Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

kerberos5-1.3.6-8tr RPM for i586

From Trustix 2.2 for i586

Name: kerberos5 Distribution: Trustix Secure Linux
Version: 1.3.6 Vendor: Comodo Trustix
Release: 8tr Build date: Fri Jun 29 07:26:00 2007
Group: Trustix Official Build host: ttrmgtnived.comodo.net
Size: 1312701 Source RPM: kerberos5-1.3.6-8tr.src.rpm
Packager: Comodo Trustix <http://www.trustix.com>
Url: http://web.mit.edu/kerberos
Summary: Kerberos is a network authentication protocol.
(MIT) Kerberos is a network authentication protocol. It is designed to
provide strong authentication for client/server applications by using
secret-key cryptography.  A free implementation of this protocol is
available from the Massachusetts Institute of Technology. Kerberos is
available in many commercial products as well.

Provides

Requires

License

Distributable

Changelog

* Fri Jun 29 2007 Nived Gopalan <nived at trustix dot org> 1.3.6-8tr
  - SECURITY Fix: Some vulnerabilities have been reported in Kerberos,
    which can be exploited by malicious users to compromise a vulnerable
    system.
  - An error exists within the "gssrpc__svcauth_gssapi" function in the
    RPC library, which can cause kadmind and possibly other third-party
    products to free an uninitialised pointer when receiving an RPC
    credential with a length of zero.
  - A signedness error exists within the "gssrpc__svcauth_unix()" function
    in the RPC library, which is used by kadmind and possibly other
    third-party products. This can be exploited to cause a stack-based
    buffer overflow.
  - Fixes stack-based buffer overflow error in kadmind within the
    rename_principal_2_svc function which could allow remote authenticated
    users to execute arbitrary code via a crafted request to rename a
    principal.
  
    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the names CVE-2007-2442, CVE-2007-2443 and CVE-2007-2798
    to these issues.
* Thu Apr 05 2007 Nived Gopalan <nived at trustix dot org> 1.3.6-7tr
  - SECURITY Fix: Some vulnerabilities have been reported in Kerberos,
    which can be exploited by malicious users to cause a DoS or
    compromise a vulnerable system.
  - An error exists in the MIT krb5 telnet daemon when processing the
    username. This can be exploited to log in as an arbitrary user by
    providing a specially crafted username beginning with "-e".
  - A boundary error exists in the "krb5_klog_syslog()" function within
    the kadm5 library, which is used by KDC, kadmind and probably other
    third party products. This can be exploited to cause a stack-based
    buffer overflow via an overly long string.
  - A double-free error exists in the "kg_unseal_v1()" function within
    the MIT krb5 GSS-API library, which can potentially be exploited to
    execute arbitrary code, but requires valid credentials.
  
    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the names CVE-2007-0956, CVE-2007-0957 and CVE-2007-1216
    to these issues.
* Mon Jan 30 2006 Nived Gopalan <nived at trustix dot org> 1.3.6-6tr
  - Added Requires libcom_err-devel for devel package, Bug #1590.
* Wed Jul 13 2005 Thushara Gopalakrishnan <thushara at comodo dot com> 1.3.6-5tr
  - Security Fix: Fix for CAN-2005-1689. The krb5_recvauth() function can
    free previously freed memory under some error conditions.  This vulnerability
    may allow an unauthenticated remote attacker to execute arbitrary code.
  
  - Fix for CAN-2005-1175,In KDC implementation results in single-byte overflow 
    of a heap buffer
  
  - Fix for CAN-2005-1174,that affects the KDC implementation in all MIT krb5
    releases supporting TCP client connections to the KDC.
* Thu Jun 30 2005 Hasher Jamaludeen <hasher at comodo dot com> 1.3.6-4tr
  - Security Fix: Fix for CAN-2004-0175 to krb5 rcp based on Markus Friedl's
    fix for OpenSSH scp.
* Wed Jun 08 2005 Syed Shabir Zakiullah <syedshabir at comodo dot com> 1.3.6-3tr
  - Security Fix: Buffer overflows in telnet client
  - The telnet client program supplied with MIT Kerberos 5 has buffer
    overflows in the functions slc_add_reply() and env_opt_add(), which
    may lead to remote code execution.
    
