Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2006:0612 - Security Advisory
Issued:
2006-08-08
Updated:
2006-08-08

RHSA-2006:0612 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

krb5 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated krb5 packages are now available for Red Hat Enterprise Linux 4 to
correct a privilege escalation security flaw.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

Kerberos is a network authentication system which allows clients and
servers to authenticate to each other through use of symmetric encryption
and a trusted third party, the KDC.

A flaw was found where some bundled Kerberos-aware applications would fail
to check the result of the setuid() call. On Linux 2.6 kernels, the
setuid() call can fail if certain user limits are hit. A local attacker
could manipulate their environment in such a way to get the applications to
continue to run as root, potentially leading to an escalation of
privileges. (CVE-2006-3083).

Users are advised to update to these erratum packages which contain a
backported fix to correct this issue.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

(none)

CVEs

  • CVE-2006-3083

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
krb5-1.3.4-33.src.rpm SHA-256: c88c42023bb56c434f96aea866fa662cc62518fff65ef7c22b062ed453ccafa7
x86_64
krb5-devel-1.3.4-33.x86_64.rpm SHA-256: 30cd4d61694483ef271465aeeafc52128effdec5712690719b26b8fd652f0a18
krb5-devel-1.3.4-33.x86_64.rpm SHA-256: 30cd4d61694483ef271465aeeafc52128effdec5712690719b26b8fd652f0a18
krb5-libs-1.3.4-33.i386.rpm SHA-256: b92525ff329c578ad438b54e4c8beb2af75c77755a3a5177018f58347b56c4d8
krb5-libs-1.3.4-33.i386.rpm SHA-256: b92525ff329c578ad438b54e4c8beb2af75c77755a3a5177018f58347b56c4d8
krb5-libs-1.3.4-33.x86_64.rpm SHA-256: 54e81ebbd652567cdafbe8a88ef0951cefbdcfd8d244f00fb6c422aed8516349
krb5-libs-1.3.4-33.x86_64.rpm SHA-256: 54e81ebbd652567cdafbe8a88ef0951cefbdcfd8d244f00fb6c422aed8516349
krb5-server-1.3.4-33.x86_64.rpm SHA-256: 299cd0efd7fcefde48fc3bbc515cfe02cb16fcbb930257ad37e871fc841f8b93
krb5-server-1.3.4-33.x86_64.rpm SHA-256: 299cd0efd7fcefde48fc3bbc515cfe02cb16fcbb930257ad37e871fc841f8b93
krb5-workstation-1.3.4-33.x86_64.rpm SHA-256: c30b82d0dba4f76111f931292743b6ac4db0e4e5f375a2322aab06f5b11ba93b
krb5-workstation-1.3.4-33.x86_64.rpm SHA-256: c30b82d0dba4f76111f931292743b6ac4db0e4e5f375a2322aab06f5b11ba93b
ia64
krb5-devel-1.3.4-33.ia64.rpm SHA-256: 5e7c58975b370ebdd8fc489995a37401c35d1529216d08c8936278b2bc28cc24
krb5-devel-1.3.4-33.ia64.rpm SHA-256: 5e7c58975b370ebdd8fc489995a37401c35d1529216d08c8936278b2bc28cc24
krb5-libs-1.3.4-33.i386.rpm SHA-256: b92525ff329c578ad438b54e4c8beb2af75c77755a3a5177018f58347b56c4d8
krb5-libs-1.3.4-33.i386.rpm SHA-256: b92525ff329c578ad438b54e4c8beb2af75c77755a3a5177018f58347b56c4d8
krb5-libs-1.3.4-33.ia64.rpm SHA-256: 2f3656751a34a142693d2e84dd30aa35758232828221c0561b585781c804b372
krb5-libs-1.3.4-33.ia64.rpm SHA-256: 2f3656751a34a142693d2e84dd30aa35758232828221c0561b585781c804b372
krb5-server-1.3.4-33.ia64.rpm SHA-256: a6bb2c1689f32d44610d1787ec4d6890cf7454ba73a20be76eb9c2176486f5ca
krb5-server-1.3.4-33.ia64.rpm SHA-256: a6bb2c1689f32d44610d1787ec4d6890cf7454ba73a20be76eb9c2176486f5ca
krb5-workstation-1.3.4-33.ia64.rpm SHA-256: 0bddafea08537ae21ee454e2d4a705e79a08c8e9083c94cb980bbd3575e6bf36
krb5-workstation-1.3.4-33.ia64.rpm SHA-256: 0bddafea08537ae21ee454e2d4a705e79a08c8e9083c94cb980bbd3575e6bf36
i386
krb5-devel-1.3.4-33.i386.rpm SHA-256: a8275e36d2e8ff566e228248f229ca660c2e191a6f78bfa0d20349589b4ded4b
krb5-devel-1.3.4-33.i386.rpm SHA-256: a8275e36d2e8ff566e228248f229ca660c2e191a6f78bfa0d20349589b4ded4b
krb5-libs-1.3.4-33.i386.rpm SHA-256: b92525ff329c578ad438b54e4c8beb2af75c77755a3a5177018f58347b56c4d8
krb5-libs-1.3.4-33.i386.rpm SHA-256: b92525ff329c578ad438b54e4c8beb2af75c77755a3a5177018f58347b56c4d8
krb5-server-1.3.4-33.i386.rpm SHA-256: 71a7b9ec82ea0cb5162964abc77c8adf3d186ca76670870245291f71688542db
krb5-server-1.3.4-33.i386.rpm SHA-256: 71a7b9ec82ea0cb5162964abc77c8adf3d186ca76670870245291f71688542db
krb5-workstation-1.3.4-33.i386.rpm SHA-256: 88c445660d186c3036643391397a7edb83141be0d53bb9faeff78fb068dd1524
krb5-workstation-1.3.4-33.i386.rpm SHA-256: 88c445660d186c3036643391397a7edb83141be0d53bb9faeff78fb068dd1524

Red Hat Enterprise Linux Workstation 4

SRPM
krb5-1.3.4-33.src.rpm SHA-256: c88c42023bb56c434f96aea866fa662cc62518fff65ef7c22b062ed453ccafa7
x86_64
krb5-devel-1.3.4-33.x86_64.rpm SHA-256: 30cd4d61694483ef271465aeeafc52128effdec5712690719b26b8fd652f0a18
krb5-libs-1.3.4-33.i386.rpm SHA-256: b92525ff329c578ad438b54e4c8beb2af75c77755a3a5177018f58347b56c4d8
krb5-libs-1.3.4-33.x86_64.rpm SHA-256: 54e81ebbd652567cdafbe8a88ef0951cefbdcfd8d244f00fb6c422aed8516349
krb5-server-1.3.4-33.x86_64.rpm SHA-256: 299cd0efd7fcefde48fc3bbc515cfe02cb16fcbb930257ad37e871fc841f8b93
krb5-workstation-1.3.4-33.x86_64.rpm SHA-256: c30b82d0dba4f76111f931292743b6ac4db0e4e5f375a2322aab06f5b11ba93b
ia64
krb5-devel-1.3.4-33.ia64.rpm SHA-256: 5e7c58975b370ebdd8fc489995a37401c35d1529216d08c8936278b2bc28cc24
krb5-libs-1.3.4-33.i386.rpm SHA-256: b92525ff329c578ad438b54e4c8beb2af75c77755a3a5177018f58347b56c4d8
krb5-libs-1.3.4-33.ia64.rpm SHA-256: 2f3656751a34a142693d2e84dd30aa35758232828221c0561b585781c804b372
krb5-server-1.3.4-33.ia64.rpm SHA-256: a6bb2c1689f32d44610d1787ec4d6890cf7454ba73a20be76eb9c2176486f5ca
krb5-workstation-1.3.4-33.ia64.rpm SHA-256: 0bddafea08537ae21ee454e2d4a705e79a08c8e9083c94cb980bbd3575e6bf36
i386
krb5-devel-1.3.4-33.i386.rpm SHA-256: a8275e36d2e8ff566e228248f229ca660c2e191a6f78bfa0d20349589b4ded4b
krb5-libs-1.3.4-33.i386.rpm SHA-256: b92525ff329c578ad438b54e4c8beb2af75c77755a3a5177018f58347b56c4d8
krb5-server-1.3.4-33.i386.rpm SHA-256: 71a7b9ec82ea0cb5162964abc77c8adf3d186ca76670870245291f71688542db
krb5-workstation-1.3.4-33.i386.rpm SHA-256: 88c445660d186c3036643391397a7edb83141be0d53bb9faeff78fb068dd1524

