Skip to navigation

Bug Fix Advisory krb5-appl bug fix update

Advisory: RHBA-2012:0550-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-05-09
Last updated on: 2012-05-09
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated krb5-appl packages that fix one bug are now available for Red Hat
Enterprise Linux 6.

The krb5-appl packages contain Kerberos-aware versions of telnet, ftp, rsh, and
rlogin clients and servers. Kerberos is a network authentication system which
allows clients and servers to authenticate to each other using symmetric
encryption and trusted third-party, the Key Distribution Center (KDC).

This update fixes the following bug:

* When executing either the "mdir" or "mls" command, the FTP client stores
results returned by the server in a specified local file. Previously, when
opening the file, the client did not ensure that the mode value it passed to the
fopen() function was properly null-terminated. This could cause unpredictable
failures. This update ensures that the value is properly null-terminated so that
the failures no longer occur in this scenario. (BZ#816689)

All users of krb5-appl are advised to upgrade to these updated packages, which
fix this bug.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
krb5-appl-1.0.1-7.el6_2.1.src.rpm     MD5: 266e03fabdf652f25e93e6df93adc366
SHA-256: 418079aa56762f3322d0512115a93c9d9c98c65642f4c18e9211f68bbcebed69
 
IA-32:
krb5-appl-clients-1.0.1-7.el6_2.1.i686.rpm     MD5: a86ba65bf1667fa45c23bb36853fdd63
SHA-256: 4ed1fdf94af6ed907870d6ec6458da3ae5b45ae3e01de3b29771f2de74da59db
krb5-appl-debuginfo-1.0.1-7.el6_2.1.i686.rpm     MD5: 0ae46de530dc000618ebdfe8736b7595
SHA-256: 1939042893eee0c1ca9cc6f78c97f9281eff6dfd829a3cb8cdab2338ed3a3313
krb5-appl-servers-1.0.1-7.el6_2.1.i686.rpm     MD5: 588619703446e57b56e28a7c5b756f93
SHA-256: 1e42e32b6d100cacbba2b39a62aa69ba150f62503581d91781dccc557a4e5635
 
x86_64:
krb5-appl-clients-1.0.1-7.el6_2.1.x86_64.rpm     MD5: f9ba5bf2a9e7843032faf253424ad1f7
SHA-256: f132ee9abc1a1dc794e736f411e18e23ff7db3689cdc019d468bff2c95ec423f
krb5-appl-debuginfo-1.0.1-7.el6_2.1.x86_64.rpm     MD5: b52f52d438e96e2229b8072e2d813ca3
SHA-256: a38269e38895bd304875467db667b218e63ae3288831aff6c61dd02275954b8d
krb5-appl-servers-1.0.1-7.el6_2.1.x86_64.rpm     MD5: 9769b5160170ec4247154197d93e09c5
SHA-256: e6f05b65a4eda8fd0e8be93b71fbf3ed002b5b05fdc00e8652988fce223330e5
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
krb5-appl-1.0.1-7.el6_2.1.src.rpm     MD5: 266e03fabdf652f25e93e6df93adc366
SHA-256: 418079aa56762f3322d0512115a93c9d9c98c65642f4c18e9211f68bbcebed69
 
x86_64:
krb5-appl-clients-1.0.1-7.el6_2.1.x86_64.rpm     MD5: f9ba5bf2a9e7843032faf253424ad1f7
SHA-256: f132ee9abc1a1dc794e736f411e18e23ff7db3689cdc019d468bff2c95ec423f
krb5-appl-debuginfo-1.0.1-7.el6_2.1.x86_64.rpm     MD5: b52f52d438e96e2229b8072e2d813ca3
SHA-256: a38269e38895bd304875467db667b218e63ae3288831aff6c61dd02275954b8d
krb5-appl-servers-1.0.1-7.el6_2.1.x86_64.rpm     MD5: 9769b5160170ec4247154197d93e09c5
SHA-256: e6f05b65a4eda8fd0e8be93b71fbf3ed002b5b05fdc00e8652988fce223330e5
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
krb5-appl-1.0.1-7.el6_2.1.src.rpm     MD5: 266e03fabdf652f25e93e6df93adc366
SHA-256: 418079aa56762f3322d0512115a93c9d9c98c65642f4c18e9211f68bbcebed69
 
IA-32:
krb5-appl-clients-1.0.1-7.el6_2.1.i686.rpm     MD5: a86ba65bf1667fa45c23bb36853fdd63
SHA-256: 4ed1fdf94af6ed907870d6ec6458da3ae5b45ae3e01de3b29771f2de74da59db
krb5-appl-debuginfo-1.0.1-7.el6_2.1.i686.rpm     MD5: 0ae46de530dc000618ebdfe8736b7595
SHA-256: 1939042893eee0c1ca9cc6f78c97f9281eff6dfd829a3cb8cdab2338ed3a3313
krb5-appl-servers-1.0.1-7.el6_2.1.i686.rpm     MD5: 588619703446e57b56e28a7c5b756f93
SHA-256: 1e42e32b6d100cacbba2b39a62aa69ba150f62503581d91781dccc557a4e5635
 
