Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0343 - Security Advisory
Issued:
2010-04-06
Updated:
2010-04-06

RHSA-2010:0343 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: krb5 security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated krb5 packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

Kerberos is a network authentication system which allows clients and
servers to authenticate to each other using symmetric encryption and a
trusted third party, the Key Distribution Center (KDC).

A use-after-free flaw was discovered in the MIT Kerberos administration
daemon, kadmind. A remote, authenticated attacker could use this flaw to
crash the kadmind daemon. Administrative privileges are not required to
trigger this flaw, as any realm user can request information about their
own principal from kadmind. (CVE-2010-0629)

This update also fixes the following bug:

  • when a Kerberos client seeks tickets for use with a service, it must

contact the Key Distribution Center (KDC) to obtain them. The client must
also determine which realm the service belongs to and it typically does
this with a combination of client configuration detail, DNS information and
guesswork.

If the service belongs to a realm other than the client's, cross-realm
authentication is required. Using a combination of client configuration and
guesswork, the client determines the trust relationship sequence which
forms the trusted path between the client's realm and the service's realm.
This may include one or more intermediate realms.

Anticipating the KDC has better knowledge of extant trust relationships,
the client then requests a ticket from the service's KDC, indicating it
will accept guidance from the service's KDC by setting a special flag in
the request. A KDC which recognizes the flag can, at its option, return a
ticket-granting ticket for the next realm along the trust path the client
should be following.

If the ticket-granting ticket returned by the service's KDC is for use with
a realm the client has already determined was in the trusted path, the
client accepts this as an optimization and continues. If, however, the
ticket is for use in a realm the client is not expecting, the client
responds incorrectly: it treats the case as an error rather than continuing
along the path suggested by the service's KDC.

For this update, the krb5 1.7 modifications which allow the client to trust
such KDCs to send them along the correct path, resulting in the client
obtaining the tickets it originally desired, were backported to krb 1.6.1
(the version shipped with Red Hat Enterprise Linux 5.5). (BZ#578540)

All krb5 users should upgrade to these updated packages, which contain
backported patches to correct these issues. All running KDC services must
be restarted for the update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 576011 - CVE-2010-0629 krb5: kadmind use-after-free remote crash (MITKRB5-SA-2010-003)
  • BZ - 578540 - [RFE] Backport referral-chasing code within krb5-1.7 to RHEL5

CVEs

  • CVE-2010-0629

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
krb5-1.6.1-36.el5_5.2.src.rpm SHA-256: ae39aae8be2533800bef6421ac878b9d4cb41875ad2de86d81b6496c65401e08
x86_64
krb5-devel-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7b8455f61e91264f68047c2d814f9d475b5c73e6f7f6f57c1a26849f23e7ea32
krb5-devel-1.6.1-36.el5_5.2.x86_64.rpm SHA-256: 3f89f6da8aa11a06ead9f21cdee9f4a83fae7660d1f4b5ab29826e72853f886b
krb5-libs-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7c8246bf6cb9c9c1d5589a1c0f0292cd911a92183eb3e6a24bd35b869b6356f7
krb5-libs-1.6.1-36.el5_5.2.x86_64.rpm SHA-256: 86555fd0ec626f362a9d27e0043c61460414ac64cbd517b8d6b5af5c65e5e5b1
krb5-server-1.6.1-36.el5_5.2.x86_64.rpm SHA-256: 8b024a3192e61a8787e76332db2a44809777083d262f0e0b1efd22aa314b650f
krb5-workstation-1.6.1-36.el5_5.2.x86_64.rpm SHA-256: 3455a392deb43aba01ed1a435c03f898d383eb34f3db88754f33382c102dd06e
ia64
krb5-devel-1.6.1-36.el5_5.2.ia64.rpm SHA-256: c25ffe603b5246a77f7300a91f579994f807be4907e2e9a97c2d3b5ded4ef9a4
krb5-libs-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7c8246bf6cb9c9c1d5589a1c0f0292cd911a92183eb3e6a24bd35b869b6356f7
krb5-libs-1.6.1-36.el5_5.2.ia64.rpm SHA-256: 7a37b67e621aac86dd914c914ebe3b92279afc09223c4e207b6828975142f1fc
krb5-server-1.6.1-36.el5_5.2.ia64.rpm SHA-256: bc032511c45ca70a09ba05e9146e632896c618a7c69bf69abd07cc24b6fe10a9
krb5-workstation-1.6.1-36.el5_5.2.ia64.rpm SHA-256: 6213e3ffb3aaffbd6c64b698ad1db3172255c16d0c6598d3d28fd969ffc71fb6
i386
krb5-devel-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7b8455f61e91264f68047c2d814f9d475b5c73e6f7f6f57c1a26849f23e7ea32
krb5-libs-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7c8246bf6cb9c9c1d5589a1c0f0292cd911a92183eb3e6a24bd35b869b6356f7
krb5-server-1.6.1-36.el5_5.2.i386.rpm SHA-256: 2759f4fc716171a4caf9cc9e08ed7babaa9a62384c5ee58860804104cedeb77d
krb5-workstation-1.6.1-36.el5_5.2.i386.rpm SHA-256: 3c29a59664eee7e785d7264801d3e5c3db7b0c901095176bb4518f72c4eba775

Red Hat Enterprise Linux Workstation 5

SRPM
krb5-1.6.1-36.el5_5.2.src.rpm SHA-256: ae39aae8be2533800bef6421ac878b9d4cb41875ad2de86d81b6496c65401e08
x86_64
krb5-devel-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7b8455f61e91264f68047c2d814f9d475b5c73e6f7f6f57c1a26849f23e7ea32
krb5-devel-1.6.1-36.el5_5.2.x86_64.rpm SHA-256: 3f89f6da8aa11a06ead9f21cdee9f4a83fae7660d1f4b5ab29826e72853f886b
krb5-libs-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7c8246bf6cb9c9c1d5589a1c0f0292cd911a92183eb3e6a24bd35b869b6356f7
krb5-libs-1.6.1-36.el5_5.2.x86_64.rpm SHA-256: 86555fd0ec626f362a9d27e0043c61460414ac64cbd517b8d6b5af5c65e5e5b1
krb5-server-1.6.1-36.el5_5.2.x86_64.rpm SHA-256: 8b024a3192e61a8787e76332db2a44809777083d262f0e0b1efd22aa314b650f
krb5-workstation-1.6.1-36.el5_5.2.x86_64.rpm SHA-256: 3455a392deb43aba01ed1a435c03f898d383eb34f3db88754f33382c102dd06e
i386
krb5-devel-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7b8455f61e91264f68047c2d814f9d475b5c73e6f7f6f57c1a26849f23e7ea32
krb5-libs-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7c8246bf6cb9c9c1d5589a1c0f0292cd911a92183eb3e6a24bd35b869b6356f7
krb5-server-1.6.1-36.el5_5.2.i386.rpm SHA-256: 2759f4fc716171a4caf9cc9e08ed7babaa9a62384c5ee58860804104cedeb77d
krb5-workstation-1.6.1-36.el5_5.2.i386.rpm SHA-256: 3c29a59664eee7e785d7264801d3e5c3db7b0c901095176bb4518f72c4eba775

Red Hat Enterprise Linux Desktop 5

SRPM
krb5-1.6.1-36.el5_5.2.src.rpm SHA-256: ae39aae8be2533800bef6421ac878b9d4cb41875ad2de86d81b6496c65401e08
x86_64
krb5-libs-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7c8246bf6cb9c9c1d5589a1c0f0292cd911a92183eb3e6a24bd35b869b6356f7
krb5-libs-1.6.1-36.el5_5.2.x86_64.rpm SHA-256: 86555fd0ec626f362a9d27e0043c61460414ac64cbd517b8d6b5af5c65e5e5b1
krb5-workstation-1.6.1-36.el5_5.2.x86_64.rpm SHA-256: 3455a392deb43aba01ed1a435c03f898d383eb34f3db88754f33382c102dd06e
i386
krb5-libs-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7c8246bf6cb9c9c1d5589a1c0f0292cd911a92183eb3e6a24bd35b869b6356f7
krb5-workstation-1.6.1-36.el5_5.2.i386.rpm SHA-256: 3c29a59664eee7e785d7264801d3e5c3db7b0c901095176bb4518f72c4eba775

