Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-0063 (GCVE-0-2008-0063)
Vulnerability from cvelistv5 – Published: 2008-03-19 10:00 – Updated: 2024-08-07 07:32- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:32:23.883Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-1744",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1744"
},
{
"name": "29457",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29457"
},
{
"name": "MDVSA-2008:069",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:069"
},
{
"name": "29464",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29464"
},
{
"name": "GLSA-200803-31",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml"
},
{
"name": "krb5-kdc-kerberos4-info-disclosure(41277)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41277"
},
{
"name": "FEDORA-2008-2637",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html"
},
{
"name": "MDVSA-2008:071",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:071"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0112"
},
{
"name": "1019627",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019627"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html"
},
{
"name": "29451",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29451"
},
{
"name": "29663",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29663"
},
{
"name": "FEDORA-2008-2647",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112"
},
{
"name": "29438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29438"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html"
},
{
"name": "ADV-2008-0924",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
},
{
"name": "RHSA-2008:0164",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0164.html"
},
{
"name": "MDVSA-2008:070",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:070"
},
{
"name": "ADV-2008-0922",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0922/references"
},
{
"name": "29450",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29450"
},
{
"name": "29435",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29435"
},
{
"name": "20080319 rPSA-2008-0112-1 krb5 krb5-server krb5-services krb5-test krb5-workstation",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/489883/100/0/threaded"
},
{
"name": "29428",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29428"
},
{
"name": "29420",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29420"
},
{
"name": "DSA-1524",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1524"
},
{
"name": "30535",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30535"
},
{
"name": "APPLE-SA-2008-03-18",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name": "RHSA-2008:0182",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0182.html"
},
{
"name": "oval:org.mitre.oval:def:8916",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html"
},
{
"name": "20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded"
},
{
"name": "RHSA-2008:0180",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0180.html"
},
{
"name": "SUSE-SA:2008:016",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html"
},
{
"name": "29516",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29516"
},
{
"name": "29462",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29462"
},
{
"name": "29424",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29424"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"name": "RHSA-2008:0181",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0181.html"
},
{
"name": "29423",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29423"
},
{
"name": "USN-587-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-587-1"
},
{
"name": "ADV-2008-1102",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1102/references"
},
{
"name": "28303",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28303"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt"
},
{
"name": "20080318 MITKRB5-SA-2008-001: double-free, uninitialized data vulnerabilities in krb5kdc",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/489761"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka \"Uninitialized stack values.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2008-1744",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1744"
},
{
"name": "29457",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29457"
},
{
"name": "MDVSA-2008:069",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:069"
},
{
"name": "29464",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29464"
},
{
"name": "GLSA-200803-31",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml"
},
{
"name": "krb5-kdc-kerberos4-info-disclosure(41277)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41277"
},
{
"name": "FEDORA-2008-2637",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html"
},
{
"name": "MDVSA-2008:071",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:071"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0112"
},
{
"name": "1019627",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019627"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html"
},
{
"name": "29451",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29451"
},
{
"name": "29663",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29663"
},
{
"name": "FEDORA-2008-2647",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112"
},
{
"name": "29438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29438"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html"
},
{
"name": "ADV-2008-0924",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
},
{
"name": "RHSA-2008:0164",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0164.html"
},
{
"name": "MDVSA-2008:070",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:070"
},
{
"name": "ADV-2008-0922",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0922/references"
},
{
"name": "29450",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29450"
},
{
"name": "29435",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29435"
},
{
"name": "20080319 rPSA-2008-0112-1 krb5 krb5-server krb5-services krb5-test krb5-workstation",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/489883/100/0/threaded"
},
{
"name": "29428",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29428"
},
{
"name": "29420",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29420"
},
{
"name": "DSA-1524",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1524"
},
{
"name": "30535",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30535"
},
{
"name": "APPLE-SA-2008-03-18",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name": "RHSA-2008:0182",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0182.html"
},
{
"name": "oval:org.mitre.oval:def:8916",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html"
},
{
"name": "20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded"
},
{
"name": "RHSA-2008:0180",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0180.html"
},
{
"name": "SUSE-SA:2008:016",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html"
},
{
"name": "29516",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29516"
},
{
"name": "29462",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29462"
},
{
"name": "29424",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29424"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"name": "RHSA-2008:0181",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0181.html"
},
{
"name": "29423",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29423"
},
{
"name": "USN-587-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-587-1"
},
{
"name": "ADV-2008-1102",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1102/references"
},
{
"name": "28303",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28303"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt"
},
{
"name": "20080318 MITKRB5-SA-2008-001: double-free, uninitialized data vulnerabilities in krb5kdc",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/489761"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-0063",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka \"Uninitialized stack values.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1744",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1744"
},
{
"name": "29457",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29457"
},
{
"name": "MDVSA-2008:069",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:069"
},
{
"name": "29464",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29464"
},
{
"name": "GLSA-200803-31",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml"
},
{
"name": "krb5-kdc-kerberos4-info-disclosure(41277)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41277"
},
{
"name": "FEDORA-2008-2637",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html"
},
{
"name": "MDVSA-2008:071",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:071"
},
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0112",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0112"
},
{
"name": "1019627",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019627"
},
{
"name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html"
},
{
"name": "29451",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29451"
},
{
"name": "29663",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29663"
},
{
"name": "FEDORA-2008-2647",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112"
},
{
"name": "29438",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29438"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html"
},
{
"name": "ADV-2008-0924",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
},
{
"name": "RHSA-2008:0164",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0164.html"
},
{
"name": "MDVSA-2008:070",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:070"
},
{
"name": "ADV-2008-0922",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0922/references"
},
{
"name": "29450",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29450"
},
{
"name": "29435",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29435"
},
{
"name": "20080319 rPSA-2008-0112-1 krb5 krb5-server krb5-services krb5-test krb5-workstation",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489883/100/0/threaded"
},
{
"name": "29428",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29428"
},
{
"name": "29420",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29420"
},
{
"name": "DSA-1524",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1524"
},
{
"name": "30535",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30535"
},
{
"name": "APPLE-SA-2008-03-18",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name": "RHSA-2008:0182",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0182.html"
},
{
"name": "oval:org.mitre.oval:def:8916",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916"
},
{
"name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html"
},
{
"name": "20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded"
},
{
"name": "RHSA-2008:0180",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0180.html"
},
{
"name": "SUSE-SA:2008:016",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html"
},
{
"name": "29516",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29516"
},
{
"name": "29462",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29462"
},
{
"name": "29424",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29424"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307562",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"name": "RHSA-2008:0181",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0181.html"
},
{
"name": "29423",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29423"
},
{
"name": "USN-587-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-587-1"
},
{
"name": "ADV-2008-1102",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1102/references"
},
{
"name": "28303",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28303"
},
{
"name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt",
"refsource": "CONFIRM",
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt"
},
{
"name": "20080318 MITKRB5-SA-2008-001: double-free, uninitialized data vulnerabilities in krb5kdc",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489761"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-0063",
"datePublished": "2008-03-19T10:00:00",
"dateReserved": "2008-01-03T00:00:00",
"dateUpdated": "2024-08-07T07:32:23.883Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2008-0063\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-03-19T10:44:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka \\\"Uninitialized stack values.\\\"\"},{\"lang\":\"es\",\"value\":\"El soporte Kerberos 4 en KDC en MIT Kerberos 5 (krb5kdc) no borra apropiadamente la parte no utilizada de un b\u00fafer cuando se genera un mensaje de error, lo que podr\u00eda permitir a los atacantes remotos obtener informaci\u00f3n confidencial, tambi\u00e9n se conoce como \\\"Uninitialized stack values.\\\"\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-908\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.6.3\",\"matchCriteriaId\":\"904FBF9F-9269-4088-BD5A-3C773E6F841E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.11\",\"matchCriteriaId\":\"A1E0F574-6859-45A6-B160-7DDE92C07CC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.5.0\",\"versionEndExcluding\":\"10.5.2\",\"matchCriteriaId\":\"D139BCA7-8B43-4BDE-9AE9-5F41F4B6BD0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.11\",\"matchCriteriaId\":\"B2D0444E-6B76-46EE-95EF-617F8967F6B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.5.0\",\"versionEndExcluding\":\"10.5.2\",\"matchCriteriaId\":\"E4317913-336B-40CD-AF63-9F11C374419D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24818450-FDA1-429A-AC17-68F44F584217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35B68DF-1440-4587-8458-9C5F4D1E43F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux:10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9BD0E68-2DC1-47EA-882A-6F5921A0F1BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8FC5E32-C9E3-49F6-9481-1DB60DEE8A07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"29184B59-5756-48DB-930C-69D5CD628548\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"33EB57D5-DE8D-417C-8C00-AD331D61181C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23E304C9-F780-4358-A58D-1E4C93977704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBDAFF8-DE44-4E80-B6BD-E341F767F501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"823BF8BE-2309-4F67-A5E2-EAD98F723468\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3EFD171-01F7-450B-B6F3-0F7E443A2337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72E4DB7F-07C3-46BB-AAA2-05CD0312C57F\"}]}]}],\"references\":[{\"url\":\"http://docs.info.apple.com/article.html?artnum=307562\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://secunia.com/advisories/29420\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29423\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29424\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29428\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29435\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29438\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29450\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29451\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29457\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29462\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29464\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29516\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29663\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30535\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2008-0112\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1524\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:069\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:070\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:071\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0164.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0180.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0181.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0182.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/489761\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/489883/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/493080/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/28303\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1019627\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-587-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0009.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0922/references\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0924/references\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1102/references\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1744\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41277\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://docs.info.apple.com/article.html?artnum=307562\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://secunia.com/advisories/29420\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29423\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29424\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29428\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29435\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29438\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29450\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29451\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29457\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29462\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29464\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29516\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29663\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30535\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2008-0112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1524\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:069\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:070\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:071\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0164.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0180.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0181.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0182.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/489761\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/489883/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/493080/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/28303\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1019627\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-587-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0922/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0924/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1102/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1744\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41277\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]}]}}"