Red Hat Enterprise Linux Desktop 4

SRPM
krb5-1.3.4-33.src.rpm SHA-256: c88c42023bb56c434f96aea866fa662cc62518fff65ef7c22b062ed453ccafa7
x86_64
krb5-devel-1.3.4-33.x86_64.rpm SHA-256: 30cd4d61694483ef271465aeeafc52128effdec5712690719b26b8fd652f0a18
krb5-libs-1.3.4-33.i386.rpm SHA-256: b92525ff329c578ad438b54e4c8beb2af75c77755a3a5177018f58347b56c4d8
krb5-libs-1.3.4-33.x86_64.rpm SHA-256: 54e81ebbd652567cdafbe8a88ef0951cefbdcfd8d244f00fb6c422aed8516349
krb5-server-1.3.4-33.x86_64.rpm SHA-256: 299cd0efd7fcefde48fc3bbc515cfe02cb16fcbb930257ad37e871fc841f8b93
krb5-workstation-1.3.4-33.x86_64.rpm SHA-256: c30b82d0dba4f76111f931292743b6ac4db0e4e5f375a2322aab06f5b11ba93b
i386
krb5-devel-1.3.4-33.i386.rpm SHA-256: a8275e36d2e8ff566e228248f229ca660c2e191a6f78bfa0d20349589b4ded4b
krb5-libs-1.3.4-33.i386.rpm SHA-256: b92525ff329c578ad438b54e4c8beb2af75c77755a3a5177018f58347b56c4d8
krb5-server-1.3.4-33.i386.rpm SHA-256: 71a7b9ec82ea0cb5162964abc77c8adf3d186ca76670870245291f71688542db
krb5-workstation-1.3.4-33.i386.rpm SHA-256: 88c445660d186c3036643391397a7edb83141be0d53bb9faeff78fb068dd1524

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
krb5-1.3.4-33.src.rpm SHA-256: c88c42023bb56c434f96aea866fa662cc62518fff65ef7c22b062ed453ccafa7
s390x
krb5-devel-1.3.4-33.s390x.rpm SHA-256: 120ea4ced54369f116d5204fa9a3b5e49defc60f96d2b293d67964ce97c9e177
krb5-libs-1.3.4-33.s390.rpm SHA-256: 7d2583a9f454510c2621cc5685b914937803c97df0c0961b44218171d9fb1040
krb5-libs-1.3.4-33.s390x.rpm SHA-256: 4efd89880fdfded079f30af24e18294a2723a998b6c9868c469a01c0a0071999
krb5-server-1.3.4-33.s390x.rpm SHA-256: d5b2c0a4407f613bdd02cf60244d86491630ab51632762b64a8ce7673f369737
krb5-workstation-1.3.4-33.s390x.rpm SHA-256: 64a5b9dbcde1b70a6856e050d7d9ffa2d65cc9cbbdf5c58aad0ba130fca69a81
s390
krb5-devel-1.3.4-33.s390.rpm SHA-256: a2eab79116e398c996cfd27f476a7cfba85bfe73ee8ff8ece0c7b9819535afe2
krb5-libs-1.3.4-33.s390.rpm SHA-256: 7d2583a9f454510c2621cc5685b914937803c97df0c0961b44218171d9fb1040
krb5-server-1.3.4-33.s390.rpm SHA-256: 7bc153028cd56e585e856aea53fe9765325155a6146e26c94caef6713ead7df0
krb5-workstation-1.3.4-33.s390.rpm SHA-256: 94c7d7fb0147c3befbb208348caee083fbae6491f9a0a2eabbf04fdace5b3115

Red Hat Enterprise Linux for Power, big endian 4

SRPM
krb5-1.3.4-33.src.rpm SHA-256: c88c42023bb56c434f96aea866fa662cc62518fff65ef7c22b062ed453ccafa7
ppc
krb5-devel-1.3.4-33.ppc.rpm SHA-256: 63d4297ededf0fb5d250073bf22f71cd9746ac89d6fa2daa421f07308da69ac7
krb5-libs-1.3.4-33.ppc.rpm SHA-256: 3d29c633f7d2bb7f27f58b4d4fc049a9a251a38cd00b681ec3f47aa6ba73ed79
krb5-libs-1.3.4-33.ppc64.rpm SHA-256: c857f706b89635defeea2805d3945f46f592874a5a202e2a8b9e34e003bb03e5
krb5-server-1.3.4-33.ppc.rpm SHA-256: c135e20864eb3b2770204f7f7cba15fdce6e72bb425226890c5d8393d379671c
krb5-workstation-1.3.4-33.ppc.rpm SHA-256: 915c8be6cd2ac0e37a68086a491ea90c5a00f361951ffacc5d1aa6333ff70676

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility