Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

kerberos5-devel-1.3.6-8tr RPM for i586

From Trustix 2.2 for i586

Name: kerberos5-devel Distribution: Trustix Secure Linux
Version: 1.3.6 Vendor: Comodo Trustix
Release: 8tr Build date: Fri Jun 29 07:26:00 2007
Group: Trustix Official Build host: ttrmgtnived.comodo.net
Size: 1848696 Source RPM: kerberos5-1.3.6-8tr.src.rpm
Packager: Comodo Trustix <http://www.trustix.com>
Url: http://web.mit.edu/kerberos
Summary: Development libraries for kerberos 5

Provides

Requires

License

Distributable

Changelog

* Fri Jun 29 2007 Nived Gopalan <nived at trustix dot org> 1.3.6-8tr
  - SECURITY Fix: Some vulnerabilities have been reported in Kerberos,
    which can be exploited by malicious users to compromise a vulnerable
    system.
  - An error exists within the "gssrpc__svcauth_gssapi" function in the
    RPC library, which can cause kadmind and possibly other third-party
    products to free an uninitialised pointer when receiving an RPC
    credential with a length of zero.
  - A signedness error exists within the "gssrpc__svcauth_unix()" function
    in the RPC library, which is used by kadmind and possibly other
    third-party products. This can be exploited to cause a stack-based
    buffer overflow.
  - Fixes stack-based buffer overflow error in kadmind within the
    rename_principal_2_svc function which could allow remote authenticated
    users to execute arbitrary code via a crafted request to rename a
    principal.
  
    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the names CVE-2007-2442, CVE-2007-2443 and CVE-2007-2798
    to these issues.
* Thu Apr 05 2007 Nived Gopalan <nived at trustix dot org> 1.3.6-7tr
  - SECURITY Fix: Some vulnerabilities have been reported in Kerberos,
    which can be exploited by malicious users to cause a DoS or
    compromise a vulnerable system.
  - An error exists in the MIT krb5 telnet daemon when processing the
    username. This can be exploited to log in as an arbitrary user by
    providing a specially crafted username beginning with "-e".
  - A boundary error exists in the "krb5_klog_syslog()" function within
    the kadm5 library, which is used by KDC, kadmind and probably other
    third party products. This can be exploited to cause a stack-based
    buffer overflow via an overly long string.
  - A double-free error exists in the "kg_unseal_v1()" function within
    the MIT krb5 GSS-API library, which can potentially be exploited to
    execute arbitrary code, but requires valid credentials.
  
    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the names CVE-2007-0956, CVE-2007-0957 and CVE-2007-1216
    to these issues.
* Mon Jan 30 2006 Nived Gopalan <nived at trustix dot org> 1.3.6-6tr
  - Added Requires libcom_err-devel for devel package, Bug #1590.
* Wed Jul 13 2005 Thushara Gopalakrishnan <thushara at comodo dot com> 1.3.6-5tr
  - Security Fix: Fix for CAN-2005-1689. The krb5_recvauth() function can
    free previously freed memory under some error conditions.  This vulnerability
    may allow an unauthenticated remote attacker to execute arbitrary code.
  
  - Fix for CAN-2005-1175,In KDC implementation results in single-byte overflow 
    of a heap buffer
  
  - Fix for CAN-2005-1174,that affects the KDC implementation in all MIT krb5
    releases supporting TCP client connections to the KDC.
* Thu Jun 30 2005 Hasher Jamaludeen <hasher at comodo dot com> 1.3.6-4tr
  - Security Fix: Fix for CAN-2004-0175 to krb5 rcp based on Markus Friedl's
    fix for OpenSSH scp.
* Wed Jun 08 2005 Syed Shabir Zakiullah <syedshabir at comodo dot com> 1.3.6-3tr
  - Security Fix: Buffer overflows in telnet client
  - The telnet client program supplied with MIT Kerberos 5 has buffer
    overflows in the functions slc_add_reply() and env_opt_add(), which
    may lead to remote code execution.
    
    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CAN-2005-0469 and CAN-2005-0468 to this issue.
* Tue Dec 21 2004 Erlend Midttun <erlendbm at trustix dot org> 1.3.6-2tr
  - New upstream.
* Mon Nov 01 2004 Oystein Viggen <oysteivi at trustix dot com> 1.3.5-2tr
  - Patch tempfile issue
* Fri Sep 24 2004 Syed Shabir <syedshabir at comodo dot com> 1.3.5-1tr
  - New upstream with updated security bugs
* Wed Sep 01 2004 Oystein Viggen <oysteivi at trustix dot com> 1.3.4-2tr
  - Patch security bugs
* Thu Jun 17 2004 Chr. Toldnes <christht at trustix dot org> 1.3.4-1tr
  - New upstream version: 1.3.4
* Wed Jun 02 2004 Chr. Toldnes <christht at trustix dot org> 1.3.3-1tr
  - New upstream version: 1.3.3
  - Added patch to fix buffer overflow.
* Wed Feb 11 2004 Tor Hveem <torh at trustix dot org> 1.3.1-4th
  - Fixed stupid error with file wildcards.
* Tue Feb 10 2004 Tor Hveem <torh at trustix dot org> 1.3.1-3th
  - New package libs.
* Mon Feb 09 2004 Chr. Toldnes <christht at trustix dot org> 1.3.1-2tr
  - Use system et (libcom_err)
* Mon Feb 09 2004 Chr. Toldnes <christht at trustix dot org> 1.3.1-1tr
  - Initial release for Trustix
  - built shared :)  with no stack protection :(

Files

/usr/include/gssapi
/usr/include/gssapi/gssapi.h
/usr/include/gssapi/gssapi_generic.h
/usr/include/gssapi/gssapi_krb5.h
/usr/include/kerberosIV
/usr/include/kerberosIV/des.h
/usr/include/kerberosIV/kadm_err.h
/usr/include/kerberosIV/krb.h
/usr/include/kerberosIV/krb_err.h
/usr/include/kerberosIV/mit-copyright.h
/usr/include/krb5.h
/usr/include/profile.h
/usr/lib/libdes425.a
/usr/lib/libdes425.so
/usr/lib/libgssapi_krb5.a
/usr/lib/libgssapi_krb5.so
/usr/lib/libgssrpc.a
/usr/lib/libgssrpc.so
/usr/lib/libk5crypto.a
/usr/lib/libk5crypto.so
/usr/lib/libkadm5clnt.a
/usr/lib/libkadm5clnt.so
/usr/lib/libkadm5srv.a
/usr/lib/libkadm5srv.so
/usr/lib/libkdb5.a
/usr/lib/libkdb5.so
/usr/lib/libkrb4.a
/usr/lib/libkrb4.so
/usr/lib/libkrb5.a
/usr/lib/libkrb5.so


Generated by rpm2html 1.8.1

Fabrice Bellet, Sun Aug 10 13:03:03 2014