Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2008:0180 - Security Advisory
Issued:
2008-03-18
Updated:
2008-03-18

RHSA-2008:0180 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: krb5 security update

Type/Severity

Security Advisory: Critical

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated krb5 packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 4.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

Description

Kerberos is a network authentication system which allows clients and
servers to authenticate to each other through use of symmetric encryption
and a trusted third party, the KDC.

A flaw was found in the way the MIT Kerberos Authentication Service and Key
Distribution Center server (krb5kdc) handled Kerberos v4 protocol packets.
An unauthenticated remote attacker could use this flaw to crash the
krb5kdc daemon, disclose portions of its memory, or possibly execute
arbitrary code using malformed or truncated Kerberos v4 protocol
requests. (CVE-2008-0062, CVE-2008-0063)

This issue only affected krb5kdc with Kerberos v4 protocol compatibility
enabled, which is the default setting on Red Hat Enterprise Linux 4.
Kerberos v4 protocol support can be disabled by adding "v4_mode=none"
(without the quotes) to the "[kdcdefaults]" section of
/var/kerberos/krb5kdc/kdc.conf.

Red Hat would like to thank MIT for reporting these issues.

A double-free flaw was discovered in the GSSAPI library used by MIT
Kerberos. This flaw could possibly cause a crash of the application using
the GSSAPI library. (CVE-2007-5971)

All krb5 users are advised to update to these erratum packages which
contain backported fixes to correct these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.6 ppc

Fixes

  • BZ - 415351 - CVE-2007-5971 krb5: double free in gssapi lib
  • BZ - 432620 - CVE-2008-0062 krb5: uninitialized pointer use in krb5kdc
  • BZ - 432621 - CVE-2008-0063 krb5: possible leak of sensitive data from krb5kdc using krb4 request

CVEs

  • CVE-2007-5971
  • CVE-2008-0063
  • CVE-2008-0062

References

  • http://www.redhat.com/security/updates/classification/#critical
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
krb5-1.3.4-54.el4_6.1.src.rpm SHA-256: 90cd34082ae2398755b13d59df65123a20f6c639a166029af16f1ff15ae74cc8
x86_64
krb5-devel-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 1946ecd92abc9a5a9bee8052db30256390b421f08aef70916bbaf3f6f7c9cf96
krb5-devel-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 1946ecd92abc9a5a9bee8052db30256390b421f08aef70916bbaf3f6f7c9cf96
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-libs-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 639ffe372e75a86c37affd59798383ee217f70d6d8545816e47c05dca303ce2b
krb5-libs-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 639ffe372e75a86c37affd59798383ee217f70d6d8545816e47c05dca303ce2b
krb5-server-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: aa55b19c55b771142425d1a81422d091c327a658331f9680269c60376ad634b2
krb5-server-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: aa55b19c55b771142425d1a81422d091c327a658331f9680269c60376ad634b2
krb5-workstation-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 0739ccc49b21a8c47786afe11815a488dc98374da49fbfb6b6600a3e64374c24
krb5-workstation-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 0739ccc49b21a8c47786afe11815a488dc98374da49fbfb6b6600a3e64374c24
ia64
krb5-devel-1.3.4-54.el4_6.1.ia64.rpm SHA-256: 37bbab4f59a1a0a258ba0c948457200a516ca60b1cfae1fd65f7a9f30d3bd0a4
krb5-devel-1.3.4-54.el4_6.1.ia64.rpm SHA-256: 37bbab4f59a1a0a258ba0c948457200a516ca60b1cfae1fd65f7a9f30d3bd0a4
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-libs-1.3.4-54.el4_6.1.ia64.rpm SHA-256: cef7a8b357aff12be848598936dc845eb51f9c716136100070949fb52f52e24e
krb5-libs-1.3.4-54.el4_6.1.ia64.rpm SHA-256: cef7a8b357aff12be848598936dc845eb51f9c716136100070949fb52f52e24e
krb5-server-1.3.4-54.el4_6.1.ia64.rpm SHA-256: 98b7eaa5192944a44ed69f76cd7e68fd451cf3cc9cb195cf189bab3674633a13
krb5-server-1.3.4-54.el4_6.1.ia64.rpm SHA-256: 98b7eaa5192944a44ed69f76cd7e68fd451cf3cc9cb195cf189bab3674633a13
krb5-workstation-1.3.4-54.el4_6.1.ia64.rpm SHA-256: ca6c986fa0d7dbda50a4351b9bfe1b1689bbc20f5ea6e5b72e99f1f5770b485d
krb5-workstation-1.3.4-54.el4_6.1.ia64.rpm SHA-256: ca6c986fa0d7dbda50a4351b9bfe1b1689bbc20f5ea6e5b72e99f1f5770b485d
i386
krb5-devel-1.3.4-54.el4_6.1.i386.rpm SHA-256: 5fb571f124653f0dcd834d56d6b5ee49585361cef7a11c151de738e691949fa6
krb5-devel-1.3.4-54.el4_6.1.i386.rpm SHA-256: 5fb571f124653f0dcd834d56d6b5ee49585361cef7a11c151de738e691949fa6
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-server-1.3.4-54.el4_6.1.i386.rpm SHA-256: b6d2f1143ea50f4415b9718512fa01ee178d9cecd99fb2bb8ccbf6ecc6de9538
krb5-server-1.3.4-54.el4_6.1.i386.rpm SHA-256: b6d2f1143ea50f4415b9718512fa01ee178d9cecd99fb2bb8ccbf6ecc6de9538
krb5-workstation-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4d264fa26bbb50ad74db120a5069960b8e3fec76d548eab7210ad4bbc0976862
krb5-workstation-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4d264fa26bbb50ad74db120a5069960b8e3fec76d548eab7210ad4bbc0976862

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6

SRPM
krb5-1.3.4-54.el4_6.1.src.rpm SHA-256: 90cd34082ae2398755b13d59df65123a20f6c639a166029af16f1ff15ae74cc8
x86_64
krb5-devel-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 1946ecd92abc9a5a9bee8052db30256390b421f08aef70916bbaf3f6f7c9cf96
krb5-devel-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 1946ecd92abc9a5a9bee8052db30256390b421f08aef70916bbaf3f6f7c9cf96
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-libs-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 639ffe372e75a86c37affd59798383ee217f70d6d8545816e47c05dca303ce2b
krb5-libs-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 639ffe372e75a86c37affd59798383ee217f70d6d8545816e47c05dca303ce2b
krb5-server-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: aa55b19c55b771142425d1a81422d091c327a658331f9680269c60376ad634b2
krb5-server-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: aa55b19c55b771142425d1a81422d091c327a658331f9680269c60376ad634b2
krb5-workstation-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 0739ccc49b21a8c47786afe11815a488dc98374da49fbfb6b6600a3e64374c24
krb5-workstation-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 0739ccc49b21a8c47786afe11815a488dc98374da49fbfb6b6600a3e64374c24
ia64
krb5-devel-1.3.4-54.el4_6.1.ia64.rpm SHA-256: 37bbab4f59a1a0a258ba0c948457200a516ca60b1cfae1fd65f7a9f30d3bd0a4
krb5-devel-1.3.4-54.el4_6.1.ia64.rpm SHA-256: 37bbab4f59a1a0a258ba0c948457200a516ca60b1cfae1fd65f7a9f30d3bd0a4
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-libs-1.3.4-54.el4_6.1.ia64.rpm SHA-256: cef7a8b357aff12be848598936dc845eb51f9c716136100070949fb52f52e24e
krb5-libs-1.3.4-54.el4_6.1.ia64.rpm SHA-256: cef7a8b357aff12be848598936dc845eb51f9c716136100070949fb52f52e24e
krb5-server-1.3.4-54.el4_6.1.ia64.rpm SHA-256: 98b7eaa5192944a44ed69f76cd7e68fd451cf3cc9cb195cf189bab3674633a13
krb5-server-1.3.4-54.el4_6.1.ia64.rpm SHA-256: 98b7eaa5192944a44ed69f76cd7e68fd451cf3cc9cb195cf189bab3674633a13
krb5-workstation-1.3.4-54.el4_6.1.ia64.rpm SHA-256: ca6c986fa0d7dbda50a4351b9bfe1b1689bbc20f5ea6e5b72e99f1f5770b485d
krb5-workstation-1.3.4-54.el4_6.1.ia64.rpm SHA-256: ca6c986fa0d7dbda50a4351b9bfe1b1689bbc20f5ea6e5b72e99f1f5770b485d
i386
krb5-devel-1.3.4-54.el4_6.1.i386.rpm SHA-256: 5fb571f124653f0dcd834d56d6b5ee49585361cef7a11c151de738e691949fa6
krb5-devel-1.3.4-54.el4_6.1.i386.rpm SHA-256: 5fb571f124653f0dcd834d56d6b5ee49585361cef7a11c151de738e691949fa6
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-server-1.3.4-54.el4_6.1.i386.rpm SHA-256: b6d2f1143ea50f4415b9718512fa01ee178d9cecd99fb2bb8ccbf6ecc6de9538
krb5-server-1.3.4-54.el4_6.1.i386.rpm SHA-256: b6d2f1143ea50f4415b9718512fa01ee178d9cecd99fb2bb8ccbf6ecc6de9538
krb5-workstation-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4d264fa26bbb50ad74db120a5069960b8e3fec76d548eab7210ad4bbc0976862
krb5-workstation-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4d264fa26bbb50ad74db120a5069960b8e3fec76d548eab7210ad4bbc0976862

Red Hat Enterprise Linux Workstation 4

SRPM
krb5-1.3.4-54.el4_6.1.src.rpm SHA-256: 90cd34082ae2398755b13d59df65123a20f6c639a166029af16f1ff15ae74cc8
x86_64
krb5-devel-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 1946ecd92abc9a5a9bee8052db30256390b421f08aef70916bbaf3f6f7c9cf96
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-libs-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 639ffe372e75a86c37affd59798383ee217f70d6d8545816e47c05dca303ce2b
krb5-server-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: aa55b19c55b771142425d1a81422d091c327a658331f9680269c60376ad634b2
krb5-workstation-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 0739ccc49b21a8c47786afe11815a488dc98374da49fbfb6b6600a3e64374c24
ia64
krb5-devel-1.3.4-54.el4_6.1.ia64.rpm SHA-256: 37bbab4f59a1a0a258ba0c948457200a516ca60b1cfae1fd65f7a9f30d3bd0a4
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-libs-1.3.4-54.el4_6.1.ia64.rpm SHA-256: cef7a8b357aff12be848598936dc845eb51f9c716136100070949fb52f52e24e
krb5-server-1.3.4-54.el4_6.1.ia64.rpm SHA-256: 98b7eaa5192944a44ed69f76cd7e68fd451cf3cc9cb195cf189bab3674633a13
krb5-workstation-1.3.4-54.el4_6.1.ia64.rpm SHA-256: ca6c986fa0d7dbda50a4351b9bfe1b1689bbc20f5ea6e5b72e99f1f5770b485d
i386
krb5-devel-1.3.4-54.el4_6.1.i386.rpm SHA-256: 5fb571f124653f0dcd834d56d6b5ee49585361cef7a11c151de738e691949fa6
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-server-1.3.4-54.el4_6.1.i386.rpm SHA-256: b6d2f1143ea50f4415b9718512fa01ee178d9cecd99fb2bb8ccbf6ecc6de9538
krb5-workstation-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4d264fa26bbb50ad74db120a5069960b8e3fec76d548eab7210ad4bbc0976862

Red Hat Enterprise Linux Desktop 4

SRPM
krb5-1.3.4-54.el4_6.1.src.rpm SHA-256: 90cd34082ae2398755b13d59df65123a20f6c639a166029af16f1ff15ae74cc8
x86_64
krb5-devel-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 1946ecd92abc9a5a9bee8052db30256390b421f08aef70916bbaf3f6f7c9cf96
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-libs-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 639ffe372e75a86c37affd59798383ee217f70d6d8545816e47c05dca303ce2b
krb5-server-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: aa55b19c55b771142425d1a81422d091c327a658331f9680269c60376ad634b2
krb5-workstation-1.3.4-54.el4_6.1.x86_64.rpm SHA-256: 0739ccc49b21a8c47786afe11815a488dc98374da49fbfb6b6600a3e64374c24
i386
krb5-devel-1.3.4-54.el4_6.1.i386.rpm SHA-256: 5fb571f124653f0dcd834d56d6b5ee49585361cef7a11c151de738e691949fa6
krb5-libs-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4a8c31e5d4d0323fe390b78433f8d35ee0cc599f2526489fd7786d962fb6a783
krb5-server-1.3.4-54.el4_6.1.i386.rpm SHA-256: b6d2f1143ea50f4415b9718512fa01ee178d9cecd99fb2bb8ccbf6ecc6de9538
krb5-workstation-1.3.4-54.el4_6.1.i386.rpm SHA-256: 4d264fa26bbb50ad74db120a5069960b8e3fec76d548eab7210ad4bbc0976862

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
krb5-1.3.4-54.el4_6.1.src.rpm SHA-256: 90cd34082ae2398755b13d59df65123a20f6c639a166029af16f1ff15ae74cc8
s390x
krb5-devel-1.3.4-54.el4_6.1.s390x.rpm SHA-256: 1d05804b39eb02eb60fe0799539704b21e044f9ee7eb97410e2a935ea8c2d0cb
krb5-libs-1.3.4-54.el4_6.1.s390.rpm SHA-256: fc831e32b9b5c612474a8b58606175fe0cae20eaf8f140238c669615d7b41bdc
krb5-libs-1.3.4-54.el4_6.1.s390x.rpm SHA-256: 18b0533b93efe43e588f3c7a8cab6a10461572b67c6d7dbd7aa1aeaf7eb7d6e6
krb5-server-1.3.4-54.el4_6.1.s390x.rpm SHA-256: 9d7706f2f5dfa0b089e7efd450e91f68f6ca5fd333d2795b1fddb8ed95bafa98
krb5-workstation-1.3.4-54.el4_6.1.s390x.rpm SHA-256: 795d2d5dcd0330a22448e3c4faedb0e72c6c1b2133b66dcb0331ac131b54419c
s390
krb5-devel-1.3.4-54.el4_6.1.s390.rpm SHA-256: 44ac3369386504fc55964155f7f66ebb4e4c29a60a82ec40740c7000f3955cb1
krb5-libs-1.3.4-54.el4_6.1.s390.rpm SHA-256: fc831e32b9b5c612474a8b58606175fe0cae20eaf8f140238c669615d7b41bdc
krb5-server-1.3.4-54.el4_6.1.s390.rpm SHA-256: b4a3475644e011f1270ca8d2ad93a5e277be1add41f136cbf9ad158b082bcea2
krb5-workstation-1.3.4-54.el4_6.1.s390.rpm SHA-256: 25bc72d5aa51ecf59dda28109cc798fb8e262d4de7b6b97ddaa27f80d0b4a5dd

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6

SRPM
krb5-1.3.4-54.el4_6.1.src.rpm SHA-256: 90cd34082ae2398755b13d59df65123a20f6c639a166029af16f1ff15ae74cc8
s390x
krb5-devel-1.3.4-54.el4_6.1.s390x.rpm SHA-256: 1d05804b39eb02eb60fe0799539704b21e044f9ee7eb97410e2a935ea8c2d0cb
krb5-libs-1.3.4-54.el4_6.1.s390.rpm SHA-256: fc831e32b9b5c612474a8b58606175fe0cae20eaf8f140238c669615d7b41bdc
krb5-libs-1.3.4-54.el4_6.1.s390x.rpm SHA-256: 18b0533b93efe43e588f3c7a8cab6a10461572b67c6d7dbd7aa1aeaf7eb7d6e6
krb5-server-1.3.4-54.el4_6.1.s390x.rpm SHA-256: 9d7706f2f5dfa0b089e7efd450e91f68f6ca5fd333d2795b1fddb8ed95bafa98
krb5-workstation-1.3.4-54.el4_6.1.s390x.rpm SHA-256: 795d2d5dcd0330a22448e3c4faedb0e72c6c1b2133b66dcb0331ac131b54419c
s390
krb5-devel-1.3.4-54.el4_6.1.s390.rpm SHA-256: 44ac3369386504fc55964155f7f66ebb4e4c29a60a82ec40740c7000f3955cb1
krb5-libs-1.3.4-54.el4_6.1.s390.rpm SHA-256: fc831e32b9b5c612474a8b58606175fe0cae20eaf8f140238c669615d7b41bdc
krb5-server-1.3.4-54.el4_6.1.s390.rpm SHA-256: b4a3475644e011f1270ca8d2ad93a5e277be1add41f136cbf9ad158b082bcea2
krb5-workstation-1.3.4-54.el4_6.1.s390.rpm SHA-256: 25bc72d5aa51ecf59dda28109cc798fb8e262d4de7b6b97ddaa27f80d0b4a5dd

Red Hat Enterprise Linux for Power, big endian 4

SRPM
krb5-1.3.4-54.el4_6.1.src.rpm SHA-256: 90cd34082ae2398755b13d59df65123a20f6c639a166029af16f1ff15ae74cc8
ppc
krb5-devel-1.3.4-54.el4_6.1.ppc.rpm SHA-256: 51980edd64ff827c3b3c17d0419740085abc700a435de90b35ad45c6d6e465eb
krb5-libs-1.3.4-54.el4_6.1.ppc.rpm SHA-256: 31f99a7a1da88d26d11e89802b54cc02054b04cc9da2eb769e2616e5aeff1cf1
krb5-libs-1.3.4-54.el4_6.1.ppc64.rpm SHA-256: 666b612c3286cc8f74a0a6351be1fe51c5e7d0202b9e6d5db6c479d64ce6fa6c
krb5-server-1.3.4-54.el4_6.1.ppc.rpm SHA-256: ea7aa9c62159964eb2d919a7ddb962287248d4dfd4f33d984d4366e1286dbf78
krb5-workstation-1.3.4-54.el4_6.1.ppc.rpm SHA-256: 33aa547e3763f186ffc7544551175d2dbc24b7c656082df466cafc8dc4cd8265

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.6

SRPM
krb5-1.3.4-54.el4_6.1.src.rpm SHA-256: 90cd34082ae2398755b13d59df65123a20f6c639a166029af16f1ff15ae74cc8
ppc
krb5-devel-1.3.4-54.el4_6.1.ppc.rpm SHA-256: 51980edd64ff827c3b3c17d0419740085abc700a435de90b35ad45c6d6e465eb
krb5-libs-1.3.4-54.el4_6.1.ppc.rpm SHA-256: 31f99a7a1da88d26d11e89802b54cc02054b04cc9da2eb769e2616e5aeff1cf1
krb5-libs-1.3.4-54.el4_6.1.ppc64.rpm SHA-256: 666b612c3286cc8f74a0a6351be1fe51c5e7d0202b9e6d5db6c479d64ce6fa6c
krb5-server-1.3.4-54.el4_6.1.ppc.rpm SHA-256: ea7aa9c62159964eb2d919a7ddb962287248d4dfd4f33d984d4366e1286dbf78
krb5-workstation-1.3.4-54.el4_6.1.ppc.rpm SHA-256: 33aa547e3763f186ffc7544551175d2dbc24b7c656082df466cafc8dc4cd8265

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility