Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2007:0095 - Security Advisory
Issued:
2007-04-03
Updated:
2007-04-03

RHSA-2007:0095 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: krb5 security update

Type/Severity

Security Advisory: Critical

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated krb5 packages that fix a number of issues are now available.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

Description

Kerberos is a network authentication system which allows clients and
servers to authenticate to each other through use of symmetric encryption
and a trusted third party, the KDC.

A flaw was found in the username handling of the MIT krb5 telnet daemon
(telnetd). A remote attacker who can access the telnet port of a target
machine could log in as root without requiring a password. (CVE-2007-0956)

Note that the krb5 telnet daemon is not enabled by default in any version
of Red Hat Enterprise Linux. In addition, the default firewall rules block
remote access to the telnet port. This flaw does not affect the telnet
daemon distributed in the telnet-server package.

For users who have enabled the krb5 telnet daemon and have it accessible
remotely, this update should be applied immediately.

Whilst we are not aware at this time that the flaw is being actively
exploited, we have confirmed that the flaw is very easily exploitable.

This update also fixes two additional security issues:

Buffer overflows were found which affect the Kerberos KDC and the kadmin
server daemon. A remote attacker who can access the KDC could exploit this
bug to run arbitrary code with the privileges of the KDC or kadmin server
processes. (CVE-2007-0957)

A double-free flaw was found in the GSSAPI library used by the kadmin
server daemon. Red Hat Enterprise Linux 4 and 5 contain checks within
glibc that detect double-free flaws. Therefore, on Red Hat Enterprise Linux
4 and 5 successful exploitation of this issue can only lead to a denial of
service. Applications which use this library in earlier releases of Red
Hat Enterprise Linux may also be affected. (CVE-2007-1216)

All users are advised to update to these erratum packages which contain a
backported fix to correct these issues.

Red Hat would like to thank MIT and iDefense for reporting these
vulnerabilities.

Solution

The krb5 telnet daemon is an xinetd service. You can determine if krb5
telnetd is enabled with the command:

/sbin/chkconfig --list krb5-telnet

The output of this command will be "krb5-telnet on" if krb5 telnet is
enabled. krb5 telnet daemon can be immediately disabled with the command:

/sbin/chkconfig krb5-telnet off

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Server 3 x86_64
  • Red Hat Enterprise Linux Server 3 ia64
  • Red Hat Enterprise Linux Server 3 i386
  • Red Hat Enterprise Linux Server 2 ia64
  • Red Hat Enterprise Linux Server 2 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Workstation 3 x86_64
  • Red Hat Enterprise Linux Workstation 3 ia64
  • Red Hat Enterprise Linux Workstation 3 i386
  • Red Hat Enterprise Linux Workstation 2 ia64
  • Red Hat Enterprise Linux Workstation 2 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux Desktop 3 x86_64
  • Red Hat Enterprise Linux Desktop 3 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems 3 s390x
  • Red Hat Enterprise Linux for IBM z Systems 3 s390
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian 3 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 229782 - CVE-2007-0956 Unauthorized access via krb5-telnet daemon
  • BZ - 231528 - CVE-2007-0957 krb5_klog_syslog() stack buffer overflow
  • BZ - 231537 - CVE-2007-1216 krb5 double free flaw

CVEs

  • CVE-2007-1216
  • CVE-2007-0957
  • CVE-2007-0956

References

  • http://www.redhat.com/security/updates/classification/#critical
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
x86_64
krb5-devel-1.5-23.i386.rpm SHA-256: 15256da88a4f2cca5d7d24ba5695ab5d1a3863264c787424f6181a9b94bdd75d
krb5-devel-1.5-23.x86_64.rpm SHA-256: 156f08411cc31619f78023572178aa6824a8f8dbba175af3e7a44a2bbe8c4d41
krb5-libs-1.5-23.i386.rpm SHA-256: e4d7c493b0629414ca289dccb0027dfd417377c5d9780276ce6af94e05482ac0
krb5-libs-1.5-23.x86_64.rpm SHA-256: 329c7a47539ab63246496761b537de2d3aa9a5007da96c8580f8c9b8d4b18f46
krb5-server-1.5-23.x86_64.rpm SHA-256: 3aa0188308ac48b47c3a229cb682f8a64bfa762555b6699ef217914b7d9e0412
krb5-workstation-1.5-23.x86_64.rpm SHA-256: 7c10b9d3fbf053cb11d1c5a70d7a6240727349c9615446c4928d561c9b599cba
ia64
krb5-devel-1.5-23.ia64.rpm SHA-256: 33a22631b84ce34375c16c0366954c59a54d52f61b6de9c87f5c38e3cf69bc76
krb5-libs-1.5-23.i386.rpm SHA-256: e4d7c493b0629414ca289dccb0027dfd417377c5d9780276ce6af94e05482ac0
krb5-libs-1.5-23.ia64.rpm SHA-256: 0f5208c3b9f5be560a67603ab09f5f078bb2df3d012284d702b281e5cc3c1c95
krb5-server-1.5-23.ia64.rpm SHA-256: 840c31c6456439beae78a652c57269ad8d886d0201fcc62d1c40ae9f77cbd928
krb5-workstation-1.5-23.ia64.rpm SHA-256: 29142c97de243993e46eaa480c8c66a1e6ceaf4cf4df203eed64272f3bcb9652
i386
krb5-devel-1.5-23.i386.rpm SHA-256: 15256da88a4f2cca5d7d24ba5695ab5d1a3863264c787424f6181a9b94bdd75d
krb5-libs-1.5-23.i386.rpm SHA-256: e4d7c493b0629414ca289dccb0027dfd417377c5d9780276ce6af94e05482ac0
krb5-server-1.5-23.i386.rpm SHA-256: 6a217a01dcb9383becca5976d97849f6336dc67435b3a5504f7f260468f311ff
krb5-workstation-1.5-23.i386.rpm SHA-256: 7849a332d2cb6dcb1d8ac462d8c883ee2037574f92b7d19ed12d096a7ca9f93b

