[SECURITY] Fedora 18 Update: krb5-1.10.3-17.fc18

updates at fedoraproject.org updates at fedoraproject.org
Tue May 21 08:38:01 UTC 2013


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2013-8212
2013-05-15 02:37:32
--------------------------------------------------------------------------------

Name        : krb5
Product     : Fedora 18
Version     : 1.10.3
Release     : 17.fc18
URL         : http://web.mit.edu/kerberos/www/
Summary     : The Kerberos network authentication system
Description :
Kerberos V5 is a trusted-third-party network authentication system,
which can improve your network's security by eliminating the insecure
practice of sending passwords over the network in unencrypted form.

--------------------------------------------------------------------------------
Update Information:

This update pulls in the upstream fix for a UDP ping-pong vulnerability in the kpasswd service provided by kadmind (CVE-2002-2443).
--------------------------------------------------------------------------------
ChangeLog:

* Mon May 13 2013 Nalin Dahyabhai <nalin at redhat.com> 1.10.3-17
- pull up fix for UDP ping-pong flaw in kpasswd service (CVE-2002-2443,
* Mon Apr 15 2013 Nalin Dahyabhai <nalin at redhat.com> 1.10.3-16
- pull fix for keeping track of the message type when parsing FAST requests in
  the KDC (RT#7605, #951964)
* Tue Apr  9 2013 Nalin Dahyabhai <nalin at redhat.com> 1.10.3-15
- incorporate upstream patch to fix a NULL pointer dereference while processing
  certain TGS requests (CVE-2013-1416, #949984/#949987)
* Tue Mar  5 2013 Nalin Dahyabhai <nalin at redhat.com> 1.10.3-14
- add patch to avoid dereferencing a NULL pointer in the KDC when handling a
  draft9 PKINIT request (#917841, CVE-2012-1016)
* Thu Feb 28 2013 Nalin Dahyabhai <nalin at redhat.com> 1.10.3-13
- fix a memory leak when acquiring credentials using a keytab (RT#7586, #911110)
* Mon Feb 25 2013 Nalin Dahyabhai <nalin at redhat.com> 1.10.3-12
- incorporate upstream patch to fix a NULL pointer dereference when the client
  supplies an otherwise-normal-looking PKINIT request (CVE-2013-1415, #914756)
* Mon Jan  7 2013 Nalin Dahyabhai <nalin at redhat.com> 1.10.3-11
- make -server conflict with older versions of SELinux policy that didn't
  allow us to use eventfds, which libverto's backend may depend on in order
  to properly shut down a multi-worker KDC (#871524)
* Thu Dec 13 2012 Nalin Dahyabhai <nalin at redhat.com> 1.10.3-10
- libkdb_ldap: add a workaround to keep the KDC from attempting to write to an
  entry's krbLastAdminUnlock attribute on every AS request (#860759, RT#7502)
* Tue Dec 11 2012 Nalin Dahyabhai <nalin at redhat.com> 1.10.3-9
- when building with our bundled copy of libverto, package it in with -libs
  rather than with -server (#886049)
* Mon Dec 10 2012 Nalin Dahyabhai <nalin at redhat.com> 1.10.3-8
- untag a couple of other patches which don't strictly need to apply during
  %{?_rawbuild} builds (more of #874177)
* Wed Oct 17 2012 Nalin Dahyabhai <nalin at redhat.com> 1.10.3-7
- tag a couple of other patches which we still need to be applied during
  %{?_rawbuild} builds (zmraz, #874177)
* Tue Sep 25 2012 Nalin Dahyabhai <nalin at redhat.com> 1.10.3-6
- actually pull up the patch for RT#7063, and not some other ticket (#773496)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #962531 - CVE-2002-2443 krb5: UDP ping-pong flaw in kpasswd
        https://bugzilla.redhat.com/show_bug.cgi?id=962531
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update krb5' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list