}
}
GHSA-67PX-R9V8-HCFG
Vulnerability from github – Published: 2022-05-01 23:27 – Updated: 2024-02-09 03:32The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
{
"affected": [],
"aliases": [
"CVE-2008-0063"
],
"database_specific": {
"cwe_ids": [
"CWE-119",
"CWE-908"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2008-03-19T10:44:00Z",
"severity": "MODERATE"
},
"details": "The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka \"Uninitialized stack values.\"",
"id": "GHSA-67px-r9v8-hcfg",
"modified": "2024-02-09T03:32:53Z",
"published": "2022-05-01T23:27:25Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0063"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41277"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html"
},
{
"type": "WEB",
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29420"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29423"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29424"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29428"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29435"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29438"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29450"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29451"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29457"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29462"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29464"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29516"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29663"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30535"
},
{
"type": "WEB",
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html"
},
{
"type": "WEB",
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html"
},
{
"type": "WEB",
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0112"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1524"
},
{
"type": "WEB",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:069"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:070"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:071"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0164.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0180.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0181.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0182.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/489761"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/489883/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/28303"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1019627"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-587-1"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/0922/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/1102/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/1744"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
RHSA-2008:0181
Vulnerability from csaf_redhat - Published: 2008-03-18 18:54 - Updated: 2025-11-21 17:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated krb5 packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 2.1 and 3.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system which allows clients and\nservers to authenticate to each other through use of symmetric encryption\nand a trusted third party, the KDC.\n\nA flaw was found in the way the MIT Kerberos Authentication Service and Key\nDistribution Center server (krb5kdc) handled Kerberos v4 protocol packets.\nAn unauthenticated remote attacker could use this flaw to crash the\nkrb5kdc daemon, disclose portions of its memory, or possibly execute\narbitrary code using malformed or truncated Kerberos v4 protocol\nrequests. (CVE-2008-0062, CVE-2008-0063)\n\nThis issue only affected krb5kdc with Kerberos v4 protocol compatibility\nenabled, which is the default setting on Red Hat Enterprise Linux 4.\nKerberos v4 protocol support can be disabled by adding \"v4_mode=none\"\n(without the quotes) to the \"[kdcdefaults]\" section of\n/var/kerberos/krb5kdc/kdc.conf.\n\nA flaw was found in the RPC library used by the MIT Kerberos kadmind\nserver. An unauthenticated remote attacker could use this flaw to crash\nkadmind. This issue only affected systems with certain resource limits\nconfigured and did not affect systems using default resource limits used by\nRed Hat Enterprise Linux 2.1 or 3. (CVE-2008-0948)\n\nRed Hat would like to thank MIT for reporting these issues.\n\nAll krb5 users are advised to update to these erratum packages which\ncontain backported fixes to correct these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0181",
"url": "https://access.redhat.com/errata/RHSA-2008:0181"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "432620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432620"
},
{
"category": "external",
"summary": "432621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432621"
},
{
"category": "external",
"summary": "435087",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=435087"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0181.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-21T17:33:03+00:00",
"generator": {
"date": "2025-11-21T17:33:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0181",
"initial_release_date": "2008-03-18T18:54:00+00:00",
"revision_history": [
{
"date": "2008-03-18T18:54:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-03-18T15:19:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Linux Advanced Workstation 2.1",
"product": {
"name": "Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-workstation-0:1.2.2-48.ia64",
"product": {
"name": "krb5-workstation-0:1.2.2-48.ia64",
"product_id": "krb5-workstation-0:1.2.2-48.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.2.2-48?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.2.2-48.ia64",
"product": {
"name": "krb5-libs-0:1.2.2-48.ia64",
"product_id": "krb5-libs-0:1.2.2-48.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.2.2-48?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.2.2-48.ia64",
"product": {
"name": "krb5-devel-0:1.2.2-48.ia64",
"product_id": "krb5-devel-0:1.2.2-48.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.2.2-48?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.2.2-48.ia64",
"product": {
"name": "krb5-server-0:1.2.2-48.ia64",
"product_id": "krb5-server-0:1.2.2-48.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.2.2-48?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.2.7-68.ia64",
"product": {
"name": "krb5-server-0:1.2.7-68.ia64",
"product_id": "krb5-server-0:1.2.7-68.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.2.7-68?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.2.7-68.ia64",
"product": {
"name": "krb5-workstation-0:1.2.7-68.ia64",
"product_id": "krb5-workstation-0:1.2.7-68.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-68?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.2.7-68.ia64",
"product": {
"name": "krb5-libs-0:1.2.7-68.ia64",
"product_id": "krb5-libs-0:1.2.7-68.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.2.7-68?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.2.7-68.ia64",
"product": {
"name": "krb5-debuginfo-0:1.2.7-68.ia64",
"product_id": "krb5-debuginfo-0:1.2.7-68.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-68?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.2.7-68.ia64",
"product": {
"name": "krb5-devel-0:1.2.7-68.ia64",
"product_id": "krb5-devel-0:1.2.7-68.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.2.7-68?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.2.2-48.src",
"product": {
"name": "krb5-0:1.2.2-48.src",
"product_id": "krb5-0:1.2.2-48.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.2.2-48?arch=src"
}
}
},
{
"category": "product_version",
"name": "krb5-0:1.2.7-68.src",
"product": {
"name": "krb5-0:1.2.7-68.src",
"product_id": "krb5-0:1.2.7-68.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.2.7-68?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-workstation-0:1.2.2-48.i386",
"product": {
"name": "krb5-workstation-0:1.2.2-48.i386",
"product_id": "krb5-workstation-0:1.2.2-48.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.2.2-48?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.2.2-48.i386",
"product": {
"name": "krb5-libs-0:1.2.2-48.i386",
"product_id": "krb5-libs-0:1.2.2-48.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.2.2-48?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.2.2-48.i386",
"product": {
"name": "krb5-devel-0:1.2.2-48.i386",
"product_id": "krb5-devel-0:1.2.2-48.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.2.2-48?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.2.2-48.i386",
"product": {
"name": "krb5-server-0:1.2.2-48.i386",
"product_id": "krb5-server-0:1.2.2-48.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.2.2-48?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.2.7-68.i386",
"product": {
"name": "krb5-libs-0:1.2.7-68.i386",
"product_id": "krb5-libs-0:1.2.7-68.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.2.7-68?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.2.7-68.i386",
"product": {
"name": "krb5-debuginfo-0:1.2.7-68.i386",
"product_id": "krb5-debuginfo-0:1.2.7-68.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-68?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.2.7-68.i386",
"product": {
"name": "krb5-server-0:1.2.7-68.i386",
"product_id": "krb5-server-0:1.2.7-68.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.2.7-68?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.2.7-68.i386",
"product": {
"name": "krb5-workstation-0:1.2.7-68.i386",
"product_id": "krb5-workstation-0:1.2.7-68.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-68?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.2.7-68.i386",
"product": {
"name": "krb5-devel-0:1.2.7-68.i386",
"product_id": "krb5-devel-0:1.2.7-68.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.2.7-68?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-server-0:1.2.7-68.x86_64",
"product": {
"name": "krb5-server-0:1.2.7-68.x86_64",
"product_id": "krb5-server-0:1.2.7-68.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.2.7-68?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.2.7-68.x86_64",
"product": {
"name": "krb5-workstation-0:1.2.7-68.x86_64",
"product_id": "krb5-workstation-0:1.2.7-68.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-68?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.2.7-68.x86_64",
"product": {
"name": "krb5-libs-0:1.2.7-68.x86_64",
"product_id": "krb5-libs-0:1.2.7-68.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.2.7-68?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.2.7-68.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.2.7-68.x86_64",
"product_id": "krb5-debuginfo-0:1.2.7-68.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-68?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.2.7-68.x86_64",
"product": {
"name": "krb5-devel-0:1.2.7-68.x86_64",
"product_id": "krb5-devel-0:1.2.7-68.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.2.7-68?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-server-0:1.2.7-68.ppc",
"product": {
"name": "krb5-server-0:1.2.7-68.ppc",
"product_id": "krb5-server-0:1.2.7-68.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.2.7-68?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.2.7-68.ppc",
"product": {
"name": "krb5-workstation-0:1.2.7-68.ppc",
"product_id": "krb5-workstation-0:1.2.7-68.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-68?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.2.7-68.ppc",
"product": {
"name": "krb5-libs-0:1.2.7-68.ppc",
"product_id": "krb5-libs-0:1.2.7-68.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.2.7-68?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.2.7-68.ppc",
"product": {
"name": "krb5-debuginfo-0:1.2.7-68.ppc",
"product_id": "krb5-debuginfo-0:1.2.7-68.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-68?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.2.7-68.ppc",
"product": {
"name": "krb5-devel-0:1.2.7-68.ppc",
"product_id": "krb5-devel-0:1.2.7-68.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.2.7-68?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.2.7-68.ppc64",
"product": {
"name": "krb5-libs-0:1.2.7-68.ppc64",
"product_id": "krb5-libs-0:1.2.7-68.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.2.7-68?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.2.7-68.ppc64",
"product": {
"name": "krb5-debuginfo-0:1.2.7-68.ppc64",
"product_id": "krb5-debuginfo-0:1.2.7-68.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-68?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-server-0:1.2.7-68.s390x",
"product": {
"name": "krb5-server-0:1.2.7-68.s390x",
"product_id": "krb5-server-0:1.2.7-68.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.2.7-68?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.2.7-68.s390x",
"product": {
"name": "krb5-workstation-0:1.2.7-68.s390x",
"product_id": "krb5-workstation-0:1.2.7-68.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-68?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.2.7-68.s390x",
"product": {
"name": "krb5-libs-0:1.2.7-68.s390x",
"product_id": "krb5-libs-0:1.2.7-68.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.2.7-68?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.2.7-68.s390x",
"product": {
"name": "krb5-debuginfo-0:1.2.7-68.s390x",
"product_id": "krb5-debuginfo-0:1.2.7-68.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-68?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.2.7-68.s390x",
"product": {
"name": "krb5-devel-0:1.2.7-68.s390x",
"product_id": "krb5-devel-0:1.2.7-68.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.2.7-68?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.2.7-68.s390",
"product": {
"name": "krb5-libs-0:1.2.7-68.s390",
"product_id": "krb5-libs-0:1.2.7-68.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.2.7-68?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.2.7-68.s390",
"product": {
"name": "krb5-debuginfo-0:1.2.7-68.s390",
"product_id": "krb5-debuginfo-0:1.2.7-68.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-68?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.2.7-68.s390",
"product": {
"name": "krb5-server-0:1.2.7-68.s390",
"product_id": "krb5-server-0:1.2.7-68.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.2.7-68?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.2.7-68.s390",
"product": {
"name": "krb5-workstation-0:1.2.7-68.s390",
"product_id": "krb5-workstation-0:1.2.7-68.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-68?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.2.7-68.s390",
"product": {
"name": "krb5-devel-0:1.2.7-68.s390",
"product_id": "krb5-devel-0:1.2.7-68.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.2.7-68?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.2.2-48.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:krb5-0:1.2.2-48.src"
},
"product_reference": "krb5-0:1.2.2-48.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.2-48.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:krb5-devel-0:1.2.2-48.i386"
},
"product_reference": "krb5-devel-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.2-48.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:krb5-devel-0:1.2.2-48.ia64"
},
"product_reference": "krb5-devel-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.2-48.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:krb5-libs-0:1.2.2-48.i386"
},
"product_reference": "krb5-libs-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.2-48.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:krb5-libs-0:1.2.2-48.ia64"
},
"product_reference": "krb5-libs-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.2-48.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:krb5-server-0:1.2.2-48.i386"
},
"product_reference": "krb5-server-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.2-48.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:krb5-server-0:1.2.2-48.ia64"
},
"product_reference": "krb5-server-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.2-48.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:krb5-workstation-0:1.2.2-48.i386"
},
"product_reference": "krb5-workstation-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.2-48.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:krb5-workstation-0:1.2.2-48.ia64"
},
"product_reference": "krb5-workstation-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.2.2-48.src as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:krb5-0:1.2.2-48.src"
},
"product_reference": "krb5-0:1.2.2-48.src",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.2-48.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:krb5-devel-0:1.2.2-48.i386"
},
"product_reference": "krb5-devel-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.2-48.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:krb5-devel-0:1.2.2-48.ia64"
},
"product_reference": "krb5-devel-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.2-48.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:krb5-libs-0:1.2.2-48.i386"
},
"product_reference": "krb5-libs-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.2-48.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:krb5-libs-0:1.2.2-48.ia64"
},
"product_reference": "krb5-libs-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.2-48.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:krb5-server-0:1.2.2-48.i386"
},
"product_reference": "krb5-server-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.2-48.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:krb5-server-0:1.2.2-48.ia64"
},
"product_reference": "krb5-server-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.2-48.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:krb5-workstation-0:1.2.2-48.i386"
},
"product_reference": "krb5-workstation-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.2-48.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:krb5-workstation-0:1.2.2-48.ia64"
},
"product_reference": "krb5-workstation-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.2.2-48.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:krb5-0:1.2.2-48.src"
},
"product_reference": "krb5-0:1.2.2-48.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.2-48.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:krb5-devel-0:1.2.2-48.i386"
},
"product_reference": "krb5-devel-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.2-48.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:krb5-devel-0:1.2.2-48.ia64"
},
"product_reference": "krb5-devel-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.2-48.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:krb5-libs-0:1.2.2-48.i386"
},
"product_reference": "krb5-libs-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.2-48.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:krb5-libs-0:1.2.2-48.ia64"
},
"product_reference": "krb5-libs-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.2-48.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:krb5-server-0:1.2.2-48.i386"
},
"product_reference": "krb5-server-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.2-48.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:krb5-server-0:1.2.2-48.ia64"
},
"product_reference": "krb5-server-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.2-48.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:krb5-workstation-0:1.2.2-48.i386"
},
"product_reference": "krb5-workstation-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.2-48.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:krb5-workstation-0:1.2.2-48.ia64"
},
"product_reference": "krb5-workstation-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.2.2-48.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:krb5-0:1.2.2-48.src"
},
"product_reference": "krb5-0:1.2.2-48.src",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.2-48.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:krb5-devel-0:1.2.2-48.i386"
},
"product_reference": "krb5-devel-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.2-48.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:krb5-devel-0:1.2.2-48.ia64"
},
"product_reference": "krb5-devel-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.2-48.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:krb5-libs-0:1.2.2-48.i386"
},
"product_reference": "krb5-libs-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.2-48.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:krb5-libs-0:1.2.2-48.ia64"
},
"product_reference": "krb5-libs-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.2-48.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:krb5-server-0:1.2.2-48.i386"
},
"product_reference": "krb5-server-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.2-48.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:krb5-server-0:1.2.2-48.ia64"
},
"product_reference": "krb5-server-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.2-48.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:krb5-workstation-0:1.2.2-48.i386"
},
"product_reference": "krb5-workstation-0:1.2.2-48.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.2-48.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:krb5-workstation-0:1.2.2-48.ia64"
},
"product_reference": "krb5-workstation-0:1.2.2-48.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.2.7-68.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-0:1.2.7-68.src"
},
"product_reference": "krb5-0:1.2.7-68.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-debuginfo-0:1.2.7-68.i386"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-debuginfo-0:1.2.7-68.ia64"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-debuginfo-0:1.2.7-68.ppc"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-debuginfo-0:1.2.7-68.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-debuginfo-0:1.2.7-68.s390"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-debuginfo-0:1.2.7-68.s390x"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-debuginfo-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-devel-0:1.2.7-68.i386"
},
"product_reference": "krb5-devel-0:1.2.7-68.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-devel-0:1.2.7-68.ia64"
},
"product_reference": "krb5-devel-0:1.2.7-68.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-devel-0:1.2.7-68.ppc"
},
"product_reference": "krb5-devel-0:1.2.7-68.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-devel-0:1.2.7-68.s390"
},
"product_reference": "krb5-devel-0:1.2.7-68.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-devel-0:1.2.7-68.s390x"
},
"product_reference": "krb5-devel-0:1.2.7-68.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-devel-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-devel-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-libs-0:1.2.7-68.i386"
},
"product_reference": "krb5-libs-0:1.2.7-68.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-libs-0:1.2.7-68.ia64"
},
"product_reference": "krb5-libs-0:1.2.7-68.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-libs-0:1.2.7-68.ppc"
},
"product_reference": "krb5-libs-0:1.2.7-68.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-libs-0:1.2.7-68.ppc64"
},
"product_reference": "krb5-libs-0:1.2.7-68.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-libs-0:1.2.7-68.s390"
},
"product_reference": "krb5-libs-0:1.2.7-68.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-libs-0:1.2.7-68.s390x"
},
"product_reference": "krb5-libs-0:1.2.7-68.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-libs-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-libs-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-server-0:1.2.7-68.i386"
},
"product_reference": "krb5-server-0:1.2.7-68.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-server-0:1.2.7-68.ia64"
},
"product_reference": "krb5-server-0:1.2.7-68.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-server-0:1.2.7-68.ppc"
},
"product_reference": "krb5-server-0:1.2.7-68.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-server-0:1.2.7-68.s390"
},
"product_reference": "krb5-server-0:1.2.7-68.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-server-0:1.2.7-68.s390x"
},
"product_reference": "krb5-server-0:1.2.7-68.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-server-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-server-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-workstation-0:1.2.7-68.i386"
},
"product_reference": "krb5-workstation-0:1.2.7-68.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-workstation-0:1.2.7-68.ia64"
},
"product_reference": "krb5-workstation-0:1.2.7-68.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-workstation-0:1.2.7-68.ppc"
},
"product_reference": "krb5-workstation-0:1.2.7-68.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-workstation-0:1.2.7-68.s390"
},
"product_reference": "krb5-workstation-0:1.2.7-68.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-workstation-0:1.2.7-68.s390x"
},
"product_reference": "krb5-workstation-0:1.2.7-68.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:krb5-workstation-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-workstation-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.2.7-68.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-0:1.2.7-68.src"
},
"product_reference": "krb5-0:1.2.7-68.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-debuginfo-0:1.2.7-68.i386"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-debuginfo-0:1.2.7-68.ia64"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-debuginfo-0:1.2.7-68.ppc"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-debuginfo-0:1.2.7-68.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-debuginfo-0:1.2.7-68.s390"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-debuginfo-0:1.2.7-68.s390x"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-debuginfo-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-devel-0:1.2.7-68.i386"
},
"product_reference": "krb5-devel-0:1.2.7-68.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-devel-0:1.2.7-68.ia64"
},
"product_reference": "krb5-devel-0:1.2.7-68.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-devel-0:1.2.7-68.ppc"
},
"product_reference": "krb5-devel-0:1.2.7-68.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-devel-0:1.2.7-68.s390"
},
"product_reference": "krb5-devel-0:1.2.7-68.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-devel-0:1.2.7-68.s390x"
},
"product_reference": "krb5-devel-0:1.2.7-68.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-devel-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-devel-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-libs-0:1.2.7-68.i386"
},
"product_reference": "krb5-libs-0:1.2.7-68.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-libs-0:1.2.7-68.ia64"
},
"product_reference": "krb5-libs-0:1.2.7-68.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-libs-0:1.2.7-68.ppc"
},
"product_reference": "krb5-libs-0:1.2.7-68.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-libs-0:1.2.7-68.ppc64"
},
"product_reference": "krb5-libs-0:1.2.7-68.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-libs-0:1.2.7-68.s390"
},
"product_reference": "krb5-libs-0:1.2.7-68.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-libs-0:1.2.7-68.s390x"
},
"product_reference": "krb5-libs-0:1.2.7-68.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-libs-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-libs-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-server-0:1.2.7-68.i386"
},
"product_reference": "krb5-server-0:1.2.7-68.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-server-0:1.2.7-68.ia64"
},
"product_reference": "krb5-server-0:1.2.7-68.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-server-0:1.2.7-68.ppc"
},
"product_reference": "krb5-server-0:1.2.7-68.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-server-0:1.2.7-68.s390"
},
"product_reference": "krb5-server-0:1.2.7-68.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-server-0:1.2.7-68.s390x"
},
"product_reference": "krb5-server-0:1.2.7-68.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-server-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-server-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-workstation-0:1.2.7-68.i386"
},
"product_reference": "krb5-workstation-0:1.2.7-68.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-workstation-0:1.2.7-68.ia64"
},
"product_reference": "krb5-workstation-0:1.2.7-68.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-workstation-0:1.2.7-68.ppc"
},
"product_reference": "krb5-workstation-0:1.2.7-68.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-workstation-0:1.2.7-68.s390"
},
"product_reference": "krb5-workstation-0:1.2.7-68.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-workstation-0:1.2.7-68.s390x"
},
"product_reference": "krb5-workstation-0:1.2.7-68.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:krb5-workstation-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-workstation-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.2.7-68.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-0:1.2.7-68.src"
},
"product_reference": "krb5-0:1.2.7-68.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-debuginfo-0:1.2.7-68.i386"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-debuginfo-0:1.2.7-68.ia64"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-debuginfo-0:1.2.7-68.ppc"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-debuginfo-0:1.2.7-68.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-debuginfo-0:1.2.7-68.s390"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-debuginfo-0:1.2.7-68.s390x"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-debuginfo-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-devel-0:1.2.7-68.i386"
},
"product_reference": "krb5-devel-0:1.2.7-68.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-devel-0:1.2.7-68.ia64"
},
"product_reference": "krb5-devel-0:1.2.7-68.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-devel-0:1.2.7-68.ppc"
},
"product_reference": "krb5-devel-0:1.2.7-68.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-devel-0:1.2.7-68.s390"
},
"product_reference": "krb5-devel-0:1.2.7-68.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-devel-0:1.2.7-68.s390x"
},
"product_reference": "krb5-devel-0:1.2.7-68.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-devel-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-devel-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-libs-0:1.2.7-68.i386"
},
"product_reference": "krb5-libs-0:1.2.7-68.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-libs-0:1.2.7-68.ia64"
},
"product_reference": "krb5-libs-0:1.2.7-68.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-libs-0:1.2.7-68.ppc"
},
"product_reference": "krb5-libs-0:1.2.7-68.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-libs-0:1.2.7-68.ppc64"
},
"product_reference": "krb5-libs-0:1.2.7-68.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-libs-0:1.2.7-68.s390"
},
"product_reference": "krb5-libs-0:1.2.7-68.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-libs-0:1.2.7-68.s390x"
},
"product_reference": "krb5-libs-0:1.2.7-68.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-libs-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-libs-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-server-0:1.2.7-68.i386"
},
"product_reference": "krb5-server-0:1.2.7-68.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-server-0:1.2.7-68.ia64"
},
"product_reference": "krb5-server-0:1.2.7-68.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-server-0:1.2.7-68.ppc"
},
"product_reference": "krb5-server-0:1.2.7-68.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-server-0:1.2.7-68.s390"
},
"product_reference": "krb5-server-0:1.2.7-68.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-server-0:1.2.7-68.s390x"
},
"product_reference": "krb5-server-0:1.2.7-68.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-server-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-server-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-workstation-0:1.2.7-68.i386"
},
"product_reference": "krb5-workstation-0:1.2.7-68.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-workstation-0:1.2.7-68.ia64"
},
"product_reference": "krb5-workstation-0:1.2.7-68.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-workstation-0:1.2.7-68.ppc"
},
"product_reference": "krb5-workstation-0:1.2.7-68.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-workstation-0:1.2.7-68.s390"
},
"product_reference": "krb5-workstation-0:1.2.7-68.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-workstation-0:1.2.7-68.s390x"
},
"product_reference": "krb5-workstation-0:1.2.7-68.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:krb5-workstation-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-workstation-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.2.7-68.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-0:1.2.7-68.src"
},
"product_reference": "krb5-0:1.2.7-68.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-debuginfo-0:1.2.7-68.i386"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-debuginfo-0:1.2.7-68.ia64"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-debuginfo-0:1.2.7-68.ppc"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-debuginfo-0:1.2.7-68.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-debuginfo-0:1.2.7-68.s390"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-debuginfo-0:1.2.7-68.s390x"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-debuginfo-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-devel-0:1.2.7-68.i386"
},
"product_reference": "krb5-devel-0:1.2.7-68.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-devel-0:1.2.7-68.ia64"
},
"product_reference": "krb5-devel-0:1.2.7-68.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-devel-0:1.2.7-68.ppc"
},
"product_reference": "krb5-devel-0:1.2.7-68.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-devel-0:1.2.7-68.s390"
},
"product_reference": "krb5-devel-0:1.2.7-68.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-devel-0:1.2.7-68.s390x"
},
"product_reference": "krb5-devel-0:1.2.7-68.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-devel-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-devel-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-libs-0:1.2.7-68.i386"
},
"product_reference": "krb5-libs-0:1.2.7-68.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-libs-0:1.2.7-68.ia64"
},
"product_reference": "krb5-libs-0:1.2.7-68.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-libs-0:1.2.7-68.ppc"
},
"product_reference": "krb5-libs-0:1.2.7-68.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-libs-0:1.2.7-68.ppc64"
},
"product_reference": "krb5-libs-0:1.2.7-68.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-libs-0:1.2.7-68.s390"
},
"product_reference": "krb5-libs-0:1.2.7-68.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-libs-0:1.2.7-68.s390x"
},
"product_reference": "krb5-libs-0:1.2.7-68.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-libs-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-libs-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-server-0:1.2.7-68.i386"
},
"product_reference": "krb5-server-0:1.2.7-68.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-server-0:1.2.7-68.ia64"
},
"product_reference": "krb5-server-0:1.2.7-68.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-server-0:1.2.7-68.ppc"
},
"product_reference": "krb5-server-0:1.2.7-68.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-server-0:1.2.7-68.s390"
},
"product_reference": "krb5-server-0:1.2.7-68.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-server-0:1.2.7-68.s390x"
},
"product_reference": "krb5-server-0:1.2.7-68.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-server-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-server-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-workstation-0:1.2.7-68.i386"
},
"product_reference": "krb5-workstation-0:1.2.7-68.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-workstation-0:1.2.7-68.ia64"
},
"product_reference": "krb5-workstation-0:1.2.7-68.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-workstation-0:1.2.7-68.ppc"
},
"product_reference": "krb5-workstation-0:1.2.7-68.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-workstation-0:1.2.7-68.s390"
},
"product_reference": "krb5-workstation-0:1.2.7-68.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-workstation-0:1.2.7-68.s390x"
},
"product_reference": "krb5-workstation-0:1.2.7-68.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.2.7-68.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:krb5-workstation-0:1.2.7-68.x86_64"
},
"product_reference": "krb5-workstation-0:1.2.7-68.x86_64",
"relates_to_product_reference": "3WS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"MIT"
]
}
],
"cve": "CVE-2008-0062",
"discovery_date": "2008-02-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "432620"
}
],
"notes": [
{
"category": "description",
"text": "KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: uninitialized pointer use in krb5kdc",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:krb5-0:1.2.2-48.src",
"2.1AS:krb5-devel-0:1.2.2-48.i386",
"2.1AS:krb5-devel-0:1.2.2-48.ia64",
"2.1AS:krb5-libs-0:1.2.2-48.i386",
"2.1AS:krb5-libs-0:1.2.2-48.ia64",
"2.1AS:krb5-server-0:1.2.2-48.i386",
"2.1AS:krb5-server-0:1.2.2-48.ia64",
"2.1AS:krb5-workstation-0:1.2.2-48.i386",
"2.1AS:krb5-workstation-0:1.2.2-48.ia64",
"2.1AW:krb5-0:1.2.2-48.src",
"2.1AW:krb5-devel-0:1.2.2-48.i386",
"2.1AW:krb5-devel-0:1.2.2-48.ia64",
"2.1AW:krb5-libs-0:1.2.2-48.i386",
"2.1AW:krb5-libs-0:1.2.2-48.ia64",
"2.1AW:krb5-server-0:1.2.2-48.i386",
"2.1AW:krb5-server-0:1.2.2-48.ia64",
"2.1AW:krb5-workstation-0:1.2.2-48.i386",
"2.1AW:krb5-workstation-0:1.2.2-48.ia64",
"2.1ES:krb5-0:1.2.2-48.src",
"2.1ES:krb5-devel-0:1.2.2-48.i386",
"2.1ES:krb5-devel-0:1.2.2-48.ia64",
"2.1ES:krb5-libs-0:1.2.2-48.i386",
"2.1ES:krb5-libs-0:1.2.2-48.ia64",
"2.1ES:krb5-server-0:1.2.2-48.i386",
"2.1ES:krb5-server-0:1.2.2-48.ia64",
"2.1ES:krb5-workstation-0:1.2.2-48.i386",
"2.1ES:krb5-workstation-0:1.2.2-48.ia64",
"2.1WS:krb5-0:1.2.2-48.src",
"2.1WS:krb5-devel-0:1.2.2-48.i386",
"2.1WS:krb5-devel-0:1.2.2-48.ia64",
"2.1WS:krb5-libs-0:1.2.2-48.i386",
"2.1WS:krb5-libs-0:1.2.2-48.ia64",
"2.1WS:krb5-server-0:1.2.2-48.i386",
"2.1WS:krb5-server-0:1.2.2-48.ia64",
"2.1WS:krb5-workstation-0:1.2.2-48.i386",
"2.1WS:krb5-workstation-0:1.2.2-48.ia64",
"3AS:krb5-0:1.2.7-68.src",
"3AS:krb5-debuginfo-0:1.2.7-68.i386",
"3AS:krb5-debuginfo-0:1.2.7-68.ia64",
"3AS:krb5-debuginfo-0:1.2.7-68.ppc",
"3AS:krb5-debuginfo-0:1.2.7-68.ppc64",
"3AS:krb5-debuginfo-0:1.2.7-68.s390",
"3AS:krb5-debuginfo-0:1.2.7-68.s390x",
"3AS:krb5-debuginfo-0:1.2.7-68.x86_64",
"3AS:krb5-devel-0:1.2.7-68.i386",
"3AS:krb5-devel-0:1.2.7-68.ia64",
"3AS:krb5-devel-0:1.2.7-68.ppc",
"3AS:krb5-devel-0:1.2.7-68.s390",
"3AS:krb5-devel-0:1.2.7-68.s390x",
"3AS:krb5-devel-0:1.2.7-68.x86_64",
"3AS:krb5-libs-0:1.2.7-68.i386",
"3AS:krb5-libs-0:1.2.7-68.ia64",
"3AS:krb5-libs-0:1.2.7-68.ppc",
"3AS:krb5-libs-0:1.2.7-68.ppc64",
"3AS:krb5-libs-0:1.2.7-68.s390",
"3AS:krb5-libs-0:1.2.7-68.s390x",
"3AS:krb5-libs-0:1.2.7-68.x86_64",
"3AS:krb5-server-0:1.2.7-68.i386",
"3AS:krb5-server-0:1.2.7-68.ia64",
"3AS:krb5-server-0:1.2.7-68.ppc",
"3AS:krb5-server-0:1.2.7-68.s390",
"3AS:krb5-server-0:1.2.7-68.s390x",
"3AS:krb5-server-0:1.2.7-68.x86_64",
"3AS:krb5-workstation-0:1.2.7-68.i386",
"3AS:krb5-workstation-0:1.2.7-68.ia64",
"3AS:krb5-workstation-0:1.2.7-68.ppc",
"3AS:krb5-workstation-0:1.2.7-68.s390",
"3AS:krb5-workstation-0:1.2.7-68.s390x",
"3AS:krb5-workstation-0:1.2.7-68.x86_64",
"3Desktop:krb5-0:1.2.7-68.src",
"3Desktop:krb5-debuginfo-0:1.2.7-68.i386",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ia64",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ppc",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ppc64",
"3Desktop:krb5-debuginfo-0:1.2.7-68.s390",
"3Desktop:krb5-debuginfo-0:1.2.7-68.s390x",
"3Desktop:krb5-debuginfo-0:1.2.7-68.x86_64",
"3Desktop:krb5-devel-0:1.2.7-68.i386",
"3Desktop:krb5-devel-0:1.2.7-68.ia64",
"3Desktop:krb5-devel-0:1.2.7-68.ppc",
"3Desktop:krb5-devel-0:1.2.7-68.s390",
"3Desktop:krb5-devel-0:1.2.7-68.s390x",
"3Desktop:krb5-devel-0:1.2.7-68.x86_64",
"3Desktop:krb5-libs-0:1.2.7-68.i386",
"3Desktop:krb5-libs-0:1.2.7-68.ia64",
"3Desktop:krb5-libs-0:1.2.7-68.ppc",
"3Desktop:krb5-libs-0:1.2.7-68.ppc64",
"3Desktop:krb5-libs-0:1.2.7-68.s390",
"3Desktop:krb5-libs-0:1.2.7-68.s390x",
"3Desktop:krb5-libs-0:1.2.7-68.x86_64",
"3Desktop:krb5-server-0:1.2.7-68.i386",
"3Desktop:krb5-server-0:1.2.7-68.ia64",
"3Desktop:krb5-server-0:1.2.7-68.ppc",
"3Desktop:krb5-server-0:1.2.7-68.s390",
"3Desktop:krb5-server-0:1.2.7-68.s390x",
"3Desktop:krb5-server-0:1.2.7-68.x86_64",
"3Desktop:krb5-workstation-0:1.2.7-68.i386",
"3Desktop:krb5-workstation-0:1.2.7-68.ia64",
"3Desktop:krb5-workstation-0:1.2.7-68.ppc",
"3Desktop:krb5-workstation-0:1.2.7-68.s390",
"3Desktop:krb5-workstation-0:1.2.7-68.s390x",
"3Desktop:krb5-workstation-0:1.2.7-68.x86_64",
"3ES:krb5-0:1.2.7-68.src",
"3ES:krb5-debuginfo-0:1.2.7-68.i386",
"3ES:krb5-debuginfo-0:1.2.7-68.ia64",
"3ES:krb5-debuginfo-0:1.2.7-68.ppc",
"3ES:krb5-debuginfo-0:1.2.7-68.ppc64",
"3ES:krb5-debuginfo-0:1.2.7-68.s390",
"3ES:krb5-debuginfo-0:1.2.7-68.s390x",
"3ES:krb5-debuginfo-0:1.2.7-68.x86_64",
"3ES:krb5-devel-0:1.2.7-68.i386",
"3ES:krb5-devel-0:1.2.7-68.ia64",
"3ES:krb5-devel-0:1.2.7-68.ppc",
"3ES:krb5-devel-0:1.2.7-68.s390",
"3ES:krb5-devel-0:1.2.7-68.s390x",
"3ES:krb5-devel-0:1.2.7-68.x86_64",
"3ES:krb5-libs-0:1.2.7-68.i386",
"3ES:krb5-libs-0:1.2.7-68.ia64",
"3ES:krb5-libs-0:1.2.7-68.ppc",
"3ES:krb5-libs-0:1.2.7-68.ppc64",
"3ES:krb5-libs-0:1.2.7-68.s390",
"3ES:krb5-libs-0:1.2.7-68.s390x",
"3ES:krb5-libs-0:1.2.7-68.x86_64",
"3ES:krb5-server-0:1.2.7-68.i386",
"3ES:krb5-server-0:1.2.7-68.ia64",
"3ES:krb5-server-0:1.2.7-68.ppc",
"3ES:krb5-server-0:1.2.7-68.s390",
"3ES:krb5-server-0:1.2.7-68.s390x",
"3ES:krb5-server-0:1.2.7-68.x86_64",
"3ES:krb5-workstation-0:1.2.7-68.i386",
"3ES:krb5-workstation-0:1.2.7-68.ia64",
"3ES:krb5-workstation-0:1.2.7-68.ppc",
"3ES:krb5-workstation-0:1.2.7-68.s390",
"3ES:krb5-workstation-0:1.2.7-68.s390x",
"3ES:krb5-workstation-0:1.2.7-68.x86_64",
"3WS:krb5-0:1.2.7-68.src",
"3WS:krb5-debuginfo-0:1.2.7-68.i386",
"3WS:krb5-debuginfo-0:1.2.7-68.ia64",
"3WS:krb5-debuginfo-0:1.2.7-68.ppc",
"3WS:krb5-debuginfo-0:1.2.7-68.ppc64",
"3WS:krb5-debuginfo-0:1.2.7-68.s390",
"3WS:krb5-debuginfo-0:1.2.7-68.s390x",
"3WS:krb5-debuginfo-0:1.2.7-68.x86_64",
"3WS:krb5-devel-0:1.2.7-68.i386",
"3WS:krb5-devel-0:1.2.7-68.ia64",
"3WS:krb5-devel-0:1.2.7-68.ppc",
"3WS:krb5-devel-0:1.2.7-68.s390",
"3WS:krb5-devel-0:1.2.7-68.s390x",
"3WS:krb5-devel-0:1.2.7-68.x86_64",
"3WS:krb5-libs-0:1.2.7-68.i386",
"3WS:krb5-libs-0:1.2.7-68.ia64",
"3WS:krb5-libs-0:1.2.7-68.ppc",
"3WS:krb5-libs-0:1.2.7-68.ppc64",
"3WS:krb5-libs-0:1.2.7-68.s390",
"3WS:krb5-libs-0:1.2.7-68.s390x",
"3WS:krb5-libs-0:1.2.7-68.x86_64",
"3WS:krb5-server-0:1.2.7-68.i386",
"3WS:krb5-server-0:1.2.7-68.ia64",
"3WS:krb5-server-0:1.2.7-68.ppc",
"3WS:krb5-server-0:1.2.7-68.s390",
"3WS:krb5-server-0:1.2.7-68.s390x",
"3WS:krb5-server-0:1.2.7-68.x86_64",
"3WS:krb5-workstation-0:1.2.7-68.i386",
"3WS:krb5-workstation-0:1.2.7-68.ia64",
"3WS:krb5-workstation-0:1.2.7-68.ppc",
"3WS:krb5-workstation-0:1.2.7-68.s390",
"3WS:krb5-workstation-0:1.2.7-68.s390x",
"3WS:krb5-workstation-0:1.2.7-68.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0062"
},
{
"category": "external",
"summary": "RHBZ#432620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432620"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0062"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0062",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0062"
}
],
"release_date": "2008-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-18T18:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:krb5-0:1.2.2-48.src",
"2.1AS:krb5-devel-0:1.2.2-48.i386",
"2.1AS:krb5-devel-0:1.2.2-48.ia64",
"2.1AS:krb5-libs-0:1.2.2-48.i386",
"2.1AS:krb5-libs-0:1.2.2-48.ia64",
"2.1AS:krb5-server-0:1.2.2-48.i386",
"2.1AS:krb5-server-0:1.2.2-48.ia64",
"2.1AS:krb5-workstation-0:1.2.2-48.i386",
"2.1AS:krb5-workstation-0:1.2.2-48.ia64",
"2.1AW:krb5-0:1.2.2-48.src",
"2.1AW:krb5-devel-0:1.2.2-48.i386",
"2.1AW:krb5-devel-0:1.2.2-48.ia64",
"2.1AW:krb5-libs-0:1.2.2-48.i386",
"2.1AW:krb5-libs-0:1.2.2-48.ia64",
"2.1AW:krb5-server-0:1.2.2-48.i386",
"2.1AW:krb5-server-0:1.2.2-48.ia64",
"2.1AW:krb5-workstation-0:1.2.2-48.i386",
"2.1AW:krb5-workstation-0:1.2.2-48.ia64",
"2.1ES:krb5-0:1.2.2-48.src",
"2.1ES:krb5-devel-0:1.2.2-48.i386",
"2.1ES:krb5-devel-0:1.2.2-48.ia64",
"2.1ES:krb5-libs-0:1.2.2-48.i386",
"2.1ES:krb5-libs-0:1.2.2-48.ia64",
"2.1ES:krb5-server-0:1.2.2-48.i386",
"2.1ES:krb5-server-0:1.2.2-48.ia64",
"2.1ES:krb5-workstation-0:1.2.2-48.i386",
"2.1ES:krb5-workstation-0:1.2.2-48.ia64",
"2.1WS:krb5-0:1.2.2-48.src",
"2.1WS:krb5-devel-0:1.2.2-48.i386",
"2.1WS:krb5-devel-0:1.2.2-48.ia64",
"2.1WS:krb5-libs-0:1.2.2-48.i386",
"2.1WS:krb5-libs-0:1.2.2-48.ia64",
"2.1WS:krb5-server-0:1.2.2-48.i386",
"2.1WS:krb5-server-0:1.2.2-48.ia64",
"2.1WS:krb5-workstation-0:1.2.2-48.i386",
"2.1WS:krb5-workstation-0:1.2.2-48.ia64",
"3AS:krb5-0:1.2.7-68.src",
"3AS:krb5-debuginfo-0:1.2.7-68.i386",
"3AS:krb5-debuginfo-0:1.2.7-68.ia64",
"3AS:krb5-debuginfo-0:1.2.7-68.ppc",
"3AS:krb5-debuginfo-0:1.2.7-68.ppc64",
"3AS:krb5-debuginfo-0:1.2.7-68.s390",
"3AS:krb5-debuginfo-0:1.2.7-68.s390x",
"3AS:krb5-debuginfo-0:1.2.7-68.x86_64",
"3AS:krb5-devel-0:1.2.7-68.i386",
"3AS:krb5-devel-0:1.2.7-68.ia64",
"3AS:krb5-devel-0:1.2.7-68.ppc",
"3AS:krb5-devel-0:1.2.7-68.s390",
"3AS:krb5-devel-0:1.2.7-68.s390x",
"3AS:krb5-devel-0:1.2.7-68.x86_64",
"3AS:krb5-libs-0:1.2.7-68.i386",
"3AS:krb5-libs-0:1.2.7-68.ia64",
"3AS:krb5-libs-0:1.2.7-68.ppc",
"3AS:krb5-libs-0:1.2.7-68.ppc64",
"3AS:krb5-libs-0:1.2.7-68.s390",
"3AS:krb5-libs-0:1.2.7-68.s390x",
"3AS:krb5-libs-0:1.2.7-68.x86_64",
"3AS:krb5-server-0:1.2.7-68.i386",
"3AS:krb5-server-0:1.2.7-68.ia64",
"3AS:krb5-server-0:1.2.7-68.ppc",
"3AS:krb5-server-0:1.2.7-68.s390",
"3AS:krb5-server-0:1.2.7-68.s390x",
"3AS:krb5-server-0:1.2.7-68.x86_64",
"3AS:krb5-workstation-0:1.2.7-68.i386",
"3AS:krb5-workstation-0:1.2.7-68.ia64",
"3AS:krb5-workstation-0:1.2.7-68.ppc",
"3AS:krb5-workstation-0:1.2.7-68.s390",
"3AS:krb5-workstation-0:1.2.7-68.s390x",
"3AS:krb5-workstation-0:1.2.7-68.x86_64",
"3Desktop:krb5-0:1.2.7-68.src",
"3Desktop:krb5-debuginfo-0:1.2.7-68.i386",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ia64",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ppc",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ppc64",
"3Desktop:krb5-debuginfo-0:1.2.7-68.s390",
"3Desktop:krb5-debuginfo-0:1.2.7-68.s390x",
"3Desktop:krb5-debuginfo-0:1.2.7-68.x86_64",
"3Desktop:krb5-devel-0:1.2.7-68.i386",
"3Desktop:krb5-devel-0:1.2.7-68.ia64",
"3Desktop:krb5-devel-0:1.2.7-68.ppc",
"3Desktop:krb5-devel-0:1.2.7-68.s390",
"3Desktop:krb5-devel-0:1.2.7-68.s390x",
"3Desktop:krb5-devel-0:1.2.7-68.x86_64",
"3Desktop:krb5-libs-0:1.2.7-68.i386",
"3Desktop:krb5-libs-0:1.2.7-68.ia64",
"3Desktop:krb5-libs-0:1.2.7-68.ppc",
"3Desktop:krb5-libs-0:1.2.7-68.ppc64",
"3Desktop:krb5-libs-0:1.2.7-68.s390",
"3Desktop:krb5-libs-0:1.2.7-68.s390x",
"3Desktop:krb5-libs-0:1.2.7-68.x86_64",
"3Desktop:krb5-server-0:1.2.7-68.i386",
"3Desktop:krb5-server-0:1.2.7-68.ia64",
"3Desktop:krb5-server-0:1.2.7-68.ppc",
"3Desktop:krb5-server-0:1.2.7-68.s390",
"3Desktop:krb5-server-0:1.2.7-68.s390x",
"3Desktop:krb5-server-0:1.2.7-68.x86_64",
"3Desktop:krb5-workstation-0:1.2.7-68.i386",
"3Desktop:krb5-workstation-0:1.2.7-68.ia64",
"3Desktop:krb5-workstation-0:1.2.7-68.ppc",
"3Desktop:krb5-workstation-0:1.2.7-68.s390",
"3Desktop:krb5-workstation-0:1.2.7-68.s390x",
"3Desktop:krb5-workstation-0:1.2.7-68.x86_64",
"3ES:krb5-0:1.2.7-68.src",
"3ES:krb5-debuginfo-0:1.2.7-68.i386",
"3ES:krb5-debuginfo-0:1.2.7-68.ia64",
"3ES:krb5-debuginfo-0:1.2.7-68.ppc",
"3ES:krb5-debuginfo-0:1.2.7-68.ppc64",
"3ES:krb5-debuginfo-0:1.2.7-68.s390",
"3ES:krb5-debuginfo-0:1.2.7-68.s390x",
"3ES:krb5-debuginfo-0:1.2.7-68.x86_64",
"3ES:krb5-devel-0:1.2.7-68.i386",
"3ES:krb5-devel-0:1.2.7-68.ia64",
"3ES:krb5-devel-0:1.2.7-68.ppc",
"3ES:krb5-devel-0:1.2.7-68.s390",
"3ES:krb5-devel-0:1.2.7-68.s390x",
"3ES:krb5-devel-0:1.2.7-68.x86_64",
"3ES:krb5-libs-0:1.2.7-68.i386",
"3ES:krb5-libs-0:1.2.7-68.ia64",
"3ES:krb5-libs-0:1.2.7-68.ppc",
"3ES:krb5-libs-0:1.2.7-68.ppc64",
"3ES:krb5-libs-0:1.2.7-68.s390",
"3ES:krb5-libs-0:1.2.7-68.s390x",
"3ES:krb5-libs-0:1.2.7-68.x86_64",
"3ES:krb5-server-0:1.2.7-68.i386",
"3ES:krb5-server-0:1.2.7-68.ia64",
"3ES:krb5-server-0:1.2.7-68.ppc",
"3ES:krb5-server-0:1.2.7-68.s390",
"3ES:krb5-server-0:1.2.7-68.s390x",
"3ES:krb5-server-0:1.2.7-68.x86_64",
"3ES:krb5-workstation-0:1.2.7-68.i386",
"3ES:krb5-workstation-0:1.2.7-68.ia64",
"3ES:krb5-workstation-0:1.2.7-68.ppc",
"3ES:krb5-workstation-0:1.2.7-68.s390",
"3ES:krb5-workstation-0:1.2.7-68.s390x",
"3ES:krb5-workstation-0:1.2.7-68.x86_64",
"3WS:krb5-0:1.2.7-68.src",
"3WS:krb5-debuginfo-0:1.2.7-68.i386",
"3WS:krb5-debuginfo-0:1.2.7-68.ia64",
"3WS:krb5-debuginfo-0:1.2.7-68.ppc",
"3WS:krb5-debuginfo-0:1.2.7-68.ppc64",
"3WS:krb5-debuginfo-0:1.2.7-68.s390",
"3WS:krb5-debuginfo-0:1.2.7-68.s390x",
"3WS:krb5-debuginfo-0:1.2.7-68.x86_64",
"3WS:krb5-devel-0:1.2.7-68.i386",
"3WS:krb5-devel-0:1.2.7-68.ia64",
"3WS:krb5-devel-0:1.2.7-68.ppc",
"3WS:krb5-devel-0:1.2.7-68.s390",
"3WS:krb5-devel-0:1.2.7-68.s390x",
"3WS:krb5-devel-0:1.2.7-68.x86_64",
"3WS:krb5-libs-0:1.2.7-68.i386",
"3WS:krb5-libs-0:1.2.7-68.ia64",
"3WS:krb5-libs-0:1.2.7-68.ppc",
"3WS:krb5-libs-0:1.2.7-68.ppc64",
"3WS:krb5-libs-0:1.2.7-68.s390",
"3WS:krb5-libs-0:1.2.7-68.s390x",
"3WS:krb5-libs-0:1.2.7-68.x86_64",
"3WS:krb5-server-0:1.2.7-68.i386",
"3WS:krb5-server-0:1.2.7-68.ia64",
"3WS:krb5-server-0:1.2.7-68.ppc",
"3WS:krb5-server-0:1.2.7-68.s390",
"3WS:krb5-server-0:1.2.7-68.s390x",
"3WS:krb5-server-0:1.2.7-68.x86_64",
"3WS:krb5-workstation-0:1.2.7-68.i386",
"3WS:krb5-workstation-0:1.2.7-68.ia64",
"3WS:krb5-workstation-0:1.2.7-68.ppc",
"3WS:krb5-workstation-0:1.2.7-68.s390",
"3WS:krb5-workstation-0:1.2.7-68.s390x",
"3WS:krb5-workstation-0:1.2.7-68.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0181"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "krb5: uninitialized pointer use in krb5kdc"
},
{
"acknowledgments": [
{
"names": [
"MIT"
]
}
],
"cve": "CVE-2008-0063",
"discovery_date": "2008-02-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "432621"
}
],
"notes": [
{
"category": "description",
"text": "The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka \"Uninitialized stack values.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: possible leak of sensitive data from krb5kdc using krb4 request",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:krb5-0:1.2.2-48.src",