Red Hat Enterprise Linux Server 4

SRPM
x86_64
krb5-devel-1.3.4-46.x86_64.rpm SHA-256: 2b851f858da5973c305086ca8894b8e83a082482098f4ea40d8ca48406e7d284
krb5-devel-1.3.4-46.x86_64.rpm SHA-256: 2b851f858da5973c305086ca8894b8e83a082482098f4ea40d8ca48406e7d284
krb5-libs-1.3.4-46.i386.rpm SHA-256: 8addf8723be4d9dc107f4f3753ba6f0b0828ef52ba5abea7d1b783ab21fa9d94
krb5-libs-1.3.4-46.i386.rpm SHA-256: 8addf8723be4d9dc107f4f3753ba6f0b0828ef52ba5abea7d1b783ab21fa9d94
krb5-libs-1.3.4-46.x86_64.rpm SHA-256: 2b0bcaed308057674576ac8881d3734718a59077dc1fe1543b34cb30165e626d
krb5-libs-1.3.4-46.x86_64.rpm SHA-256: 2b0bcaed308057674576ac8881d3734718a59077dc1fe1543b34cb30165e626d
krb5-server-1.3.4-46.x86_64.rpm SHA-256: 80fe5666cc750f9fdeafc4309421cfb126502a2b08057fb98ca4cfca2b5c1991
krb5-server-1.3.4-46.x86_64.rpm SHA-256: 80fe5666cc750f9fdeafc4309421cfb126502a2b08057fb98ca4cfca2b5c1991
krb5-workstation-1.3.4-46.x86_64.rpm SHA-256: e6e07841f930ab11b5c4399060dec7d7327d091ffd764aafe683f4c0d7258623
krb5-workstation-1.3.4-46.x86_64.rpm SHA-256: e6e07841f930ab11b5c4399060dec7d7327d091ffd764aafe683f4c0d7258623
ia64
krb5-devel-1.3.4-46.ia64.rpm SHA-256: f0884206ed08cc8b2a6e4e410be03ec561508fc5305fee54d39242bc4425afba
krb5-devel-1.3.4-46.ia64.rpm SHA-256: f0884206ed08cc8b2a6e4e410be03ec561508fc5305fee54d39242bc4425afba
krb5-libs-1.3.4-46.i386.rpm SHA-256: 8addf8723be4d9dc107f4f3753ba6f0b0828ef52ba5abea7d1b783ab21fa9d94
krb5-libs-1.3.4-46.i386.rpm SHA-256: 8addf8723be4d9dc107f4f3753ba6f0b0828ef52ba5abea7d1b783ab21fa9d94
krb5-libs-1.3.4-46.ia64.rpm SHA-256: 11b3452a2f1893808e24bc62994a43e8560a30d52a39a725b11e172ba40b11e2
krb5-libs-1.3.4-46.ia64.rpm SHA-256: 11b3452a2f1893808e24bc62994a43e8560a30d52a39a725b11e172ba40b11e2
krb5-server-1.3.4-46.ia64.rpm SHA-256: 73ee81c9417d50e5f2c21629fba1f4a8527cac06a586d94dc26c58f1415de191
krb5-server-1.3.4-46.ia64.rpm SHA-256: 73ee81c9417d50e5f2c21629fba1f4a8527cac06a586d94dc26c58f1415de191
krb5-workstation-1.3.4-46.ia64.rpm SHA-256: 00edeb98c83caa1f9f5671d24eecff3e56f5ba595e7a045e7e8cc7c2ead624a2
krb5-workstation-1.3.4-46.ia64.rpm SHA-256: 00edeb98c83caa1f9f5671d24eecff3e56f5ba595e7a045e7e8cc7c2ead624a2
i386
krb5-devel-1.3.4-46.i386.rpm SHA-256: cf06974e0c15b1f86239327af9ed1b94c05fa25a30a0b5169849bd8cff3ba6b6
krb5-devel-1.3.4-46.i386.rpm SHA-256: cf06974e0c15b1f86239327af9ed1b94c05fa25a30a0b5169849bd8cff3ba6b6
krb5-libs-1.3.4-46.i386.rpm SHA-256: 8addf8723be4d9dc107f4f3753ba6f0b0828ef52ba5abea7d1b783ab21fa9d94
krb5-libs-1.3.4-46.i386.rpm SHA-256: 8addf8723be4d9dc107f4f3753ba6f0b0828ef52ba5abea7d1b783ab21fa9d94
krb5-server-1.3.4-46.i386.rpm SHA-256: 759d6cab60551910e3449d652d1b0e3ceaa8f913c926c6915b3a19766b2ebdda
krb5-server-1.3.4-46.i386.rpm SHA-256: 759d6cab60551910e3449d652d1b0e3ceaa8f913c926c6915b3a19766b2ebdda
krb5-workstation-1.3.4-46.i386.rpm SHA-256: 6cff45579839c38a8dfbfc5af93e379a56ec029f96ee4c1a0db79d9d472de4e8
krb5-workstation-1.3.4-46.i386.rpm SHA-256: 6cff45579839c38a8dfbfc5af93e379a56ec029f96ee4c1a0db79d9d472de4e8

Red Hat Enterprise Linux Server 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Server 2

SRPM
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
x86_64
krb5-devel-1.5-23.i386.rpm SHA-256: 15256da88a4f2cca5d7d24ba5695ab5d1a3863264c787424f6181a9b94bdd75d
krb5-devel-1.5-23.x86_64.rpm SHA-256: 156f08411cc31619f78023572178aa6824a8f8dbba175af3e7a44a2bbe8c4d41
krb5-libs-1.5-23.i386.rpm SHA-256: e4d7c493b0629414ca289dccb0027dfd417377c5d9780276ce6af94e05482ac0
krb5-libs-1.5-23.x86_64.rpm SHA-256: 329c7a47539ab63246496761b537de2d3aa9a5007da96c8580f8c9b8d4b18f46
krb5-server-1.5-23.x86_64.rpm SHA-256: 3aa0188308ac48b47c3a229cb682f8a64bfa762555b6699ef217914b7d9e0412
krb5-workstation-1.5-23.x86_64.rpm SHA-256: 7c10b9d3fbf053cb11d1c5a70d7a6240727349c9615446c4928d561c9b599cba
i386
krb5-devel-1.5-23.i386.rpm SHA-256: 15256da88a4f2cca5d7d24ba5695ab5d1a3863264c787424f6181a9b94bdd75d
krb5-libs-1.5-23.i386.rpm SHA-256: e4d7c493b0629414ca289dccb0027dfd417377c5d9780276ce6af94e05482ac0
krb5-server-1.5-23.i386.rpm SHA-256: 6a217a01dcb9383becca5976d97849f6336dc67435b3a5504f7f260468f311ff
krb5-workstation-1.5-23.i386.rpm SHA-256: 7849a332d2cb6dcb1d8ac462d8c883ee2037574f92b7d19ed12d096a7ca9f93b

Red Hat Enterprise Linux Workstation 4

SRPM
x86_64
krb5-devel-1.3.4-46.x86_64.rpm SHA-256: 2b851f858da5973c305086ca8894b8e83a082482098f4ea40d8ca48406e7d284
krb5-libs-1.3.4-46.i386.rpm SHA-256: 8addf8723be4d9dc107f4f3753ba6f0b0828ef52ba5abea7d1b783ab21fa9d94
krb5-libs-1.3.4-46.x86_64.rpm SHA-256: 2b0bcaed308057674576ac8881d3734718a59077dc1fe1543b34cb30165e626d
krb5-server-1.3.4-46.x86_64.rpm SHA-256: 80fe5666cc750f9fdeafc4309421cfb126502a2b08057fb98ca4cfca2b5c1991
krb5-workstation-1.3.4-46.x86_64.rpm SHA-256: e6e07841f930ab11b5c4399060dec7d7327d091ffd764aafe683f4c0d7258623
ia64
krb5-devel-1.3.4-46.ia64.rpm SHA-256: f0884206ed08cc8b2a6e4e410be03ec561508fc5305fee54d39242bc4425afba
krb5-libs-1.3.4-46.i386.rpm SHA-256: 8addf8723be4d9dc107f4f3753ba6f0b0828ef52ba5abea7d1b783ab21fa9d94
krb5-libs-1.3.4-46.ia64.rpm SHA-256: 11b3452a2f1893808e24bc62994a43e8560a30d52a39a725b11e172ba40b11e2
krb5-server-1.3.4-46.ia64.rpm SHA-256: 73ee81c9417d50e5f2c21629fba1f4a8527cac06a586d94dc26c58f1415de191
krb5-workstation-1.3.4-46.ia64.rpm SHA-256: 00edeb98c83caa1f9f5671d24eecff3e56f5ba595e7a045e7e8cc7c2ead624a2
i386
krb5-devel-1.3.4-46.i386.rpm SHA-256: cf06974e0c15b1f86239327af9ed1b94c05fa25a30a0b5169849bd8cff3ba6b6
krb5-libs-1.3.4-46.i386.rpm SHA-256: 8addf8723be4d9dc107f4f3753ba6f0b0828ef52ba5abea7d1b783ab21fa9d94
krb5-server-1.3.4-46.i386.rpm SHA-256: 759d6cab60551910e3449d652d1b0e3ceaa8f913c926c6915b3a19766b2ebdda
krb5-workstation-1.3.4-46.i386.rpm SHA-256: 6cff45579839c38a8dfbfc5af93e379a56ec029f96ee4c1a0db79d9d472de4e8

Red Hat Enterprise Linux Workstation 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 2

SRPM
ia64
i386

Red Hat Enterprise Linux Desktop 5

SRPM
x86_64
krb5-libs-1.5-23.i386.rpm SHA-256: e4d7c493b0629414ca289dccb0027dfd417377c5d9780276ce6af94e05482ac0
krb5-libs-1.5-23.x86_64.rpm SHA-256: 329c7a47539ab63246496761b537de2d3aa9a5007da96c8580f8c9b8d4b18f46
krb5-workstation-1.5-23.x86_64.rpm SHA-256: 7c10b9d3fbf053cb11d1c5a70d7a6240727349c9615446c4928d561c9b599cba
i386
krb5-libs-1.5-23.i386.rpm SHA-256: e4d7c493b0629414ca289dccb0027dfd417377c5d9780276ce6af94e05482ac0
krb5-workstation-1.5-23.i386.rpm SHA-256: 7849a332d2cb6dcb1d8ac462d8c883ee2037574f92b7d19ed12d096a7ca9f93b

Red Hat Enterprise Linux Desktop 4

SRPM
x86_64
krb5-devel-1.3.4-46.x86_64.rpm SHA-256: 2b851f858da5973c305086ca8894b8e83a082482098f4ea40d8ca48406e7d284
krb5-libs-1.3.4-46.i386.rpm SHA-256: 8addf8723be4d9dc107f4f3753ba6f0b0828ef52ba5abea7d1b783ab21fa9d94
krb5-libs-1.3.4-46.x86_64.rpm SHA-256: 2b0bcaed308057674576ac8881d3734718a59077dc1fe1543b34cb30165e626d
krb5-server-1.3.4-46.x86_64.rpm SHA-256: 80fe5666cc750f9fdeafc4309421cfb126502a2b08057fb98ca4cfca2b5c1991
krb5-workstation-1.3.4-46.x86_64.rpm SHA-256: e6e07841f930ab11b5c4399060dec7d7327d091ffd764aafe683f4c0d7258623
i386
krb5-devel-1.3.4-46.i386.rpm SHA-256: cf06974e0c15b1f86239327af9ed1b94c05fa25a30a0b5169849bd8cff3ba6b6
krb5-libs-1.3.4-46.i386.rpm SHA-256: 8addf8723be4d9dc107f4f3753ba6f0b0828ef52ba5abea7d1b783ab21fa9d94
krb5-server-1.3.4-46.i386.rpm SHA-256: 759d6cab60551910e3449d652d1b0e3ceaa8f913c926c6915b3a19766b2ebdda
krb5-workstation-1.3.4-46.i386.rpm SHA-256: 6cff45579839c38a8dfbfc5af93e379a56ec029f96ee4c1a0db79d9d472de4e8

Red Hat Enterprise Linux Desktop 3

SRPM
x86_64
i386

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
s390x
krb5-devel-1.5-23.s390.rpm SHA-256: 48f8bde45a0cc7d978b78985a8b2c5fbdc754be96a7d342a22c1e79e6d30b2c8
krb5-devel-1.5-23.s390x.rpm SHA-256: b04420fbae3cf4532612dce107e5bb3c2e05b27fb80edbb7ad88fd0da7e9cc2e
krb5-libs-1.5-23.s390.rpm SHA-256: 9d0ec57d24ddb7b88871763a8258aaabd09045afbb0dd38319c4528e932b79e4
krb5-libs-1.5-23.s390x.rpm SHA-256: 7a973fce6d46b203ff2eb26e8a75e78e14773b438426f2afaccb298a7c00b856
krb5-server-1.5-23.s390x.rpm SHA-256: 9c05a33556f63368eacd237cf84738336a5c7b579104bebe9cd82d6089206611
krb5-workstation-1.5-23.s390x.rpm SHA-256: 3d09b76e906a315d6e0cb2bab03ccd74a21892e9b66d63214bb6e92f13e723dd

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
s390x
krb5-devel-1.3.4-46.s390x.rpm SHA-256: 97df9510760ca89c1d0abdb6dd7288b6bdc760116dbe551caf70397650900edb
krb5-libs-1.3.4-46.s390.rpm SHA-256: 05332cb2b6c679deede334bfdcfc3e0053285fb1c3fa93736cb9ada874612c4b
krb5-libs-1.3.4-46.s390x.rpm SHA-256: 3ff909eedc16ff5d7f31d96a84dcea510846ec1fd9f1afaf1fcdaf60d825aee0
krb5-server-1.3.4-46.s390x.rpm SHA-256: e0b113b60871e2fb46dd4a33d4034eeb623f6a6fad080bcc0aa01a5796fcda75
krb5-workstation-1.3.4-46.s390x.rpm SHA-256: bfd54eae41d89f76ed6d6eecb727e139877560f1f306a0130024a1666daf7433
s390
krb5-devel-1.3.4-46.s390.rpm SHA-256: 9b307c3b896e7e14cd22c0079929bd264a1412b982a3b96fd6907aa4fe2d65a7
krb5-libs-1.3.4-46.s390.rpm SHA-256: 05332cb2b6c679deede334bfdcfc3e0053285fb1c3fa93736cb9ada874612c4b
krb5-server-1.3.4-46.s390.rpm SHA-256: 6eb7e53e132e9845f5cd8acf46ef3a9c538a76493d486d1d09d0e502d306a589
krb5-workstation-1.3.4-46.s390.rpm SHA-256: 96dd851e6ec2116eaa5b59d4c2c1892146404806274da6c7002f7a7b4c45fac4

Red Hat Enterprise Linux for IBM z Systems 3

SRPM
s390x
s390

Red Hat Enterprise Linux for Power, big endian 5

SRPM
ppc
krb5-devel-1.5-23.ppc.rpm SHA-256: c0f93709cba9e84ee71f435d16895a87392fe252550c981186cd581a338af579
krb5-devel-1.5-23.ppc64.rpm SHA-256: b2ad298be2eb3ba1a3129654c4bc2739a4b08d927df961a24cc62af754a793b5
krb5-libs-1.5-23.ppc.rpm SHA-256: 454abab3e18df67503fad5e72f55629e109eca940cb3b613a3ee2b4833fabe23
krb5-libs-1.5-23.ppc64.rpm SHA-256: 6460aae541e3fd850832accc75b967aaf486e1c0f26d0347afc8565f4272512d
krb5-server-1.5-23.ppc.rpm SHA-256: a693f8ebf0b4e57fd6453da43443bc3ac988f477e0f5f208306b5ba41d6c6f9b
krb5-workstation-1.5-23.ppc.rpm SHA-256: 1fa0cddc915808fcac399adbda590dddf6afb9d007c58d8264495d55cd21af33

Red Hat Enterprise Linux for Power, big endian 4

SRPM
ppc
krb5-devel-1.3.4-46.ppc.rpm SHA-256: 84b9c5e51fd1a113c277760f2fef762c5fc94b8aba03719f0f0ecf7e0995fe36
krb5-libs-1.3.4-46.ppc.rpm SHA-256: 0635357bbd5049f706402993727f7f5f1b71a800983abe876351bc26dfe34b2b
krb5-libs-1.3.4-46.ppc64.rpm SHA-256: 261e42c7d9cee4f51021e2effd6e667b145e6f81aff888464b0a0b989c19d050
krb5-server-1.3.4-46.ppc.rpm SHA-256: c929da3055508df1e6b4dde1d1ba652211683ceaea64b5685495592246f3a51c
krb5-workstation-1.3.4-46.ppc.rpm SHA-256: 9018f651f872550a543244ee8b23d80a3bdf5d0841beb63a9565c8e2b11f2975

Red Hat Enterprise Linux for Power, big endian 3

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
x86_64
krb5-devel-1.5-23.i386.rpm SHA-256: 15256da88a4f2cca5d7d24ba5695ab5d1a3863264c787424f6181a9b94bdd75d
krb5-devel-1.5-23.x86_64.rpm SHA-256: 156f08411cc31619f78023572178aa6824a8f8dbba175af3e7a44a2bbe8c4d41
krb5-libs-1.5-23.i386.rpm SHA-256: e4d7c493b0629414ca289dccb0027dfd417377c5d9780276ce6af94e05482ac0
krb5-libs-1.5-23.x86_64.rpm SHA-256: 329c7a47539ab63246496761b537de2d3aa9a5007da96c8580f8c9b8d4b18f46
krb5-server-1.5-23.x86_64.rpm SHA-256: 3aa0188308ac48b47c3a229cb682f8a64bfa762555b6699ef217914b7d9e0412
krb5-workstation-1.5-23.x86_64.rpm SHA-256: 7c10b9d3fbf053cb11d1c5a70d7a6240727349c9615446c4928d561c9b599cba
i386
krb5-devel-1.5-23.i386.rpm SHA-256: 15256da88a4f2cca5d7d24ba5695ab5d1a3863264c787424f6181a9b94bdd75d
krb5-libs-1.5-23.i386.rpm SHA-256: e4d7c493b0629414ca289dccb0027dfd417377c5d9780276ce6af94e05482ac0
krb5-server-1.5-23.i386.rpm SHA-256: 6a217a01dcb9383becca5976d97849f6336dc67435b3a5504f7f260468f311ff
krb5-workstation-1.5-23.i386.rpm SHA-256: 7849a332d2cb6dcb1d8ac462d8c883ee2037574f92b7d19ed12d096a7ca9f93b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility