Synopsis: Important: krb5 security update
Issue date: 2010-11-10
CVE Names: CVE-2010-1322
An uninitialized pointer use flaw was found in the way the MIT Kerberos
KDC handled TGS (Ticket-granting Server) request messages. A remote,
authenticated attacker could use this flaw to crash the KDC or,
possibly, disclose KDC memory or execute arbitrary code with the
privileges of the KDC (krb5kdc). (CVE-2010-1322)
After installing the updated packages, the krb5kdc daemon will be
restarted automatically.
SL 6.x
SRPMS:
krb5-1.8.2-3.el6_0.1.src.rpm
i386:
krb5-devel-1.8.2-3.el6_0.1.i686.rpm
krb5-libs-1.8.2-3.el6_0.1.i686.rpm
krb5-pkinit-openssl-1.8.2-3.el6_0.1.i686.rpm
krb5-server-1.8.2-3.el6_0.1.i686.rpm
krb5-server-ldap-1.8.2-3.el6_0.1.i686.rpm
krb5-workstation-1.8.2-3.el6_0.1.i686.rpm
x86_64:
krb5-devel-1.8.2-3.el6_0.1.i686.rpm
krb5-devel-1.8.2-3.el6_0.1.x86_64.rpm
krb5-libs-1.8.2-3.el6_0.1.i686.rpm
krb5-libs-1.8.2-3.el6_0.1.x86_64.rpm
krb5-pkinit-openssl-1.8.2-3.el6_0.1.x86_64.rpm
krb5-server-1.8.2-3.el6_0.1.x86_64.rpm
krb5-server-ldap-1.8.2-3.el6_0.1.i686.rpm
krb5-server-ldap-1.8.2-3.el6_0.1.x86_64.rpm
krb5-workstation-1.8.2-3.el6_0.1.x86_64.rpm
-Connie Sieh
-Troy Dawson