    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CAN-2005-0469 and CAN-2005-0468 to this issue.
* Tue Dec 21 2004 Erlend Midttun <erlendbm at trustix dot org> 1.3.6-2tr
  - New upstream.
* Mon Nov 01 2004 Oystein Viggen <oysteivi at trustix dot com> 1.3.5-2tr
  - Patch tempfile issue
* Fri Sep 24 2004 Syed Shabir <syedshabir at comodo dot com> 1.3.5-1tr
  - New upstream with updated security bugs
* Wed Sep 01 2004 Oystein Viggen <oysteivi at trustix dot com> 1.3.4-2tr
  - Patch security bugs
* Thu Jun 17 2004 Chr. Toldnes <christht at trustix dot org> 1.3.4-1tr
  - New upstream version: 1.3.4
* Wed Jun 02 2004 Chr. Toldnes <christht at trustix dot org> 1.3.3-1tr
  - New upstream version: 1.3.3
  - Added patch to fix buffer overflow.
* Wed Feb 11 2004 Tor Hveem <torh at trustix dot org> 1.3.1-4th
  - Fixed stupid error with file wildcards.
* Tue Feb 10 2004 Tor Hveem <torh at trustix dot org> 1.3.1-3th
  - New package libs.
* Mon Feb 09 2004 Chr. Toldnes <christht at trustix dot org> 1.3.1-2tr
  - Use system et (libcom_err)
* Mon Feb 09 2004 Chr. Toldnes <christht at trustix dot org> 1.3.1-1tr
  - Initial release for Trustix
  - built shared :)  with no stack protection :(

Files

/usr/bin/gss-client
/usr/bin/krb5-config
/usr/bin/krb524init
/usr/bin/krb5ftp
/usr/bin/krb5kdestroy
/usr/bin/krb5kinit
/usr/bin/krb5klist
/usr/bin/krb5kpasswd
/usr/bin/krb5ksu
/usr/bin/krb5kvno
/usr/bin/krb5rcp
/usr/bin/krb5rlogin
/usr/bin/krb5rsh
/usr/bin/krb5telnet
/usr/bin/krb5v4rcp
/usr/bin/krb5v5passwd
/usr/bin/sclient
/usr/bin/sim_client
/usr/bin/uuclient
/usr/sbin/gss-server
/usr/sbin/k5srvutil
/usr/sbin/kadmin
/usr/sbin/kadmin.local
/usr/sbin/kadmind
/usr/sbin/kadmind4
/usr/sbin/kdb5_util
/usr/sbin/krb5-send-pr
/usr/sbin/krb524d
/usr/sbin/krb5ftpd
/usr/sbin/krb5kdc
/usr/sbin/krb5klogind
/usr/sbin/krb5kprop
/usr/sbin/krb5kpropd
/usr/sbin/krb5kshd
/usr/sbin/krb5telnetd
/usr/sbin/krb5v5passwdd
/usr/sbin/ktutil
/usr/sbin/login.krb5
/usr/sbin/sim_server
/usr/sbin/sserver
/usr/sbin/uuserver
/usr/share/gnats
/usr/share/gnats/mit
/usr/share/man/man1/kerberos.1.gz
/usr/share/man/man1/krb5-send-pr.1.gz
/usr/share/man/man1/krb5ftp.1.gz
/usr/share/man/man1/krb5kdestroy.1.gz
/usr/share/man/man1/krb5kinit.1.gz
/usr/share/man/man1/krb5klist.1.gz
/usr/share/man/man1/krb5kpasswd.1.gz
/usr/share/man/man1/krb5ksu.1.gz
/usr/share/man/man1/krb5kvno.1.gz
/usr/share/man/man1/krb5rcp.1.gz
/usr/share/man/man1/krb5rlogin.1.gz
/usr/share/man/man1/krb5rsh.1.gz
/usr/share/man/man1/krb5telnet.1.gz
/usr/share/man/man1/krb5v4rcp.1.gz
/usr/share/man/man1/krb5v5passwd.1.gz
/usr/share/man/man1/sclient.1.gz
/usr/share/man/man1/tmac.doc.gz
/usr/share/man/man5/kdc.conf.5.gz
/usr/share/man/man5/krb5.conf.5.gz
/usr/share/man/man8/k5srvutil.8.gz
/usr/share/man/man8/kadmin.8.gz
/usr/share/man/man8/kadmin.local.8.gz
/usr/share/man/man8/kadmind.8.gz
/usr/share/man/man8/kdb5_util.8.gz
/usr/share/man/man8/krb5ftpd.8.gz
/usr/share/man/man8/krb5kdc.8.gz
/usr/share/man/man8/krb5klogind.8.gz
/usr/share/man/man8/krb5kprop.8.gz
/usr/share/man/man8/krb5kpropd.8.gz
/usr/share/man/man8/krb5kshd.8.gz
/usr/share/man/man8/krb5telnetd.8.gz
/usr/share/man/man8/ktutil.8.gz
/usr/share/man/man8/login.krb5.8.gz
/usr/share/man/man8/sserver.8.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Thu Apr 10 13:04:48 2014