PPC:
krb5-appl-clients-1.0.1-7.el6_2.1.ppc64.rpm     MD5: 866de7ac1d12c3344acd1fc9c4451072
SHA-256: e3382a3cca4e7a967a0aaa4b750ddd81a02cf9eea6b187f2d0a1746f5765b514
krb5-appl-debuginfo-1.0.1-7.el6_2.1.ppc64.rpm     MD5: e04f5b33497a588b9d31e39db3fa7326
SHA-256: f023f17db5b977ca28be11eca3144a4b1e76afbced037db286cdfbe0371e09d9
krb5-appl-servers-1.0.1-7.el6_2.1.ppc64.rpm     MD5: eb726e58d98038c80138e6a71aba990d
SHA-256: ed757f37f05779e4b9fa4270056687f2aceed6dbdbb374a239db9849a7ef8f00
 
s390x:
krb5-appl-clients-1.0.1-7.el6_2.1.s390x.rpm     MD5: 6ddb1639b815abf94dc138182d11cc1d
SHA-256: 1b5b66a21bd5ac8af0394a612e4cbae5846e7ba727fb46deb49fa9775df1f2c2
krb5-appl-debuginfo-1.0.1-7.el6_2.1.s390x.rpm     MD5: 5285eb3f5f318ade37daf32a11ec9e97
SHA-256: 3e49e5e6fc844813785eb9403e228bf5a5655aa82cbaf37a1fc744303cfdd8d3
krb5-appl-servers-1.0.1-7.el6_2.1.s390x.rpm     MD5: 6bb0890df85e931fc5b83f538112570c
SHA-256: 3680c7b165fcc1162b08d2859bdf090d6603dfccca7bd6d5d91a6fce1d811442
 
x86_64:
krb5-appl-clients-1.0.1-7.el6_2.1.x86_64.rpm     MD5: f9ba5bf2a9e7843032faf253424ad1f7
SHA-256: f132ee9abc1a1dc794e736f411e18e23ff7db3689cdc019d468bff2c95ec423f
krb5-appl-debuginfo-1.0.1-7.el6_2.1.x86_64.rpm     MD5: b52f52d438e96e2229b8072e2d813ca3
SHA-256: a38269e38895bd304875467db667b218e63ae3288831aff6c61dd02275954b8d
krb5-appl-servers-1.0.1-7.el6_2.1.x86_64.rpm     MD5: 9769b5160170ec4247154197d93e09c5
SHA-256: e6f05b65a4eda8fd0e8be93b71fbf3ed002b5b05fdc00e8652988fce223330e5
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
krb5-appl-1.0.1-7.el6_2.1.src.rpm     MD5: 266e03fabdf652f25e93e6df93adc366
SHA-256: 418079aa56762f3322d0512115a93c9d9c98c65642f4c18e9211f68bbcebed69
 
x86_64:
krb5-appl-clients-1.0.1-7.el6_2.1.x86_64.rpm     MD5: f9ba5bf2a9e7843032faf253424ad1f7
SHA-256: f132ee9abc1a1dc794e736f411e18e23ff7db3689cdc019d468bff2c95ec423f
krb5-appl-debuginfo-1.0.1-7.el6_2.1.x86_64.rpm     MD5: b52f52d438e96e2229b8072e2d813ca3
SHA-256: a38269e38895bd304875467db667b218e63ae3288831aff6c61dd02275954b8d
krb5-appl-servers-1.0.1-7.el6_2.1.x86_64.rpm     MD5: 9769b5160170ec4247154197d93e09c5
SHA-256: e6f05b65a4eda8fd0e8be93b71fbf3ed002b5b05fdc00e8652988fce223330e5
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
krb5-appl-1.0.1-7.el6_2.1.src.rpm     MD5: 266e03fabdf652f25e93e6df93adc366
SHA-256: 418079aa56762f3322d0512115a93c9d9c98c65642f4c18e9211f68bbcebed69
 
IA-32:
krb5-appl-clients-1.0.1-7.el6_2.1.i686.rpm     MD5: a86ba65bf1667fa45c23bb36853fdd63
SHA-256: 4ed1fdf94af6ed907870d6ec6458da3ae5b45ae3e01de3b29771f2de74da59db
krb5-appl-debuginfo-1.0.1-7.el6_2.1.i686.rpm     MD5: 0ae46de530dc000618ebdfe8736b7595
SHA-256: 1939042893eee0c1ca9cc6f78c97f9281eff6dfd829a3cb8cdab2338ed3a3313
krb5-appl-servers-1.0.1-7.el6_2.1.i686.rpm     MD5: 588619703446e57b56e28a7c5b756f93
SHA-256: 1e42e32b6d100cacbba2b39a62aa69ba150f62503581d91781dccc557a4e5635
 
PPC:
krb5-appl-clients-1.0.1-7.el6_2.1.ppc64.rpm     MD5: 866de7ac1d12c3344acd1fc9c4451072
SHA-256: e3382a3cca4e7a967a0aaa4b750ddd81a02cf9eea6b187f2d0a1746f5765b514
krb5-appl-debuginfo-1.0.1-7.el6_2.1.ppc64.rpm     MD5: e04f5b33497a588b9d31e39db3fa7326
SHA-256: f023f17db5b977ca28be11eca3144a4b1e76afbced037db286cdfbe0371e09d9
krb5-appl-servers-1.0.1-7.el6_2.1.ppc64.rpm     MD5: eb726e58d98038c80138e6a71aba990d
SHA-256: ed757f37f05779e4b9fa4270056687f2aceed6dbdbb374a239db9849a7ef8f00
 
s390x:
krb5-appl-clients-1.0.1-7.el6_2.1.s390x.rpm     MD5: 6ddb1639b815abf94dc138182d11cc1d
SHA-256: 1b5b66a21bd5ac8af0394a612e4cbae5846e7ba727fb46deb49fa9775df1f2c2
krb5-appl-debuginfo-1.0.1-7.el6_2.1.s390x.rpm     MD5: 5285eb3f5f318ade37daf32a11ec9e97
SHA-256: 3e49e5e6fc844813785eb9403e228bf5a5655aa82cbaf37a1fc744303cfdd8d3
krb5-appl-servers-1.0.1-7.el6_2.1.s390x.rpm     MD5: 6bb0890df85e931fc5b83f538112570c
SHA-256: 3680c7b165fcc1162b08d2859bdf090d6603dfccca7bd6d5d91a6fce1d811442
 
x86_64:
krb5-appl-clients-1.0.1-7.el6_2.1.x86_64.rpm     MD5: f9ba5bf2a9e7843032faf253424ad1f7
SHA-256: f132ee9abc1a1dc794e736f411e18e23ff7db3689cdc019d468bff2c95ec423f
krb5-appl-debuginfo-1.0.1-7.el6_2.1.x86_64.rpm     MD5: b52f52d438e96e2229b8072e2d813ca3
SHA-256: a38269e38895bd304875467db667b218e63ae3288831aff6c61dd02275954b8d
krb5-appl-servers-1.0.1-7.el6_2.1.x86_64.rpm     MD5: 9769b5160170ec4247154197d93e09c5
SHA-256: e6f05b65a4eda8fd0e8be93b71fbf3ed002b5b05fdc00e8652988fce223330e5
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
krb5-appl-1.0.1-7.el6_2.1.src.rpm     MD5: 266e03fabdf652f25e93e6df93adc366
SHA-256: 418079aa56762f3322d0512115a93c9d9c98c65642f4c18e9211f68bbcebed69
 
IA-32:
krb5-appl-clients-1.0.1-7.el6_2.1.i686.rpm     MD5: a86ba65bf1667fa45c23bb36853fdd63
SHA-256: 4ed1fdf94af6ed907870d6ec6458da3ae5b45ae3e01de3b29771f2de74da59db
krb5-appl-debuginfo-1.0.1-7.el6_2.1.i686.rpm     MD5: 0ae46de530dc000618ebdfe8736b7595
SHA-256: 1939042893eee0c1ca9cc6f78c97f9281eff6dfd829a3cb8cdab2338ed3a3313
krb5-appl-servers-1.0.1-7.el6_2.1.i686.rpm     MD5: 588619703446e57b56e28a7c5b756f93
SHA-256: 1e42e32b6d100cacbba2b39a62aa69ba150f62503581d91781dccc557a4e5635
 
x86_64:
krb5-appl-clients-1.0.1-7.el6_2.1.x86_64.rpm     MD5: f9ba5bf2a9e7843032faf253424ad1f7
SHA-256: f132ee9abc1a1dc794e736f411e18e23ff7db3689cdc019d468bff2c95ec423f
krb5-appl-debuginfo-1.0.1-7.el6_2.1.x86_64.rpm     MD5: b52f52d438e96e2229b8072e2d813ca3
SHA-256: a38269e38895bd304875467db667b218e63ae3288831aff6c61dd02275954b8d
krb5-appl-servers-1.0.1-7.el6_2.1.x86_64.rpm     MD5: 9769b5160170ec4247154197d93e09c5
SHA-256: e6f05b65a4eda8fd0e8be93b71fbf3ed002b5b05fdc00e8652988fce223330e5
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/