 74fdde6cfe5587a7946993a1f617bd2715c3093132e6d60085e68c205d1935fd
krb5-server-1.6.1-63.el5_7.x86_64.rpm
File outdated by:  RHSA-2013:0942
    MD5: f3fac3c4f9fb084cfdd43d202bd66ddf
SHA-256: 58dfa2756e241e80ba9ec9d1781d3e932c6723dc88131c935099342863252bd8
krb5-server-ldap-1.6.1-63.el5_7.x86_64.rpm
File outdated by:  RHSA-2013:0942
    MD5: b7bda6e04b9420356fd1515374b66973
SHA-256: 54e20d84d794caa1f51651d709dfa5e538580c9d41d3942a7f3ea6514a67e0b3
krb5-workstation-1.6.1-63.el5_7.x86_64.rpm
File outdated by:  RHSA-2013:0942
    MD5: b6bbd4bf0aa6847013d8029a6f629e86
SHA-256: 6fd4b13cdecf0916f9f2cead8f9087778d4540fefb279cf8f23b2bcaaf164f73
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
krb5-1.3.4-65.el4.src.rpm     MD5: 5cbdbe387ce1b6d0133c215c285e4dc5
SHA-256: adfcf759a909976fcb544f634349869e2ea59a5a963f18dd87d4bbec491473d7
 
IA-32:
krb5-devel-1.3.4-65.el4.i386.rpm     MD5: f81baa7108d3ec1e3594556fe468cff4
SHA-256: 2e4bef57620d0112bf8609b8304aafba3c2dc19e8078f1e9c6e7bb77dbe6e0f9
krb5-libs-1.3.4-65.el4.i386.rpm     MD5: 3b82fd49b0f0504058f05a7e438d4dbf
SHA-256: b9f91269241ae22fc778b1289a1a0cf59017570b652f548b97914207a760821e
krb5-server-1.3.4-65.el4.i386.rpm     MD5: 9d35c0d19130c347300684e150cc95bc
SHA-256: b4ef67ab5509bef953c64fe4af22f75eefbb04cfb879e8f5c943953fe14a9d3a
krb5-workstation-1.3.4-65.el4.i386.rpm     MD5: fc23fc1791ee0af186e0ea735b11a978
SHA-256: 3e65905be0d1fb96a820752ed049e0e33b9b44fef13f80530b4bfaeaf2754222
 
IA-64:
krb5-devel-1.3.4-65.el4.ia64.rpm     MD5: 4b4bbf16c41fe4363db581310b70274e
SHA-256: ece824a7eb81593fe44f56ae2d3d5131ecc28f3fe50b982ebcc4a3290197fb01
krb5-libs-1.3.4-65.el4.i386.rpm     MD5: 3b82fd49b0f0504058f05a7e438d4dbf
SHA-256: b9f91269241ae22fc778b1289a1a0cf59017570b652f548b97914207a760821e
krb5-libs-1.3.4-65.el4.ia64.rpm     MD5: 0026c32a2983029fcec4128737dfd8aa
SHA-256: a78dab33b2ff507f18aa2bd3234aba64d3b4b512f2175b74b86fb2873a8f2419
krb5-server-1.3.4-65.el4.ia64.rpm     MD5: c0b43c4d882b2ad1dec3ebf9021dfe50
SHA-256: 1ad463ee88749084a07e76bb8ef2b52de1947afdbbc34fbd80f761f80a5e3606
krb5-workstation-1.3.4-65.el4.ia64.rpm     MD5: a5fbb61dfecc7159ebb8ea1613ae2a3f
SHA-256: 75bf61dee6cf1c1f18e231d5a2664c9f0a186d1a550d9285415a08723e25e563
 
PPC:
krb5-devel-1.3.4-65.el4.ppc.rpm     MD5: 6b756c92c0ca65bfb4e7f9a998cdc650
SHA-256: 4a1aaec5d2d63dad997fc9034d2fc0b86381f6011e4abc058f1bc4673bcdd013
krb5-libs-1.3.4-65.el4.ppc.rpm     MD5: 359704bf38ba4e16bd862613860384cd
SHA-256: 745274202d1fd9f63d0ad5c7f3ccc64cb49e93c5b2e4570b83c3b1c5991619b0
krb5-libs-1.3.4-65.el4.ppc64.rpm     MD5: bf26e6587953110f50783c481091d8ba
SHA-256: 2592d37f40098e3e0fd07460b7c4518aca64ed90c569ff237502d758a15ab7f0
krb5-server-1.3.4-65.el4.ppc.rpm     MD5: 00f31a7c9045d4e43a347c2b566cbbe6
SHA-256: 99d12bd061aa4accc31f5abefe15cc4c70daa54a3c49b57d1a6a9a63e822db92
krb5-workstation-1.3.4-65.el4.ppc.rpm     MD5: 45eac5eb94033eaac691bd84fb2db256
SHA-256: 333a816061b57e0839d6a3a252ff3139c8980d9a49266c7fef3d9c33f50e2411
 
s390:
krb5-devel-1.3.4-65.el4.s390.rpm     MD5: 81182b567d1380902984b989e6e107d5
SHA-256: da4d009f4f1705e551070ec5a72f3f518817b2b9bf9a6d8689ce0dde23d62b02
krb5-libs-1.3.4-65.el4.s390.rpm     MD5: 7a696cd18e658681e42317b2ad4f0106
SHA-256: a0ba5223d9d1ed2592c06ff22693487caf6c97592070d96825fc79c7bd0f8158
krb5-server-1.3.4-65.el4.s390.rpm     MD5: 297a1259586753c4f49a6f13986d9d86
SHA-256: 3ab33a6618f1b32e803836463cad1ececf068e84be1f32f4eba16db8b11af305
krb5-workstation-1.3.4-65.el4.s390.rpm     MD5: 41f9e8cb6e1d8cbfa25649be5a85d243
SHA-256: 25bdc252a51729ef51585fd1861e9ffbbb8274b57a9d64abc5f22c0065d7b433
 
s390x:
krb5-devel-1.3.4-65.el4.s390x.rpm     MD5: 7d4cfed9666aeb0823615409579c5fa6
SHA-256: 4681bd7c0e8ed6ca8afe385bfae6b813dbb332502b40b75063d90dfcca5b1ba5
krb5-libs-1.3.4-65.el4.s390.rpm     MD5: 7a696cd18e658681e42317b2ad4f0106
SHA-256: a0ba5223d9d1ed2592c06ff22693487caf6c97592070d96825fc79c7bd0f8158
krb5-libs-1.3.4-65.el4.s390x.rpm     MD5: 796471e5d683236c2dc51d34b3fc3ccf
SHA-256: ea4958f4895e8c34660434f93a4c01008789ee27faf1593bd4fe542b165728a1
krb5-server-1.3.4-65.el4.s390x.rpm     MD5: 5f5e77cf3755705c4cb441b2a7b05de3
SHA-256: 13416a5b1a0ec5cbef6eca41f4e53291842cdcfb12ee08e5e44477a5bcec0292
krb5-workstation-1.3.4-65.el4.s390x.rpm     MD5: 8e0bf142f7e4f8526129b82a915e4886
SHA-256: e7645273778e1ce356f017d412701ca749352c4aca63dd0bf9f831b751f7eb04
 
x86_64:
krb5-devel-1.3.4-65.el4.x86_64.rpm     MD5: 6bae3946c7e8849937f515bbd4acabda
SHA-256: 334eed25741af9268112d4c861f3e3ed9bedc677bb4999cf15dff161d2649f73
krb5-libs-1.3.4-65.el4.i386.rpm     MD5: 3b82fd49b0f0504058f05a7e438d4dbf
SHA-256: b9f91269241ae22fc778b1289a1a0cf59017570b652f548b97914207a760821e
krb5-libs-1.3.4-65.el4.x86_64.rpm     MD5: 87c3c49f382916ff32c181d67084d9c3
SHA-256: 8b827ca6dd66d96b0f8f066d5d78ad2da636a00a84ba0143f397755babc79b05
krb5-server-1.3.4-65.el4.x86_64.rpm     MD5: a75ebecda5f2fc0cc018dfb3deb0aa20
SHA-256: 4528d57158b7a08674cf0a9bfd8d706a7b56ee27cc4dee9226651fc3dbfac124
krb5-workstation-1.3.4-65.el4.x86_64.rpm     MD5: d0fdad42d541e216968856930bda6dd8
SHA-256: 6a24251013ed7933da2e437e81781ae12d840f2451a7fe63bc9475b45f6ebea2
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
krb5-1.6.1-63.el5_7.src.rpm
File outdated by:  RHSA-2013:0942
    MD5: c12a4950465227dac588166fd2c9a7c6
SHA-256: 8485471ce96f33bd887a7d313e364b70a71bd7b659786c0ed4d5fb5a5a1cfd85
 
IA-32:
krb5-libs-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: 0bed8f896fff11b94f3efc661190b3de
SHA-256: 31f7bbb60a5beb73f1704543aba2211ecb5893ada41a6b6037d73f5d5220b467
krb5-workstation-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: e38d17cce6ce459ab90b4a3dad0892a3
SHA-256: 73ee00350c8d4b7947546f1d7c6956efeb3f8ef3a64a121641b51f984c4e4a77
 
x86_64:
krb5-libs-1.6.1-63.el5_7.i386.rpm
File outdated by:  RHSA-2013:0942
    MD5: 0bed8f896fff11b94f3efc661190b3de
SHA-256: 31f7bbb60a5beb73f1704543aba2211ecb5893ada41a6b6037d73f5d5220b467
krb5-libs-1.6.1-63.el5_7.x86_64.rpm
File outdated by:  RHSA-2013:0942
    MD5: 0fecb4965429c3b5fa5212c9fa5f774f
SHA-256: 74fdde6cfe5587a7946993a1f617bd2715c3093132e6d60085e68c205d1935fd
krb5-workstation-1.6.1-63.el5_7.x86_64.rpm
File outdated by:  RHSA-2013:0942
    MD5: b6bbd4bf0aa6847013d8029a6f629e86
SHA-256: 6fd4b13cdecf0916f9f2cead8f9087778d4540fefb279cf8f23b2bcaaf164f73
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
krb5-1.3.4-65.el4.src.rpm     MD5: 5cbdbe387ce1b6d0133c215c285e4dc5
SHA-256: adfcf759a909976fcb544f634349869e2ea59a5a963f18dd87d4bbec491473d7
 
IA-32:
krb5-devel-1.3.4-65.el4.i386.rpm     MD5: f81baa7108d3ec1e3594556fe468cff4
SHA-256: 2e4bef57620d0112bf8609b8304aafba3c2dc19e8078f1e9c6e7bb77dbe6e0f9
krb5-libs-1.3.4-65.el4.i386.rpm     MD5: 3b82fd49b0f0504058f05a7e438d4dbf
SHA-256: b9f91269241ae22fc778b1289a1a0cf59017570b652f548b97914207a760821e
krb5-server-1.3.4-65.el4.i386.rpm     MD5: 9d35c0d19130c347300684e150cc95bc
SHA-256: b4ef67ab5509bef953c64fe4af22f75eefbb04cfb879e8f5c943953fe14a9d3a
krb5-workstation-1.3.4-65.el4.i386.rpm     MD5: fc23fc1791ee0af186e0ea735b11a978
SHA-256: 3e65905be0d1fb96a820752ed049e0e33b9b44fef13f80530b4bfaeaf2754222
 
IA-64:
krb5-devel-1.3.4-65.el4.ia64.rpm     MD5: 4b4bbf16c41fe4363db581310b70274e
SHA-256: ece824a7eb81593fe44f56ae2d3d5131ecc28f3fe50b982ebcc4a3290197fb01
krb5-libs-1.3.4-65.el4.i386.rpm     MD5: 3b82fd49b0f0504058f05a7e438d4dbf
SHA-256: b9f91269241ae22fc778b1289a1a0cf59017570b652f548b97914207a760821e
krb5-libs-1.3.4-65.el4.ia64.rpm     MD5: 0026c32a2983029fcec4128737dfd8aa
SHA-256: a78dab33b2ff507f18aa2bd3234aba64d3b4b512f2175b74b86fb2873a8f2419
krb5-server-1.3.4-65.el4.ia64.rpm     MD5: c0b43c4d882b2ad1dec3ebf9021dfe50
SHA-256: 1ad463ee88749084a07e76bb8ef2b52de1947afdbbc34fbd80f761f80a5e3606
krb5-workstation-1.3.4-65.el4.ia64.rpm     MD5: a5fbb61dfecc7159ebb8ea1613ae2a3f
SHA-256: 75bf61dee6cf1c1f18e231d5a2664c9f0a186d1a550d9285415a08723e25e563
 
x86_64:
krb5-devel-1.3.4-65.el4.x86_64.rpm     MD5: 6bae3946c7e8849937f515bbd4acabda
SHA-256: 334eed25741af9268112d4c861f3e3ed9bedc677bb4999cf15dff161d2649f73
krb5-libs-1.3.4-65.el4.i386.rpm     MD5: 3b82fd49b0f0504058f05a7e438d4dbf
SHA-256: b9f91269241ae22fc778b1289a1a0cf59017570b652f548b97914207a760821e
krb5-libs-1.3.4-65.el4.x86_64.rpm     MD5: 87c3c49f382916ff32c181d67084d9c3
SHA-256: 8b827ca6dd66d96b0f8f066d5d78ad2da636a00a84ba0143f397755babc79b05
krb5-server-1.3.4-65.el4.x86_64.rpm     MD5: a75ebecda5f2fc0cc018dfb3deb0aa20
SHA-256: 4528d57158b7a08674cf0a9bfd8d706a7b56ee27cc4dee9226651fc3dbfac124
krb5-workstation-1.3.4-65.el4.x86_64.rpm     MD5: d0fdad42d541e216968856930bda6dd8
SHA-256: 6a24251013ed7933da2e437e81781ae12d840f2451a7fe63bc9475b45f6ebea2
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
krb5-1.3.4-65.el4.src.rpm     MD5: 5cbdbe387ce1b6d0133c215c285e4dc5
SHA-256: adfcf759a909976fcb544f634349869e2ea59a5a963f18dd87d4bbec491473d7
 
IA-32:
krb5-devel-1.3.4-65.el4.i386.rpm     MD5: f81baa7108d3ec1e3594556fe468cff4
SHA-256: 2e4bef57620d0112bf8609b8304aafba3c2dc19e8078f1e9c6e7bb77dbe6e0f9
krb5-libs-1.3.4-65.el4.i386.rpm     MD5: 3b82fd49b0f0504058f05a7e438d4dbf
SHA-256: b9f91269241ae22fc778b1289a1a0cf59017570b652f548b97914207a760821e
krb5-server-1.3.4-65.el4.i386.rpm     MD5: 9d35c0d19130c347300684e150cc95bc
SHA-256: b4ef67ab5509bef953c64fe4af22f75eefbb04cfb879e8f5c943953fe14a9d3a
krb5-workstation-1.3.4-65.el4.i386.rpm     MD5: fc23fc1791ee0af186e0ea735b11a978
SHA-256: 3e65905be0d1fb96a820752ed049e0e33b9b44fef13f80530b4bfaeaf2754222
 
IA-64:
krb5-devel-1.3.4-65.el4.ia64.rpm     MD5: 4b4bbf16c41fe4363db581310b70274e
SHA-256: ece824a7eb81593fe44f56ae2d3d5131ecc28f3fe50b982ebcc4a3290197fb01
krb5-libs-1.3.4-65.el4.i386.rpm     MD5: 3b82fd49b0f0504058f05a7e438d4dbf
SHA-256: b9f91269241ae22fc778b1289a1a0cf59017570b652f548b97914207a760821e
krb5-libs-1.3.4-65.el4.ia64.rpm     MD5: 0026c32a2983029fcec4128737dfd8aa
SHA-256: a78dab33b2ff507f18aa2bd3234aba64d3b4b512f2175b74b86fb2873a8f2419
krb5-server-1.3.4-65.el4.ia64.rpm     MD5: c0b43c4d882b2ad1dec3ebf9021dfe50
SHA-256: 1ad463ee88749084a07e76bb8ef2b52de1947afdbbc34fbd80f761f80a5e3606
krb5-workstation-1.3.4-65.el4.ia64.rpm     MD5: a5fbb61dfecc7159ebb8ea1613ae2a3f
SHA-256: 75bf61dee6cf1c1f18e231d5a2664c9f0a186d1a550d9285415a08723e25e563
 
x86_64:
krb5-devel-1.3.4-65.el4.x86_64.rpm     MD5: 6bae3946c7e8849937f515bbd4acabda
SHA-256: 334eed25741af9268112d4c861f3e3ed9bedc677bb4999cf15dff161d2649f73
krb5-libs-1.3.4-65.el4.i386.rpm     MD5: 3b82fd49b0f0504058f05a7e438d4dbf
SHA-256: b9f91269241ae22fc778b1289a1a0cf59017570b652f548b97914207a760821e
krb5-libs-1.3.4-65.el4.x86_64.rpm     MD5: 87c3c49f382916ff32c181d67084d9c3
SHA-256: 8b827ca6dd66d96b0f8f066d5d78ad2da636a00a84ba0143f397755babc79b05
krb5-server-1.3.4-65.el4.x86_64.rpm     MD5: a75ebecda5f2fc0cc018dfb3deb0aa20
SHA-256: 4528d57158b7a08674cf0a9bfd8d706a7b56ee27cc4dee9226651fc3dbfac124
krb5-workstation-1.3.4-65.el4.x86_64.rpm     MD5: d0fdad42d541e216968856930bda6dd8
SHA-256: 6a24251013ed7933da2e437e81781ae12d840f2451a7fe63bc9475b45f6ebea2
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

770325 - CVE-2011-4862 krb5-appl: remote buffer overflow in kerberised telnet daemon


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/