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
krb5-1.6.1-36.el5_5.2.src.rpm SHA-256: ae39aae8be2533800bef6421ac878b9d4cb41875ad2de86d81b6496c65401e08
s390x
krb5-devel-1.6.1-36.el5_5.2.s390.rpm SHA-256: 85b44a6e18570d931b13b349493383400aee250f5fce42f7ce25010da4ea4fd3
krb5-devel-1.6.1-36.el5_5.2.s390x.rpm SHA-256: 0b8cf9d6f2c695bbee0f277c2da106d0e2a9607cb3b6d41ca793b936b19100b0
krb5-libs-1.6.1-36.el5_5.2.s390.rpm SHA-256: 286f25b3c351b669d1f1140abad6aec35257a93f9b94e669015ca3c225c58d0f
krb5-libs-1.6.1-36.el5_5.2.s390x.rpm SHA-256: 3fa191f573492bc60d5da94413cb733e4cc0ec7005296f6fb84c8c5f955849d7
krb5-server-1.6.1-36.el5_5.2.s390x.rpm SHA-256: e7e10f188d001f72e5b7dae7635663f0781591a90c2c65a9ffaaa9b69a083563
krb5-workstation-1.6.1-36.el5_5.2.s390x.rpm SHA-256: 981b6f73a67f3d229cf2d4df8f09f481223e7d215d58c88a0629278e383ca75a

Red Hat Enterprise Linux for Power, big endian 5

SRPM
krb5-1.6.1-36.el5_5.2.src.rpm SHA-256: ae39aae8be2533800bef6421ac878b9d4cb41875ad2de86d81b6496c65401e08
ppc
krb5-devel-1.6.1-36.el5_5.2.ppc.rpm SHA-256: e281ba8ee69fe6e81c08a27efb153def5d1ee9f6352ba05bd685af8cfe41f9d3
krb5-devel-1.6.1-36.el5_5.2.ppc64.rpm SHA-256: 16264e4253290c8500fad7d551fbcbdd325c7c9ccb50b1938e0c98f1ec6da08e
krb5-libs-1.6.1-36.el5_5.2.ppc.rpm SHA-256: 564988a827da30f00ec92d893b2db9aa05cf31dce6c53fb0f6045db093af7f2c
krb5-libs-1.6.1-36.el5_5.2.ppc64.rpm SHA-256: 74abebec568cdcd7073338d904716a410943904c55608ef09297cfdfc43ec662
krb5-server-1.6.1-36.el5_5.2.ppc.rpm SHA-256: e6815829dd7934cf2659161e714a2a3c752176c565b401947092ff5f52e01595
krb5-workstation-1.6.1-36.el5_5.2.ppc.rpm SHA-256: ab5d1f2fb1d6c38fc37ec49fa1b2f9d446f151a161c9443f4d7ce75739d04436

Red Hat Enterprise Linux Server from RHUI 5

SRPM
krb5-1.6.1-36.el5_5.2.src.rpm SHA-256: ae39aae8be2533800bef6421ac878b9d4cb41875ad2de86d81b6496c65401e08
x86_64
krb5-devel-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7b8455f61e91264f68047c2d814f9d475b5c73e6f7f6f57c1a26849f23e7ea32
krb5-devel-1.6.1-36.el5_5.2.x86_64.rpm SHA-256: 3f89f6da8aa11a06ead9f21cdee9f4a83fae7660d1f4b5ab29826e72853f886b
krb5-libs-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7c8246bf6cb9c9c1d5589a1c0f0292cd911a92183eb3e6a24bd35b869b6356f7
krb5-libs-1.6.1-36.el5_5.2.x86_64.rpm SHA-256: 86555fd0ec626f362a9d27e0043c61460414ac64cbd517b8d6b5af5c65e5e5b1
krb5-server-1.6.1-36.el5_5.2.x86_64.rpm SHA-256: 8b024a3192e61a8787e76332db2a44809777083d262f0e0b1efd22aa314b650f
krb5-workstation-1.6.1-36.el5_5.2.x86_64.rpm SHA-256: 3455a392deb43aba01ed1a435c03f898d383eb34f3db88754f33382c102dd06e
i386
krb5-devel-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7b8455f61e91264f68047c2d814f9d475b5c73e6f7f6f57c1a26849f23e7ea32
krb5-libs-1.6.1-36.el5_5.2.i386.rpm SHA-256: 7c8246bf6cb9c9c1d5589a1c0f0292cd911a92183eb3e6a24bd35b869b6356f7
krb5-server-1.6.1-36.el5_5.2.i386.rpm SHA-256: 2759f4fc716171a4caf9cc9e08ed7babaa9a62384c5ee58860804104cedeb77d
krb5-workstation-1.6.1-36.el5_5.2.i386.rpm SHA-256: 3c29a59664eee7e785d7264801d3e5c3db7b0c901095176bb4518f72c4eba775

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our <a href='http://www.redhat.com/en/about/privacy-policy' class='privacy-policy'>Privacy Statement</a> effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter