Synopsis:	Important: krb5 security update
Issue date:	2011-03-16
CVE Names:	CVE-2011-0284

A double-free flaw was found in the way the MIT Kerberos KDC handled
initial authentication requests (AS-REQ), when the KDC was configured to
provide the PKINIT capability. A remote attacker could use this flaw to
cause the KDC daemon to abort by using a specially-crafted AS-REQ 
request. (CVE-2011-0284)

After installing the updated packages, the krb5kdc daemon will be 
restarted automatically.

SL 6.x

      SRPMS:
krb5-1.8.2-3.el6_0.6.src.rpm
      i386:
krb5-devel-1.8.2-3.el6_0.6.i686.rpm
krb5-libs-1.8.2-3.el6_0.6.i686.rpm
krb5-pkinit-openssl-1.8.2-3.el6_0.6.i686.rpm
krb5-server-1.8.2-3.el6_0.6.i686.rpm
krb5-server-ldap-1.8.2-3.el6_0.6.i686.rpm
krb5-workstation-1.8.2-3.el6_0.6.i686.rpm
      x86_64:
krb5-devel-1.8.2-3.el6_0.6.i686.rpm
krb5-devel-1.8.2-3.el6_0.6.x86_64.rpm
krb5-libs-1.8.2-3.el6_0.6.i686.rpm
krb5-libs-1.8.2-3.el6_0.6.x86_64.rpm
krb5-pkinit-openssl-1.8.2-3.el6_0.6.x86_64.rpm
krb5-server-1.8.2-3.el6_0.6.x86_64.rpm
krb5-server-ldap-1.8.2-3.el6_0.6.i686.rpm
krb5-server-ldap-1.8.2-3.el6_0.6.x86_64.rpm
krb5-workstation-1.8.2-3.el6_0.6.x86_64.rpm

-Connie Sieh
-Troy Dawson