"2.1AS:krb5-devel-0:1.2.2-48.i386",
"2.1AS:krb5-devel-0:1.2.2-48.ia64",
"2.1AS:krb5-libs-0:1.2.2-48.i386",
"2.1AS:krb5-libs-0:1.2.2-48.ia64",
"2.1AS:krb5-server-0:1.2.2-48.i386",
"2.1AS:krb5-server-0:1.2.2-48.ia64",
"2.1AS:krb5-workstation-0:1.2.2-48.i386",
"2.1AS:krb5-workstation-0:1.2.2-48.ia64",
"2.1AW:krb5-0:1.2.2-48.src",
"2.1AW:krb5-devel-0:1.2.2-48.i386",
"2.1AW:krb5-devel-0:1.2.2-48.ia64",
"2.1AW:krb5-libs-0:1.2.2-48.i386",
"2.1AW:krb5-libs-0:1.2.2-48.ia64",
"2.1AW:krb5-server-0:1.2.2-48.i386",
"2.1AW:krb5-server-0:1.2.2-48.ia64",
"2.1AW:krb5-workstation-0:1.2.2-48.i386",
"2.1AW:krb5-workstation-0:1.2.2-48.ia64",
"2.1ES:krb5-0:1.2.2-48.src",
"2.1ES:krb5-devel-0:1.2.2-48.i386",
"2.1ES:krb5-devel-0:1.2.2-48.ia64",
"2.1ES:krb5-libs-0:1.2.2-48.i386",
"2.1ES:krb5-libs-0:1.2.2-48.ia64",
"2.1ES:krb5-server-0:1.2.2-48.i386",
"2.1ES:krb5-server-0:1.2.2-48.ia64",
"2.1ES:krb5-workstation-0:1.2.2-48.i386",
"2.1ES:krb5-workstation-0:1.2.2-48.ia64",
"2.1WS:krb5-0:1.2.2-48.src",
"2.1WS:krb5-devel-0:1.2.2-48.i386",
"2.1WS:krb5-devel-0:1.2.2-48.ia64",
"2.1WS:krb5-libs-0:1.2.2-48.i386",
"2.1WS:krb5-libs-0:1.2.2-48.ia64",
"2.1WS:krb5-server-0:1.2.2-48.i386",
"2.1WS:krb5-server-0:1.2.2-48.ia64",
"2.1WS:krb5-workstation-0:1.2.2-48.i386",
"2.1WS:krb5-workstation-0:1.2.2-48.ia64",
"3AS:krb5-0:1.2.7-68.src",
"3AS:krb5-debuginfo-0:1.2.7-68.i386",
"3AS:krb5-debuginfo-0:1.2.7-68.ia64",
"3AS:krb5-debuginfo-0:1.2.7-68.ppc",
"3AS:krb5-debuginfo-0:1.2.7-68.ppc64",
"3AS:krb5-debuginfo-0:1.2.7-68.s390",
"3AS:krb5-debuginfo-0:1.2.7-68.s390x",
"3AS:krb5-debuginfo-0:1.2.7-68.x86_64",
"3AS:krb5-devel-0:1.2.7-68.i386",
"3AS:krb5-devel-0:1.2.7-68.ia64",
"3AS:krb5-devel-0:1.2.7-68.ppc",
"3AS:krb5-devel-0:1.2.7-68.s390",
"3AS:krb5-devel-0:1.2.7-68.s390x",
"3AS:krb5-devel-0:1.2.7-68.x86_64",
"3AS:krb5-libs-0:1.2.7-68.i386",
"3AS:krb5-libs-0:1.2.7-68.ia64",
"3AS:krb5-libs-0:1.2.7-68.ppc",
"3AS:krb5-libs-0:1.2.7-68.ppc64",
"3AS:krb5-libs-0:1.2.7-68.s390",
"3AS:krb5-libs-0:1.2.7-68.s390x",
"3AS:krb5-libs-0:1.2.7-68.x86_64",
"3AS:krb5-server-0:1.2.7-68.i386",
"3AS:krb5-server-0:1.2.7-68.ia64",
"3AS:krb5-server-0:1.2.7-68.ppc",
"3AS:krb5-server-0:1.2.7-68.s390",
"3AS:krb5-server-0:1.2.7-68.s390x",
"3AS:krb5-server-0:1.2.7-68.x86_64",
"3AS:krb5-workstation-0:1.2.7-68.i386",
"3AS:krb5-workstation-0:1.2.7-68.ia64",
"3AS:krb5-workstation-0:1.2.7-68.ppc",
"3AS:krb5-workstation-0:1.2.7-68.s390",
"3AS:krb5-workstation-0:1.2.7-68.s390x",
"3AS:krb5-workstation-0:1.2.7-68.x86_64",
"3Desktop:krb5-0:1.2.7-68.src",
"3Desktop:krb5-debuginfo-0:1.2.7-68.i386",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ia64",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ppc",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ppc64",
"3Desktop:krb5-debuginfo-0:1.2.7-68.s390",
"3Desktop:krb5-debuginfo-0:1.2.7-68.s390x",
"3Desktop:krb5-debuginfo-0:1.2.7-68.x86_64",
"3Desktop:krb5-devel-0:1.2.7-68.i386",
"3Desktop:krb5-devel-0:1.2.7-68.ia64",
"3Desktop:krb5-devel-0:1.2.7-68.ppc",
"3Desktop:krb5-devel-0:1.2.7-68.s390",
"3Desktop:krb5-devel-0:1.2.7-68.s390x",
"3Desktop:krb5-devel-0:1.2.7-68.x86_64",
"3Desktop:krb5-libs-0:1.2.7-68.i386",
"3Desktop:krb5-libs-0:1.2.7-68.ia64",
"3Desktop:krb5-libs-0:1.2.7-68.ppc",
"3Desktop:krb5-libs-0:1.2.7-68.ppc64",
"3Desktop:krb5-libs-0:1.2.7-68.s390",
"3Desktop:krb5-libs-0:1.2.7-68.s390x",
"3Desktop:krb5-libs-0:1.2.7-68.x86_64",
"3Desktop:krb5-server-0:1.2.7-68.i386",
"3Desktop:krb5-server-0:1.2.7-68.ia64",
"3Desktop:krb5-server-0:1.2.7-68.ppc",
"3Desktop:krb5-server-0:1.2.7-68.s390",
"3Desktop:krb5-server-0:1.2.7-68.s390x",
"3Desktop:krb5-server-0:1.2.7-68.x86_64",
"3Desktop:krb5-workstation-0:1.2.7-68.i386",
"3Desktop:krb5-workstation-0:1.2.7-68.ia64",
"3Desktop:krb5-workstation-0:1.2.7-68.ppc",
"3Desktop:krb5-workstation-0:1.2.7-68.s390",
"3Desktop:krb5-workstation-0:1.2.7-68.s390x",
"3Desktop:krb5-workstation-0:1.2.7-68.x86_64",
"3ES:krb5-0:1.2.7-68.src",
"3ES:krb5-debuginfo-0:1.2.7-68.i386",
"3ES:krb5-debuginfo-0:1.2.7-68.ia64",
"3ES:krb5-debuginfo-0:1.2.7-68.ppc",
"3ES:krb5-debuginfo-0:1.2.7-68.ppc64",
"3ES:krb5-debuginfo-0:1.2.7-68.s390",
"3ES:krb5-debuginfo-0:1.2.7-68.s390x",
"3ES:krb5-debuginfo-0:1.2.7-68.x86_64",
"3ES:krb5-devel-0:1.2.7-68.i386",
"3ES:krb5-devel-0:1.2.7-68.ia64",
"3ES:krb5-devel-0:1.2.7-68.ppc",
"3ES:krb5-devel-0:1.2.7-68.s390",
"3ES:krb5-devel-0:1.2.7-68.s390x",
"3ES:krb5-devel-0:1.2.7-68.x86_64",
"3ES:krb5-libs-0:1.2.7-68.i386",
"3ES:krb5-libs-0:1.2.7-68.ia64",
"3ES:krb5-libs-0:1.2.7-68.ppc",
"3ES:krb5-libs-0:1.2.7-68.ppc64",
"3ES:krb5-libs-0:1.2.7-68.s390",
"3ES:krb5-libs-0:1.2.7-68.s390x",
"3ES:krb5-libs-0:1.2.7-68.x86_64",
"3ES:krb5-server-0:1.2.7-68.i386",
"3ES:krb5-server-0:1.2.7-68.ia64",
"3ES:krb5-server-0:1.2.7-68.ppc",
"3ES:krb5-server-0:1.2.7-68.s390",
"3ES:krb5-server-0:1.2.7-68.s390x",
"3ES:krb5-server-0:1.2.7-68.x86_64",
"3ES:krb5-workstation-0:1.2.7-68.i386",
"3ES:krb5-workstation-0:1.2.7-68.ia64",
"3ES:krb5-workstation-0:1.2.7-68.ppc",
"3ES:krb5-workstation-0:1.2.7-68.s390",
"3ES:krb5-workstation-0:1.2.7-68.s390x",
"3ES:krb5-workstation-0:1.2.7-68.x86_64",
"3WS:krb5-0:1.2.7-68.src",
"3WS:krb5-debuginfo-0:1.2.7-68.i386",
"3WS:krb5-debuginfo-0:1.2.7-68.ia64",
"3WS:krb5-debuginfo-0:1.2.7-68.ppc",
"3WS:krb5-debuginfo-0:1.2.7-68.ppc64",
"3WS:krb5-debuginfo-0:1.2.7-68.s390",
"3WS:krb5-debuginfo-0:1.2.7-68.s390x",
"3WS:krb5-debuginfo-0:1.2.7-68.x86_64",
"3WS:krb5-devel-0:1.2.7-68.i386",
"3WS:krb5-devel-0:1.2.7-68.ia64",
"3WS:krb5-devel-0:1.2.7-68.ppc",
"3WS:krb5-devel-0:1.2.7-68.s390",
"3WS:krb5-devel-0:1.2.7-68.s390x",
"3WS:krb5-devel-0:1.2.7-68.x86_64",
"3WS:krb5-libs-0:1.2.7-68.i386",
"3WS:krb5-libs-0:1.2.7-68.ia64",
"3WS:krb5-libs-0:1.2.7-68.ppc",
"3WS:krb5-libs-0:1.2.7-68.ppc64",
"3WS:krb5-libs-0:1.2.7-68.s390",
"3WS:krb5-libs-0:1.2.7-68.s390x",
"3WS:krb5-libs-0:1.2.7-68.x86_64",
"3WS:krb5-server-0:1.2.7-68.i386",
"3WS:krb5-server-0:1.2.7-68.ia64",
"3WS:krb5-server-0:1.2.7-68.ppc",
"3WS:krb5-server-0:1.2.7-68.s390",
"3WS:krb5-server-0:1.2.7-68.s390x",
"3WS:krb5-server-0:1.2.7-68.x86_64",
"3WS:krb5-workstation-0:1.2.7-68.i386",
"3WS:krb5-workstation-0:1.2.7-68.ia64",
"3WS:krb5-workstation-0:1.2.7-68.ppc",
"3WS:krb5-workstation-0:1.2.7-68.s390",
"3WS:krb5-workstation-0:1.2.7-68.s390x",
"3WS:krb5-workstation-0:1.2.7-68.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0063"
},
{
"category": "external",
"summary": "RHBZ#432621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432621"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0063"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0063",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0063"
}
],
"release_date": "2008-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-18T18:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:krb5-0:1.2.2-48.src",
"2.1AS:krb5-devel-0:1.2.2-48.i386",
"2.1AS:krb5-devel-0:1.2.2-48.ia64",
"2.1AS:krb5-libs-0:1.2.2-48.i386",
"2.1AS:krb5-libs-0:1.2.2-48.ia64",
"2.1AS:krb5-server-0:1.2.2-48.i386",
"2.1AS:krb5-server-0:1.2.2-48.ia64",
"2.1AS:krb5-workstation-0:1.2.2-48.i386",
"2.1AS:krb5-workstation-0:1.2.2-48.ia64",
"2.1AW:krb5-0:1.2.2-48.src",
"2.1AW:krb5-devel-0:1.2.2-48.i386",
"2.1AW:krb5-devel-0:1.2.2-48.ia64",
"2.1AW:krb5-libs-0:1.2.2-48.i386",
"2.1AW:krb5-libs-0:1.2.2-48.ia64",
"2.1AW:krb5-server-0:1.2.2-48.i386",
"2.1AW:krb5-server-0:1.2.2-48.ia64",
"2.1AW:krb5-workstation-0:1.2.2-48.i386",
"2.1AW:krb5-workstation-0:1.2.2-48.ia64",
"2.1ES:krb5-0:1.2.2-48.src",
"2.1ES:krb5-devel-0:1.2.2-48.i386",
"2.1ES:krb5-devel-0:1.2.2-48.ia64",
"2.1ES:krb5-libs-0:1.2.2-48.i386",
"2.1ES:krb5-libs-0:1.2.2-48.ia64",
"2.1ES:krb5-server-0:1.2.2-48.i386",
"2.1ES:krb5-server-0:1.2.2-48.ia64",
"2.1ES:krb5-workstation-0:1.2.2-48.i386",
"2.1ES:krb5-workstation-0:1.2.2-48.ia64",
"2.1WS:krb5-0:1.2.2-48.src",
"2.1WS:krb5-devel-0:1.2.2-48.i386",
"2.1WS:krb5-devel-0:1.2.2-48.ia64",
"2.1WS:krb5-libs-0:1.2.2-48.i386",
"2.1WS:krb5-libs-0:1.2.2-48.ia64",
"2.1WS:krb5-server-0:1.2.2-48.i386",
"2.1WS:krb5-server-0:1.2.2-48.ia64",
"2.1WS:krb5-workstation-0:1.2.2-48.i386",
"2.1WS:krb5-workstation-0:1.2.2-48.ia64",
"3AS:krb5-0:1.2.7-68.src",
"3AS:krb5-debuginfo-0:1.2.7-68.i386",
"3AS:krb5-debuginfo-0:1.2.7-68.ia64",
"3AS:krb5-debuginfo-0:1.2.7-68.ppc",
"3AS:krb5-debuginfo-0:1.2.7-68.ppc64",
"3AS:krb5-debuginfo-0:1.2.7-68.s390",
"3AS:krb5-debuginfo-0:1.2.7-68.s390x",
"3AS:krb5-debuginfo-0:1.2.7-68.x86_64",
"3AS:krb5-devel-0:1.2.7-68.i386",
"3AS:krb5-devel-0:1.2.7-68.ia64",
"3AS:krb5-devel-0:1.2.7-68.ppc",
"3AS:krb5-devel-0:1.2.7-68.s390",
"3AS:krb5-devel-0:1.2.7-68.s390x",
"3AS:krb5-devel-0:1.2.7-68.x86_64",
"3AS:krb5-libs-0:1.2.7-68.i386",
"3AS:krb5-libs-0:1.2.7-68.ia64",
"3AS:krb5-libs-0:1.2.7-68.ppc",
"3AS:krb5-libs-0:1.2.7-68.ppc64",
"3AS:krb5-libs-0:1.2.7-68.s390",
"3AS:krb5-libs-0:1.2.7-68.s390x",
"3AS:krb5-libs-0:1.2.7-68.x86_64",
"3AS:krb5-server-0:1.2.7-68.i386",
"3AS:krb5-server-0:1.2.7-68.ia64",
"3AS:krb5-server-0:1.2.7-68.ppc",
"3AS:krb5-server-0:1.2.7-68.s390",
"3AS:krb5-server-0:1.2.7-68.s390x",
"3AS:krb5-server-0:1.2.7-68.x86_64",
"3AS:krb5-workstation-0:1.2.7-68.i386",
"3AS:krb5-workstation-0:1.2.7-68.ia64",
"3AS:krb5-workstation-0:1.2.7-68.ppc",
"3AS:krb5-workstation-0:1.2.7-68.s390",
"3AS:krb5-workstation-0:1.2.7-68.s390x",
"3AS:krb5-workstation-0:1.2.7-68.x86_64",
"3Desktop:krb5-0:1.2.7-68.src",
"3Desktop:krb5-debuginfo-0:1.2.7-68.i386",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ia64",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ppc",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ppc64",
"3Desktop:krb5-debuginfo-0:1.2.7-68.s390",
"3Desktop:krb5-debuginfo-0:1.2.7-68.s390x",
"3Desktop:krb5-debuginfo-0:1.2.7-68.x86_64",
"3Desktop:krb5-devel-0:1.2.7-68.i386",
"3Desktop:krb5-devel-0:1.2.7-68.ia64",
"3Desktop:krb5-devel-0:1.2.7-68.ppc",
"3Desktop:krb5-devel-0:1.2.7-68.s390",
"3Desktop:krb5-devel-0:1.2.7-68.s390x",
"3Desktop:krb5-devel-0:1.2.7-68.x86_64",
"3Desktop:krb5-libs-0:1.2.7-68.i386",
"3Desktop:krb5-libs-0:1.2.7-68.ia64",
"3Desktop:krb5-libs-0:1.2.7-68.ppc",
"3Desktop:krb5-libs-0:1.2.7-68.ppc64",
"3Desktop:krb5-libs-0:1.2.7-68.s390",
"3Desktop:krb5-libs-0:1.2.7-68.s390x",
"3Desktop:krb5-libs-0:1.2.7-68.x86_64",
"3Desktop:krb5-server-0:1.2.7-68.i386",
"3Desktop:krb5-server-0:1.2.7-68.ia64",
"3Desktop:krb5-server-0:1.2.7-68.ppc",
"3Desktop:krb5-server-0:1.2.7-68.s390",
"3Desktop:krb5-server-0:1.2.7-68.s390x",
"3Desktop:krb5-server-0:1.2.7-68.x86_64",
"3Desktop:krb5-workstation-0:1.2.7-68.i386",
"3Desktop:krb5-workstation-0:1.2.7-68.ia64",
"3Desktop:krb5-workstation-0:1.2.7-68.ppc",
"3Desktop:krb5-workstation-0:1.2.7-68.s390",
"3Desktop:krb5-workstation-0:1.2.7-68.s390x",
"3Desktop:krb5-workstation-0:1.2.7-68.x86_64",
"3ES:krb5-0:1.2.7-68.src",
"3ES:krb5-debuginfo-0:1.2.7-68.i386",
"3ES:krb5-debuginfo-0:1.2.7-68.ia64",
"3ES:krb5-debuginfo-0:1.2.7-68.ppc",
"3ES:krb5-debuginfo-0:1.2.7-68.ppc64",
"3ES:krb5-debuginfo-0:1.2.7-68.s390",
"3ES:krb5-debuginfo-0:1.2.7-68.s390x",
"3ES:krb5-debuginfo-0:1.2.7-68.x86_64",
"3ES:krb5-devel-0:1.2.7-68.i386",
"3ES:krb5-devel-0:1.2.7-68.ia64",
"3ES:krb5-devel-0:1.2.7-68.ppc",
"3ES:krb5-devel-0:1.2.7-68.s390",
"3ES:krb5-devel-0:1.2.7-68.s390x",
"3ES:krb5-devel-0:1.2.7-68.x86_64",
"3ES:krb5-libs-0:1.2.7-68.i386",
"3ES:krb5-libs-0:1.2.7-68.ia64",
"3ES:krb5-libs-0:1.2.7-68.ppc",
"3ES:krb5-libs-0:1.2.7-68.ppc64",
"3ES:krb5-libs-0:1.2.7-68.s390",
"3ES:krb5-libs-0:1.2.7-68.s390x",
"3ES:krb5-libs-0:1.2.7-68.x86_64",
"3ES:krb5-server-0:1.2.7-68.i386",
"3ES:krb5-server-0:1.2.7-68.ia64",
"3ES:krb5-server-0:1.2.7-68.ppc",
"3ES:krb5-server-0:1.2.7-68.s390",
"3ES:krb5-server-0:1.2.7-68.s390x",
"3ES:krb5-server-0:1.2.7-68.x86_64",
"3ES:krb5-workstation-0:1.2.7-68.i386",
"3ES:krb5-workstation-0:1.2.7-68.ia64",
"3ES:krb5-workstation-0:1.2.7-68.ppc",
"3ES:krb5-workstation-0:1.2.7-68.s390",
"3ES:krb5-workstation-0:1.2.7-68.s390x",
"3ES:krb5-workstation-0:1.2.7-68.x86_64",
"3WS:krb5-0:1.2.7-68.src",
"3WS:krb5-debuginfo-0:1.2.7-68.i386",
"3WS:krb5-debuginfo-0:1.2.7-68.ia64",
"3WS:krb5-debuginfo-0:1.2.7-68.ppc",
"3WS:krb5-debuginfo-0:1.2.7-68.ppc64",
"3WS:krb5-debuginfo-0:1.2.7-68.s390",
"3WS:krb5-debuginfo-0:1.2.7-68.s390x",
"3WS:krb5-debuginfo-0:1.2.7-68.x86_64",
"3WS:krb5-devel-0:1.2.7-68.i386",
"3WS:krb5-devel-0:1.2.7-68.ia64",
"3WS:krb5-devel-0:1.2.7-68.ppc",
"3WS:krb5-devel-0:1.2.7-68.s390",
"3WS:krb5-devel-0:1.2.7-68.s390x",
"3WS:krb5-devel-0:1.2.7-68.x86_64",
"3WS:krb5-libs-0:1.2.7-68.i386",
"3WS:krb5-libs-0:1.2.7-68.ia64",
"3WS:krb5-libs-0:1.2.7-68.ppc",
"3WS:krb5-libs-0:1.2.7-68.ppc64",
"3WS:krb5-libs-0:1.2.7-68.s390",
"3WS:krb5-libs-0:1.2.7-68.s390x",
"3WS:krb5-libs-0:1.2.7-68.x86_64",
"3WS:krb5-server-0:1.2.7-68.i386",
"3WS:krb5-server-0:1.2.7-68.ia64",
"3WS:krb5-server-0:1.2.7-68.ppc",
"3WS:krb5-server-0:1.2.7-68.s390",
"3WS:krb5-server-0:1.2.7-68.s390x",
"3WS:krb5-server-0:1.2.7-68.x86_64",
"3WS:krb5-workstation-0:1.2.7-68.i386",
"3WS:krb5-workstation-0:1.2.7-68.ia64",
"3WS:krb5-workstation-0:1.2.7-68.ppc",
"3WS:krb5-workstation-0:1.2.7-68.s390",
"3WS:krb5-workstation-0:1.2.7-68.s390x",
"3WS:krb5-workstation-0:1.2.7-68.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0181"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: possible leak of sensitive data from krb5kdc using krb4 request"
},
{
"acknowledgments": [
{
"names": [
"MIT"
]
}
],
"cve": "CVE-2008-0948",
"discovery_date": "2008-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "435087"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably other versions before 1.3, when running on systems whose unistd.h does not define the FD_SETSIZE macro, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering a large number of open file descriptors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: incorrect handling of high-numbered file descriptors in RPC library",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:krb5-0:1.2.2-48.src",
"2.1AS:krb5-devel-0:1.2.2-48.i386",
"2.1AS:krb5-devel-0:1.2.2-48.ia64",
"2.1AS:krb5-libs-0:1.2.2-48.i386",
"2.1AS:krb5-libs-0:1.2.2-48.ia64",
"2.1AS:krb5-server-0:1.2.2-48.i386",
"2.1AS:krb5-server-0:1.2.2-48.ia64",
"2.1AS:krb5-workstation-0:1.2.2-48.i386",
"2.1AS:krb5-workstation-0:1.2.2-48.ia64",
"2.1AW:krb5-0:1.2.2-48.src",
"2.1AW:krb5-devel-0:1.2.2-48.i386",
"2.1AW:krb5-devel-0:1.2.2-48.ia64",
"2.1AW:krb5-libs-0:1.2.2-48.i386",
"2.1AW:krb5-libs-0:1.2.2-48.ia64",
"2.1AW:krb5-server-0:1.2.2-48.i386",
"2.1AW:krb5-server-0:1.2.2-48.ia64",
"2.1AW:krb5-workstation-0:1.2.2-48.i386",
"2.1AW:krb5-workstation-0:1.2.2-48.ia64",
"2.1ES:krb5-0:1.2.2-48.src",
"2.1ES:krb5-devel-0:1.2.2-48.i386",
"2.1ES:krb5-devel-0:1.2.2-48.ia64",
"2.1ES:krb5-libs-0:1.2.2-48.i386",
"2.1ES:krb5-libs-0:1.2.2-48.ia64",
"2.1ES:krb5-server-0:1.2.2-48.i386",
"2.1ES:krb5-server-0:1.2.2-48.ia64",
"2.1ES:krb5-workstation-0:1.2.2-48.i386",
"2.1ES:krb5-workstation-0:1.2.2-48.ia64",
"2.1WS:krb5-0:1.2.2-48.src",
"2.1WS:krb5-devel-0:1.2.2-48.i386",
"2.1WS:krb5-devel-0:1.2.2-48.ia64",
"2.1WS:krb5-libs-0:1.2.2-48.i386",
"2.1WS:krb5-libs-0:1.2.2-48.ia64",
"2.1WS:krb5-server-0:1.2.2-48.i386",
"2.1WS:krb5-server-0:1.2.2-48.ia64",
"2.1WS:krb5-workstation-0:1.2.2-48.i386",
"2.1WS:krb5-workstation-0:1.2.2-48.ia64",
"3AS:krb5-0:1.2.7-68.src",
"3AS:krb5-debuginfo-0:1.2.7-68.i386",
"3AS:krb5-debuginfo-0:1.2.7-68.ia64",
"3AS:krb5-debuginfo-0:1.2.7-68.ppc",
"3AS:krb5-debuginfo-0:1.2.7-68.ppc64",
"3AS:krb5-debuginfo-0:1.2.7-68.s390",
"3AS:krb5-debuginfo-0:1.2.7-68.s390x",
"3AS:krb5-debuginfo-0:1.2.7-68.x86_64",
"3AS:krb5-devel-0:1.2.7-68.i386",
"3AS:krb5-devel-0:1.2.7-68.ia64",
"3AS:krb5-devel-0:1.2.7-68.ppc",
"3AS:krb5-devel-0:1.2.7-68.s390",
"3AS:krb5-devel-0:1.2.7-68.s390x",
"3AS:krb5-devel-0:1.2.7-68.x86_64",
"3AS:krb5-libs-0:1.2.7-68.i386",
"3AS:krb5-libs-0:1.2.7-68.ia64",
"3AS:krb5-libs-0:1.2.7-68.ppc",
"3AS:krb5-libs-0:1.2.7-68.ppc64",
"3AS:krb5-libs-0:1.2.7-68.s390",
"3AS:krb5-libs-0:1.2.7-68.s390x",
"3AS:krb5-libs-0:1.2.7-68.x86_64",
"3AS:krb5-server-0:1.2.7-68.i386",
"3AS:krb5-server-0:1.2.7-68.ia64",
"3AS:krb5-server-0:1.2.7-68.ppc",
"3AS:krb5-server-0:1.2.7-68.s390",
"3AS:krb5-server-0:1.2.7-68.s390x",
"3AS:krb5-server-0:1.2.7-68.x86_64",
"3AS:krb5-workstation-0:1.2.7-68.i386",
"3AS:krb5-workstation-0:1.2.7-68.ia64",
"3AS:krb5-workstation-0:1.2.7-68.ppc",
"3AS:krb5-workstation-0:1.2.7-68.s390",
"3AS:krb5-workstation-0:1.2.7-68.s390x",
"3AS:krb5-workstation-0:1.2.7-68.x86_64",
"3Desktop:krb5-0:1.2.7-68.src",
"3Desktop:krb5-debuginfo-0:1.2.7-68.i386",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ia64",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ppc",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ppc64",
"3Desktop:krb5-debuginfo-0:1.2.7-68.s390",
"3Desktop:krb5-debuginfo-0:1.2.7-68.s390x",
"3Desktop:krb5-debuginfo-0:1.2.7-68.x86_64",
"3Desktop:krb5-devel-0:1.2.7-68.i386",
"3Desktop:krb5-devel-0:1.2.7-68.ia64",
"3Desktop:krb5-devel-0:1.2.7-68.ppc",
"3Desktop:krb5-devel-0:1.2.7-68.s390",
"3Desktop:krb5-devel-0:1.2.7-68.s390x",
"3Desktop:krb5-devel-0:1.2.7-68.x86_64",
"3Desktop:krb5-libs-0:1.2.7-68.i386",
"3Desktop:krb5-libs-0:1.2.7-68.ia64",
"3Desktop:krb5-libs-0:1.2.7-68.ppc",
"3Desktop:krb5-libs-0:1.2.7-68.ppc64",
"3Desktop:krb5-libs-0:1.2.7-68.s390",
"3Desktop:krb5-libs-0:1.2.7-68.s390x",
"3Desktop:krb5-libs-0:1.2.7-68.x86_64",
"3Desktop:krb5-server-0:1.2.7-68.i386",
"3Desktop:krb5-server-0:1.2.7-68.ia64",
"3Desktop:krb5-server-0:1.2.7-68.ppc",
"3Desktop:krb5-server-0:1.2.7-68.s390",
"3Desktop:krb5-server-0:1.2.7-68.s390x",
"3Desktop:krb5-server-0:1.2.7-68.x86_64",
"3Desktop:krb5-workstation-0:1.2.7-68.i386",
"3Desktop:krb5-workstation-0:1.2.7-68.ia64",
"3Desktop:krb5-workstation-0:1.2.7-68.ppc",
"3Desktop:krb5-workstation-0:1.2.7-68.s390",
"3Desktop:krb5-workstation-0:1.2.7-68.s390x",
"3Desktop:krb5-workstation-0:1.2.7-68.x86_64",
"3ES:krb5-0:1.2.7-68.src",
"3ES:krb5-debuginfo-0:1.2.7-68.i386",
"3ES:krb5-debuginfo-0:1.2.7-68.ia64",
"3ES:krb5-debuginfo-0:1.2.7-68.ppc",
"3ES:krb5-debuginfo-0:1.2.7-68.ppc64",
"3ES:krb5-debuginfo-0:1.2.7-68.s390",
"3ES:krb5-debuginfo-0:1.2.7-68.s390x",
"3ES:krb5-debuginfo-0:1.2.7-68.x86_64",
"3ES:krb5-devel-0:1.2.7-68.i386",
"3ES:krb5-devel-0:1.2.7-68.ia64",
"3ES:krb5-devel-0:1.2.7-68.ppc",
"3ES:krb5-devel-0:1.2.7-68.s390",
"3ES:krb5-devel-0:1.2.7-68.s390x",
"3ES:krb5-devel-0:1.2.7-68.x86_64",
"3ES:krb5-libs-0:1.2.7-68.i386",
"3ES:krb5-libs-0:1.2.7-68.ia64",
"3ES:krb5-libs-0:1.2.7-68.ppc",
"3ES:krb5-libs-0:1.2.7-68.ppc64",
"3ES:krb5-libs-0:1.2.7-68.s390",
"3ES:krb5-libs-0:1.2.7-68.s390x",
"3ES:krb5-libs-0:1.2.7-68.x86_64",
"3ES:krb5-server-0:1.2.7-68.i386",
"3ES:krb5-server-0:1.2.7-68.ia64",
"3ES:krb5-server-0:1.2.7-68.ppc",
"3ES:krb5-server-0:1.2.7-68.s390",
"3ES:krb5-server-0:1.2.7-68.s390x",
"3ES:krb5-server-0:1.2.7-68.x86_64",
"3ES:krb5-workstation-0:1.2.7-68.i386",
"3ES:krb5-workstation-0:1.2.7-68.ia64",
"3ES:krb5-workstation-0:1.2.7-68.ppc",
"3ES:krb5-workstation-0:1.2.7-68.s390",
"3ES:krb5-workstation-0:1.2.7-68.s390x",
"3ES:krb5-workstation-0:1.2.7-68.x86_64",
"3WS:krb5-0:1.2.7-68.src",
"3WS:krb5-debuginfo-0:1.2.7-68.i386",
"3WS:krb5-debuginfo-0:1.2.7-68.ia64",
"3WS:krb5-debuginfo-0:1.2.7-68.ppc",
"3WS:krb5-debuginfo-0:1.2.7-68.ppc64",
"3WS:krb5-debuginfo-0:1.2.7-68.s390",
"3WS:krb5-debuginfo-0:1.2.7-68.s390x",
"3WS:krb5-debuginfo-0:1.2.7-68.x86_64",
"3WS:krb5-devel-0:1.2.7-68.i386",
"3WS:krb5-devel-0:1.2.7-68.ia64",
"3WS:krb5-devel-0:1.2.7-68.ppc",
"3WS:krb5-devel-0:1.2.7-68.s390",
"3WS:krb5-devel-0:1.2.7-68.s390x",
"3WS:krb5-devel-0:1.2.7-68.x86_64",
"3WS:krb5-libs-0:1.2.7-68.i386",
"3WS:krb5-libs-0:1.2.7-68.ia64",
"3WS:krb5-libs-0:1.2.7-68.ppc",
"3WS:krb5-libs-0:1.2.7-68.ppc64",
"3WS:krb5-libs-0:1.2.7-68.s390",
"3WS:krb5-libs-0:1.2.7-68.s390x",
"3WS:krb5-libs-0:1.2.7-68.x86_64",
"3WS:krb5-server-0:1.2.7-68.i386",
"3WS:krb5-server-0:1.2.7-68.ia64",
"3WS:krb5-server-0:1.2.7-68.ppc",
"3WS:krb5-server-0:1.2.7-68.s390",
"3WS:krb5-server-0:1.2.7-68.s390x",
"3WS:krb5-server-0:1.2.7-68.x86_64",
"3WS:krb5-workstation-0:1.2.7-68.i386",
"3WS:krb5-workstation-0:1.2.7-68.ia64",
"3WS:krb5-workstation-0:1.2.7-68.ppc",
"3WS:krb5-workstation-0:1.2.7-68.s390",
"3WS:krb5-workstation-0:1.2.7-68.s390x",
"3WS:krb5-workstation-0:1.2.7-68.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0948"
},
{
"category": "external",
"summary": "RHBZ#435087",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=435087"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0948",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0948"
}
],
"release_date": "2008-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-18T18:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:krb5-0:1.2.2-48.src",
"2.1AS:krb5-devel-0:1.2.2-48.i386",
"2.1AS:krb5-devel-0:1.2.2-48.ia64",
"2.1AS:krb5-libs-0:1.2.2-48.i386",
"2.1AS:krb5-libs-0:1.2.2-48.ia64",
"2.1AS:krb5-server-0:1.2.2-48.i386",
"2.1AS:krb5-server-0:1.2.2-48.ia64",
"2.1AS:krb5-workstation-0:1.2.2-48.i386",
"2.1AS:krb5-workstation-0:1.2.2-48.ia64",
"2.1AW:krb5-0:1.2.2-48.src",
"2.1AW:krb5-devel-0:1.2.2-48.i386",
"2.1AW:krb5-devel-0:1.2.2-48.ia64",
"2.1AW:krb5-libs-0:1.2.2-48.i386",
"2.1AW:krb5-libs-0:1.2.2-48.ia64",
"2.1AW:krb5-server-0:1.2.2-48.i386",
"2.1AW:krb5-server-0:1.2.2-48.ia64",
"2.1AW:krb5-workstation-0:1.2.2-48.i386",
"2.1AW:krb5-workstation-0:1.2.2-48.ia64",
"2.1ES:krb5-0:1.2.2-48.src",
"2.1ES:krb5-devel-0:1.2.2-48.i386",
"2.1ES:krb5-devel-0:1.2.2-48.ia64",
"2.1ES:krb5-libs-0:1.2.2-48.i386",
"2.1ES:krb5-libs-0:1.2.2-48.ia64",
"2.1ES:krb5-server-0:1.2.2-48.i386",
"2.1ES:krb5-server-0:1.2.2-48.ia64",
"2.1ES:krb5-workstation-0:1.2.2-48.i386",
"2.1ES:krb5-workstation-0:1.2.2-48.ia64",
"2.1WS:krb5-0:1.2.2-48.src",
"2.1WS:krb5-devel-0:1.2.2-48.i386",
"2.1WS:krb5-devel-0:1.2.2-48.ia64",
"2.1WS:krb5-libs-0:1.2.2-48.i386",
"2.1WS:krb5-libs-0:1.2.2-48.ia64",
"2.1WS:krb5-server-0:1.2.2-48.i386",
"2.1WS:krb5-server-0:1.2.2-48.ia64",
"2.1WS:krb5-workstation-0:1.2.2-48.i386",
"2.1WS:krb5-workstation-0:1.2.2-48.ia64",
"3AS:krb5-0:1.2.7-68.src",
"3AS:krb5-debuginfo-0:1.2.7-68.i386",
"3AS:krb5-debuginfo-0:1.2.7-68.ia64",
"3AS:krb5-debuginfo-0:1.2.7-68.ppc",
"3AS:krb5-debuginfo-0:1.2.7-68.ppc64",
"3AS:krb5-debuginfo-0:1.2.7-68.s390",
"3AS:krb5-debuginfo-0:1.2.7-68.s390x",
"3AS:krb5-debuginfo-0:1.2.7-68.x86_64",
"3AS:krb5-devel-0:1.2.7-68.i386",
"3AS:krb5-devel-0:1.2.7-68.ia64",
"3AS:krb5-devel-0:1.2.7-68.ppc",
"3AS:krb5-devel-0:1.2.7-68.s390",
"3AS:krb5-devel-0:1.2.7-68.s390x",
"3AS:krb5-devel-0:1.2.7-68.x86_64",
"3AS:krb5-libs-0:1.2.7-68.i386",
"3AS:krb5-libs-0:1.2.7-68.ia64",
"3AS:krb5-libs-0:1.2.7-68.ppc",
"3AS:krb5-libs-0:1.2.7-68.ppc64",
"3AS:krb5-libs-0:1.2.7-68.s390",
"3AS:krb5-libs-0:1.2.7-68.s390x",
"3AS:krb5-libs-0:1.2.7-68.x86_64",
"3AS:krb5-server-0:1.2.7-68.i386",
"3AS:krb5-server-0:1.2.7-68.ia64",
"3AS:krb5-server-0:1.2.7-68.ppc",
"3AS:krb5-server-0:1.2.7-68.s390",
"3AS:krb5-server-0:1.2.7-68.s390x",
"3AS:krb5-server-0:1.2.7-68.x86_64",
"3AS:krb5-workstation-0:1.2.7-68.i386",
"3AS:krb5-workstation-0:1.2.7-68.ia64",
"3AS:krb5-workstation-0:1.2.7-68.ppc",
"3AS:krb5-workstation-0:1.2.7-68.s390",
"3AS:krb5-workstation-0:1.2.7-68.s390x",
"3AS:krb5-workstation-0:1.2.7-68.x86_64",
"3Desktop:krb5-0:1.2.7-68.src",
"3Desktop:krb5-debuginfo-0:1.2.7-68.i386",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ia64",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ppc",
"3Desktop:krb5-debuginfo-0:1.2.7-68.ppc64",
"3Desktop:krb5-debuginfo-0:1.2.7-68.s390",
"3Desktop:krb5-debuginfo-0:1.2.7-68.s390x",
"3Desktop:krb5-debuginfo-0:1.2.7-68.x86_64",
"3Desktop:krb5-devel-0:1.2.7-68.i386",
"3Desktop:krb5-devel-0:1.2.7-68.ia64",
"3Desktop:krb5-devel-0:1.2.7-68.ppc",
"3Desktop:krb5-devel-0:1.2.7-68.s390",
"3Desktop:krb5-devel-0:1.2.7-68.s390x",
"3Desktop:krb5-devel-0:1.2.7-68.x86_64",
"3Desktop:krb5-libs-0:1.2.7-68.i386",
"3Desktop:krb5-libs-0:1.2.7-68.ia64",
"3Desktop:krb5-libs-0:1.2.7-68.ppc",
"3Desktop:krb5-libs-0:1.2.7-68.ppc64",
"3Desktop:krb5-libs-0:1.2.7-68.s390",
"3Desktop:krb5-libs-0:1.2.7-68.s390x",
"3Desktop:krb5-libs-0:1.2.7-68.x86_64",
"3Desktop:krb5-server-0:1.2.7-68.i386",
"3Desktop:krb5-server-0:1.2.7-68.ia64",
"3Desktop:krb5-server-0:1.2.7-68.ppc",
"3Desktop:krb5-server-0:1.2.7-68.s390",
"3Desktop:krb5-server-0:1.2.7-68.s390x",
"3Desktop:krb5-server-0:1.2.7-68.x86_64",
"3Desktop:krb5-workstation-0:1.2.7-68.i386",
"3Desktop:krb5-workstation-0:1.2.7-68.ia64",
"3Desktop:krb5-workstation-0:1.2.7-68.ppc",
"3Desktop:krb5-workstation-0:1.2.7-68.s390",
"3Desktop:krb5-workstation-0:1.2.7-68.s390x",
"3Desktop:krb5-workstation-0:1.2.7-68.x86_64",
"3ES:krb5-0:1.2.7-68.src",
"3ES:krb5-debuginfo-0:1.2.7-68.i386",
"3ES:krb5-debuginfo-0:1.2.7-68.ia64",
"3ES:krb5-debuginfo-0:1.2.7-68.ppc",
"3ES:krb5-debuginfo-0:1.2.7-68.ppc64",
"3ES:krb5-debuginfo-0:1.2.7-68.s390",
"3ES:krb5-debuginfo-0:1.2.7-68.s390x",
"3ES:krb5-debuginfo-0:1.2.7-68.x86_64",
"3ES:krb5-devel-0:1.2.7-68.i386",
"3ES:krb5-devel-0:1.2.7-68.ia64",
"3ES:krb5-devel-0:1.2.7-68.ppc",
"3ES:krb5-devel-0:1.2.7-68.s390",
"3ES:krb5-devel-0:1.2.7-68.s390x",
"3ES:krb5-devel-0:1.2.7-68.x86_64",
"3ES:krb5-libs-0:1.2.7-68.i386",
"3ES:krb5-libs-0:1.2.7-68.ia64",
"3ES:krb5-libs-0:1.2.7-68.ppc",
"3ES:krb5-libs-0:1.2.7-68.ppc64",
"3ES:krb5-libs-0:1.2.7-68.s390",
"3ES:krb5-libs-0:1.2.7-68.s390x",
"3ES:krb5-libs-0:1.2.7-68.x86_64",
"3ES:krb5-server-0:1.2.7-68.i386",
"3ES:krb5-server-0:1.2.7-68.ia64",
"3ES:krb5-server-0:1.2.7-68.ppc",
"3ES:krb5-server-0:1.2.7-68.s390",
"3ES:krb5-server-0:1.2.7-68.s390x",
"3ES:krb5-server-0:1.2.7-68.x86_64",
"3ES:krb5-workstation-0:1.2.7-68.i386",
"3ES:krb5-workstation-0:1.2.7-68.ia64",
"3ES:krb5-workstation-0:1.2.7-68.ppc",
"3ES:krb5-workstation-0:1.2.7-68.s390",
"3ES:krb5-workstation-0:1.2.7-68.s390x",
"3ES:krb5-workstation-0:1.2.7-68.x86_64",
"3WS:krb5-0:1.2.7-68.src",
"3WS:krb5-debuginfo-0:1.2.7-68.i386",
"3WS:krb5-debuginfo-0:1.2.7-68.ia64",
"3WS:krb5-debuginfo-0:1.2.7-68.ppc",
"3WS:krb5-debuginfo-0:1.2.7-68.ppc64",
"3WS:krb5-debuginfo-0:1.2.7-68.s390",
"3WS:krb5-debuginfo-0:1.2.7-68.s390x",
"3WS:krb5-debuginfo-0:1.2.7-68.x86_64",
"3WS:krb5-devel-0:1.2.7-68.i386",
"3WS:krb5-devel-0:1.2.7-68.ia64",
"3WS:krb5-devel-0:1.2.7-68.ppc",
"3WS:krb5-devel-0:1.2.7-68.s390",
"3WS:krb5-devel-0:1.2.7-68.s390x",
"3WS:krb5-devel-0:1.2.7-68.x86_64",
"3WS:krb5-libs-0:1.2.7-68.i386",
"3WS:krb5-libs-0:1.2.7-68.ia64",
"3WS:krb5-libs-0:1.2.7-68.ppc",
"3WS:krb5-libs-0:1.2.7-68.ppc64",
"3WS:krb5-libs-0:1.2.7-68.s390",
"3WS:krb5-libs-0:1.2.7-68.s390x",
"3WS:krb5-libs-0:1.2.7-68.x86_64",
"3WS:krb5-server-0:1.2.7-68.i386",
"3WS:krb5-server-0:1.2.7-68.ia64",
"3WS:krb5-server-0:1.2.7-68.ppc",
"3WS:krb5-server-0:1.2.7-68.s390",
"3WS:krb5-server-0:1.2.7-68.s390x",
"3WS:krb5-server-0:1.2.7-68.x86_64",
"3WS:krb5-workstation-0:1.2.7-68.i386",
"3WS:krb5-workstation-0:1.2.7-68.ia64",
"3WS:krb5-workstation-0:1.2.7-68.ppc",
"3WS:krb5-workstation-0:1.2.7-68.s390",
"3WS:krb5-workstation-0:1.2.7-68.s390x",
"3WS:krb5-workstation-0:1.2.7-68.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0181"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: incorrect handling of high-numbered file descriptors in RPC library"
}
]
}
RHSA-2008:0180
Vulnerability from csaf_redhat - Published: 2008-03-18 18:35 - Updated: 2025-11-21 17:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated krb5 packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system which allows clients and\nservers to authenticate to each other through use of symmetric encryption\nand a trusted third party, the KDC.\n\nA flaw was found in the way the MIT Kerberos Authentication Service and Key\nDistribution Center server (krb5kdc) handled Kerberos v4 protocol packets.\nAn unauthenticated remote attacker could use this flaw to crash the\nkrb5kdc daemon, disclose portions of its memory, or possibly execute\narbitrary code using malformed or truncated Kerberos v4 protocol\nrequests. (CVE-2008-0062, CVE-2008-0063)\n\nThis issue only affected krb5kdc with Kerberos v4 protocol compatibility\nenabled, which is the default setting on Red Hat Enterprise Linux 4.\nKerberos v4 protocol support can be disabled by adding \"v4_mode=none\"\n(without the quotes) to the \"[kdcdefaults]\" section of\n/var/kerberos/krb5kdc/kdc.conf.\n\nRed Hat would like to thank MIT for reporting these issues.\n\nA double-free flaw was discovered in the GSSAPI library used by MIT\nKerberos. This flaw could possibly cause a crash of the application using\nthe GSSAPI library. (CVE-2007-5971)\n\nAll krb5 users are advised to update to these erratum packages which\ncontain backported fixes to correct these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0180",
"url": "https://access.redhat.com/errata/RHSA-2008:0180"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "415351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=415351"
},
{
"category": "external",
"summary": "432620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432620"
},
{
"category": "external",
"summary": "432621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432621"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0180.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-21T17:33:03+00:00",
"generator": {
"date": "2025-11-21T17:33:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0180",
"initial_release_date": "2008-03-18T18:35:00+00:00",
"revision_history": [
{
"date": "2008-03-18T18:35:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-03-18T14:47:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"product": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"product_id": "krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.3.4-54.el4_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.3.4-54.el4_6.1.ia64",
"product": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.ia64",
"product_id": "krb5-server-0:1.3.4-54.el4_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.3.4-54.el4_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"product": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"product_id": "krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-54.el4_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"product": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"product_id": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-54.el4_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"product": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"product_id": "krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.3.4-54.el4_6.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"product": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"product_id": "krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-54.el4_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.3.4-54.el4_6.1.i386",
"product": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.i386",
"product_id": "krb5-libs-0:1.3.4-54.el4_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.3.4-54.el4_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.3.4-54.el4_6.1.i386",
"product": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.i386",
"product_id": "krb5-devel-0:1.3.4-54.el4_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.3.4-54.el4_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.3.4-54.el4_6.1.i386",
"product": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.i386",
"product_id": "krb5-server-0:1.3.4-54.el4_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.3.4-54.el4_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"product": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"product_id": "krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-54.el4_6.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"product": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"product_id": "krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.3.4-54.el4_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"product": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"product_id": "krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.3.4-54.el4_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"product": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"product_id": "krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-54.el4_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"product_id": "krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-54.el4_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"product": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"product_id": "krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.3.4-54.el4_6.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.3.4-54.el4_6.1.src",
"product": {
"name": "krb5-0:1.3.4-54.el4_6.1.src",
"product_id": "krb5-0:1.3.4-54.el4_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.3.4-54.el4_6.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"product": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"product_id": "krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.3.4-54.el4_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.3.4-54.el4_6.1.ppc",
"product": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.ppc",
"product_id": "krb5-server-0:1.3.4-54.el4_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.3.4-54.el4_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"product": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"product_id": "krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-54.el4_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"product": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"product_id": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-54.el4_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"product": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"product_id": "krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.3.4-54.el4_6.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"product": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"product_id": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-54.el4_6.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"product": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"product_id": "krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.3.4-54.el4_6.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"product": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"product_id": "krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.3.4-54.el4_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.3.4-54.el4_6.1.s390x",
"product": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.s390x",
"product_id": "krb5-server-0:1.3.4-54.el4_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.3.4-54.el4_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"product": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"product_id": "krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-54.el4_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"product": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"product_id": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-54.el4_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"product": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"product_id": "krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.3.4-54.el4_6.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"product": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"product_id": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-54.el4_6.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.3.4-54.el4_6.1.s390",
"product": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.s390",
"product_id": "krb5-libs-0:1.3.4-54.el4_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.3.4-54.el4_6.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.3.4-54.el4_6.1.s390",
"product": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.s390",
"product_id": "krb5-devel-0:1.3.4-54.el4_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.3.4-54.el4_6.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.3.4-54.el4_6.1.s390",
"product": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.s390",
"product_id": "krb5-server-0:1.3.4-54.el4_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.3.4-54.el4_6.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"product": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"product_id": "krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-54.el4_6.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.3.4-54.el4_6.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-0:1.3.4-54.el4_6.1.src"
},
"product_reference": "krb5-0:1.3.4-54.el4_6.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-devel-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-devel-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-devel-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-devel-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-devel-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-devel-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-libs-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-libs-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-libs-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-libs-0:1.3.4-54.el4_6.1.ppc64"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-libs-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-libs-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-libs-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-server-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-server-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-server-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-server-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-server-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-server-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-workstation-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-workstation-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-workstation-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-workstation-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-workstation-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.3.4-54.el4_6.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-0:1.3.4-54.el4_6.1.src"
},
"product_reference": "krb5-0:1.3.4-54.el4_6.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ppc64"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-server-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-server-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-server-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-server-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-server-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-server-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.3.4-54.el4_6.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-0:1.3.4-54.el4_6.1.src"
},
"product_reference": "krb5-0:1.3.4-54.el4_6.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-devel-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-devel-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-devel-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-devel-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-devel-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-devel-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-libs-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-libs-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-libs-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-libs-0:1.3.4-54.el4_6.1.ppc64"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-libs-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-libs-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-libs-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-server-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-server-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-server-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-server-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-server-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-server-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-workstation-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-workstation-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-workstation-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-workstation-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-workstation-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.3.4-54.el4_6.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-0:1.3.4-54.el4_6.1.src"
},
"product_reference": "krb5-0:1.3.4-54.el4_6.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-devel-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-devel-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-devel-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-devel-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-devel-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-devel-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-libs-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-libs-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-libs-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-libs-0:1.3.4-54.el4_6.1.ppc64"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-libs-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-libs-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-libs-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-server-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-server-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-server-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-server-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-server-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-server-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-workstation-0:1.3.4-54.el4_6.1.i386"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-workstation-0:1.3.4-54.el4_6.1.ia64"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-workstation-0:1.3.4-54.el4_6.1.ppc"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-workstation-0:1.3.4-54.el4_6.1.s390"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-workstation-0:1.3.4-54.el4_6.1.s390x"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-54.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5971",
"discovery_date": "2007-11-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "415351"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/krb5/k5sealv3.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: double free in gssapi lib",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. See https://marc.info/?m=119743235325151",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS:krb5-0:1.3.4-54.el4_6.1.src",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-0:1.3.4-54.el4_6.1.src",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-0:1.3.4-54.el4_6.1.src",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-0:1.3.4-54.el4_6.1.src",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5971"
},
{
"category": "external",
"summary": "RHBZ#415351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=415351"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5971",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5971"
}
],
"release_date": "2007-11-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-18T18:35:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:krb5-0:1.3.4-54.el4_6.1.src",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-0:1.3.4-54.el4_6.1.src",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-0:1.3.4-54.el4_6.1.src",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-0:1.3.4-54.el4_6.1.src",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0180"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "krb5: double free in gssapi lib"
},
{
"acknowledgments": [
{
"names": [
"MIT"
]
}
],
"cve": "CVE-2008-0062",
"discovery_date": "2008-02-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "432620"
}
],
"notes": [
{
"category": "description",
"text": "KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: uninitialized pointer use in krb5kdc",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:krb5-0:1.3.4-54.el4_6.1.src",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-0:1.3.4-54.el4_6.1.src",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-0:1.3.4-54.el4_6.1.src",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-0:1.3.4-54.el4_6.1.src",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0062"
},
{
"category": "external",
"summary": "RHBZ#432620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432620"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0062"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0062",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0062"
}
],
"release_date": "2008-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-18T18:35:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:krb5-0:1.3.4-54.el4_6.1.src",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-0:1.3.4-54.el4_6.1.src",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-0:1.3.4-54.el4_6.1.src",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-0:1.3.4-54.el4_6.1.src",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0180"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "krb5: uninitialized pointer use in krb5kdc"
},
{
"acknowledgments": [
{
"names": [
"MIT"
]
}
],
"cve": "CVE-2008-0063",
"discovery_date": "2008-02-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "432621"
}
],
"notes": [
{
"category": "description",
"text": "The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka \"Uninitialized stack values.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: possible leak of sensitive data from krb5kdc using krb4 request",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:krb5-0:1.3.4-54.el4_6.1.src",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-0:1.3.4-54.el4_6.1.src",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-0:1.3.4-54.el4_6.1.src",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-0:1.3.4-54.el4_6.1.src",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0063"
},
{
"category": "external",
"summary": "RHBZ#432621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432621"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0063"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0063",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0063"
}
],
"release_date": "2008-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-18T18:35:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:krb5-0:1.3.4-54.el4_6.1.src",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4AS:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-0:1.3.4-54.el4_6.1.src",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4Desktop:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-0:1.3.4-54.el4_6.1.src",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4ES:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-0:1.3.4-54.el4_6.1.src",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.ppc64",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-debuginfo-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-devel-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.ppc64",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-libs-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-server-0:1.3.4-54.el4_6.1.x86_64",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.i386",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.ia64",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.ppc",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.s390",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.s390x",
"4WS:krb5-workstation-0:1.3.4-54.el4_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0180"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: possible leak of sensitive data from krb5kdc using krb4 request"
}
]
}
RHSA-2008:0182
Vulnerability from csaf_redhat - Published: 2008-03-18 19:22 - Updated: 2025-11-21 17:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated krb5 packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 4.5 Extended Update Support.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system which allows clients and\nservers to authenticate to each other through use of symmetric encryption\nand a trusted third party, the KDC.\n\nA flaw was found in the way the MIT Kerberos Authentication Service and Key\nDistribution Center server (krb5kdc) handled Kerberos v4 protocol packets.\nAn unauthenticated remote attacker could use this flaw to crash the\nkrb5kdc daemon, disclose portions of its memory, or possibly execute\narbitrary code using malformed or truncated Kerberos v4 protocol\nrequests. (CVE-2008-0062, CVE-2008-0063)\n\nThis issue only affected krb5kdc with Kerberos v4 protocol compatibility\nenabled, which is the default setting on Red Hat Enterprise Linux 4.\nKerberos v4 protocol support can be disabled by adding \"v4_mode=none\"\n(without the quotes) to the \"[kdcdefaults]\" section of\n/var/kerberos/krb5kdc/kdc.conf.\n\nRed Hat would like to thank MIT for reporting these issues.\n\nAll krb5 users are advised to update to these erratum packages which\ncontain backported fixes to correct these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0182",
"url": "https://access.redhat.com/errata/RHSA-2008:0182"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "432620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432620"
},
{
"category": "external",
"summary": "432621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432621"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0182.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-21T17:33:03+00:00",
"generator": {
"date": "2025-11-21T17:33:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0182",
"initial_release_date": "2008-03-18T19:22:00+00:00",
"revision_history": [
{
"date": "2008-03-18T19:22:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-03-18T15:22:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product": {
"name": "Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:4.5::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product": {
"name": "Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:4.5::es"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.3.4-49.el4_5.1.ia64",
"product": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.ia64",
"product_id": "krb5-devel-0:1.3.4-49.el4_5.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.3.4-49.el4_5.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.ia64",
"product": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.ia64",
"product_id": "krb5-workstation-0:1.3.4-49.el4_5.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-49.el4_5.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64",
"product": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64",
"product_id": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-49.el4_5.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.3.4-49.el4_5.1.ia64",
"product": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.ia64",
"product_id": "krb5-libs-0:1.3.4-49.el4_5.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.3.4-49.el4_5.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.3.4-49.el4_5.1.ia64",
"product": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.ia64",
"product_id": "krb5-server-0:1.3.4-49.el4_5.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.3.4-49.el4_5.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.i386",
"product": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.i386",
"product_id": "krb5-debuginfo-0:1.3.4-49.el4_5.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-49.el4_5.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.3.4-49.el4_5.1.i386",
"product": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.i386",
"product_id": "krb5-libs-0:1.3.4-49.el4_5.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.3.4-49.el4_5.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.3.4-49.el4_5.1.i386",
"product": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.i386",
"product_id": "krb5-devel-0:1.3.4-49.el4_5.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.3.4-49.el4_5.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.i386",
"product": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.i386",
"product_id": "krb5-workstation-0:1.3.4-49.el4_5.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-49.el4_5.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.3.4-49.el4_5.1.i386",
"product": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.i386",
"product_id": "krb5-server-0:1.3.4-49.el4_5.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.3.4-49.el4_5.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.3.4-49.el4_5.1.x86_64",
"product": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.x86_64",
"product_id": "krb5-devel-0:1.3.4-49.el4_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.3.4-49.el4_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.x86_64",
"product": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.x86_64",
"product_id": "krb5-workstation-0:1.3.4-49.el4_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-49.el4_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64",
"product_id": "krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-49.el4_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.3.4-49.el4_5.1.x86_64",
"product": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.x86_64",
"product_id": "krb5-libs-0:1.3.4-49.el4_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.3.4-49.el4_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.3.4-49.el4_5.1.x86_64",
"product": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.x86_64",
"product_id": "krb5-server-0:1.3.4-49.el4_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.3.4-49.el4_5.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.3.4-49.el4_5.1.src",
"product": {
"name": "krb5-0:1.3.4-49.el4_5.1.src",
"product_id": "krb5-0:1.3.4-49.el4_5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.3.4-49.el4_5.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.3.4-49.el4_5.1.ppc",
"product": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.ppc",
"product_id": "krb5-devel-0:1.3.4-49.el4_5.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.3.4-49.el4_5.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.ppc",
"product": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.ppc",
"product_id": "krb5-workstation-0:1.3.4-49.el4_5.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-49.el4_5.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc",
"product": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc",
"product_id": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-49.el4_5.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.3.4-49.el4_5.1.ppc",
"product": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.ppc",
"product_id": "krb5-libs-0:1.3.4-49.el4_5.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.3.4-49.el4_5.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.3.4-49.el4_5.1.ppc",
"product": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.ppc",
"product_id": "krb5-server-0:1.3.4-49.el4_5.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.3.4-49.el4_5.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64",
"product": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64",
"product_id": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-49.el4_5.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.3.4-49.el4_5.1.ppc64",
"product": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.ppc64",
"product_id": "krb5-libs-0:1.3.4-49.el4_5.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.3.4-49.el4_5.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.3.4-49.el4_5.1.s390x",
"product": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.s390x",
"product_id": "krb5-devel-0:1.3.4-49.el4_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.3.4-49.el4_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.s390x",
"product": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.s390x",
"product_id": "krb5-workstation-0:1.3.4-49.el4_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-49.el4_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x",
"product": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x",
"product_id": "krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-49.el4_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.3.4-49.el4_5.1.s390x",
"product": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.s390x",
"product_id": "krb5-libs-0:1.3.4-49.el4_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.3.4-49.el4_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.3.4-49.el4_5.1.s390x",
"product": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.s390x",
"product_id": "krb5-server-0:1.3.4-49.el4_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.3.4-49.el4_5.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.s390",
"product": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.s390",
"product_id": "krb5-debuginfo-0:1.3.4-49.el4_5.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-49.el4_5.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.3.4-49.el4_5.1.s390",
"product": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.s390",
"product_id": "krb5-libs-0:1.3.4-49.el4_5.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.3.4-49.el4_5.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.3.4-49.el4_5.1.s390",
"product": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.s390",
"product_id": "krb5-devel-0:1.3.4-49.el4_5.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.3.4-49.el4_5.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.s390",
"product": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.s390",
"product_id": "krb5-workstation-0:1.3.4-49.el4_5.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-49.el4_5.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.3.4-49.el4_5.1.s390",
"product": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.s390",
"product_id": "krb5-server-0:1.3.4-49.el4_5.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.3.4-49.el4_5.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.3.4-49.el4_5.1.src as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-0:1.3.4-49.el4_5.1.src"
},
"product_reference": "krb5-0:1.3.4-49.el4_5.1.src",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.i386"
},
"product_reference": "krb5-debuginfo-0:1.3.4-49.el4_5.1.i386",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc"
},
"product_reference": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390"
},
"product_reference": "krb5-debuginfo-0:1.3.4-49.el4_5.1.s390",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.i386"
},
"product_reference": "krb5-devel-0:1.3.4-49.el4_5.1.i386",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ia64"
},
"product_reference": "krb5-devel-0:1.3.4-49.el4_5.1.ia64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ppc"
},
"product_reference": "krb5-devel-0:1.3.4-49.el4_5.1.ppc",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390"
},
"product_reference": "krb5-devel-0:1.3.4-49.el4_5.1.s390",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390x"
},
"product_reference": "krb5-devel-0:1.3.4-49.el4_5.1.s390x",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.x86_64"
},
"product_reference": "krb5-devel-0:1.3.4-49.el4_5.1.x86_64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.i386"
},
"product_reference": "krb5-libs-0:1.3.4-49.el4_5.1.i386",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ia64"
},
"product_reference": "krb5-libs-0:1.3.4-49.el4_5.1.ia64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc"
},
"product_reference": "krb5-libs-0:1.3.4-49.el4_5.1.ppc",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc64"
},
"product_reference": "krb5-libs-0:1.3.4-49.el4_5.1.ppc64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390"
},
"product_reference": "krb5-libs-0:1.3.4-49.el4_5.1.s390",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390x"
},
"product_reference": "krb5-libs-0:1.3.4-49.el4_5.1.s390x",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.x86_64"
},
"product_reference": "krb5-libs-0:1.3.4-49.el4_5.1.x86_64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.i386"
},
"product_reference": "krb5-server-0:1.3.4-49.el4_5.1.i386",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ia64"
},
"product_reference": "krb5-server-0:1.3.4-49.el4_5.1.ia64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ppc"
},
"product_reference": "krb5-server-0:1.3.4-49.el4_5.1.ppc",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390"
},
"product_reference": "krb5-server-0:1.3.4-49.el4_5.1.s390",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390x"
},
"product_reference": "krb5-server-0:1.3.4-49.el4_5.1.s390x",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.x86_64"
},
"product_reference": "krb5-server-0:1.3.4-49.el4_5.1.x86_64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.i386"
},
"product_reference": "krb5-workstation-0:1.3.4-49.el4_5.1.i386",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ia64"
},
"product_reference": "krb5-workstation-0:1.3.4-49.el4_5.1.ia64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ppc"
},
"product_reference": "krb5-workstation-0:1.3.4-49.el4_5.1.ppc",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390"
},
"product_reference": "krb5-workstation-0:1.3.4-49.el4_5.1.s390",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390x"
},
"product_reference": "krb5-workstation-0:1.3.4-49.el4_5.1.s390x",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.3.4-49.el4_5.1.x86_64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.3.4-49.el4_5.1.src as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-0:1.3.4-49.el4_5.1.src"
},
"product_reference": "krb5-0:1.3.4-49.el4_5.1.src",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.i386"
},
"product_reference": "krb5-debuginfo-0:1.3.4-49.el4_5.1.i386",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc"
},
"product_reference": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390"
},
"product_reference": "krb5-debuginfo-0:1.3.4-49.el4_5.1.s390",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.i386"
},
"product_reference": "krb5-devel-0:1.3.4-49.el4_5.1.i386",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ia64"
},
"product_reference": "krb5-devel-0:1.3.4-49.el4_5.1.ia64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ppc"
},
"product_reference": "krb5-devel-0:1.3.4-49.el4_5.1.ppc",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390"
},
"product_reference": "krb5-devel-0:1.3.4-49.el4_5.1.s390",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390x"
},
"product_reference": "krb5-devel-0:1.3.4-49.el4_5.1.s390x",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.3.4-49.el4_5.1.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.x86_64"
},
"product_reference": "krb5-devel-0:1.3.4-49.el4_5.1.x86_64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.i386"
},
"product_reference": "krb5-libs-0:1.3.4-49.el4_5.1.i386",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ia64"
},
"product_reference": "krb5-libs-0:1.3.4-49.el4_5.1.ia64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc"
},
"product_reference": "krb5-libs-0:1.3.4-49.el4_5.1.ppc",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc64"
},
"product_reference": "krb5-libs-0:1.3.4-49.el4_5.1.ppc64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390"
},
"product_reference": "krb5-libs-0:1.3.4-49.el4_5.1.s390",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390x"
},
"product_reference": "krb5-libs-0:1.3.4-49.el4_5.1.s390x",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.3.4-49.el4_5.1.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.x86_64"
},
"product_reference": "krb5-libs-0:1.3.4-49.el4_5.1.x86_64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.i386"
},
"product_reference": "krb5-server-0:1.3.4-49.el4_5.1.i386",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ia64"
},
"product_reference": "krb5-server-0:1.3.4-49.el4_5.1.ia64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ppc"
},
"product_reference": "krb5-server-0:1.3.4-49.el4_5.1.ppc",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390"
},
"product_reference": "krb5-server-0:1.3.4-49.el4_5.1.s390",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390x"
},
"product_reference": "krb5-server-0:1.3.4-49.el4_5.1.s390x",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.3.4-49.el4_5.1.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.x86_64"
},
"product_reference": "krb5-server-0:1.3.4-49.el4_5.1.x86_64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.i386"
},
"product_reference": "krb5-workstation-0:1.3.4-49.el4_5.1.i386",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ia64"
},
"product_reference": "krb5-workstation-0:1.3.4-49.el4_5.1.ia64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ppc"
},
"product_reference": "krb5-workstation-0:1.3.4-49.el4_5.1.ppc",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390"
},
"product_reference": "krb5-workstation-0:1.3.4-49.el4_5.1.s390",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390x"
},
"product_reference": "krb5-workstation-0:1.3.4-49.el4_5.1.s390x",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.3.4-49.el4_5.1.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.3.4-49.el4_5.1.x86_64",
"relates_to_product_reference": "4ES-4.5.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"MIT"
]
}
],
"cve": "CVE-2008-0062",
"discovery_date": "2008-02-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "432620"
}
],
"notes": [
{
"category": "description",
"text": "KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: uninitialized pointer use in krb5kdc",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-4.5.z:krb5-0:1.3.4-49.el4_5.1.src",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc64",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-0:1.3.4-49.el4_5.1.src",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc64",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0062"
},
{
"category": "external",
"summary": "RHBZ#432620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432620"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0062"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0062",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0062"
}
],
"release_date": "2008-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-18T19:22:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-4.5.z:krb5-0:1.3.4-49.el4_5.1.src",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc64",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-0:1.3.4-49.el4_5.1.src",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc64",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0182"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "krb5: uninitialized pointer use in krb5kdc"
},
{
"acknowledgments": [
{
"names": [
"MIT"
]
}
],
"cve": "CVE-2008-0063",
"discovery_date": "2008-02-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "432621"
}
],
"notes": [
{
"category": "description",
"text": "The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka \"Uninitialized stack values.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: possible leak of sensitive data from krb5kdc using krb4 request",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-4.5.z:krb5-0:1.3.4-49.el4_5.1.src",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc64",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-0:1.3.4-49.el4_5.1.src",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc64",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0063"
},
{
"category": "external",
"summary": "RHBZ#432621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432621"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0063"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0063",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0063"
}
],
"release_date": "2008-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-18T19:22:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS-4.5.z:krb5-0:1.3.4-49.el4_5.1.src",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc64",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.x86_64",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.i386",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ia64",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ppc",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390x",
"4AS-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-0:1.3.4-49.el4_5.1.src",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.ppc64",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-debuginfo-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-devel-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.ppc64",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-libs-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-server-0:1.3.4-49.el4_5.1.x86_64",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.i386",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ia64",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.ppc",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.s390x",
"4ES-4.5.z:krb5-workstation-0:1.3.4-49.el4_5.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0182"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: possible leak of sensitive data from krb5kdc using krb4 request"
}
]
}
RHSA-2008:0164
Vulnerability from csaf_redhat - Published: 2008-03-18 19:26 - Updated: 2025-11-21 17:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated krb5 packages that resolve several issues and fix multiple bugs are\nnow available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system which allows clients and\nservers to authenticate to each other through use of symmetric encryption\nand a trusted third party, the KDC.\n\nA flaw was found in the way the MIT Kerberos Authentication Service and Key\nDistribution Center server (krb5kdc) handled Kerberos v4 protocol packets.\nAn unauthenticated remote attacker could use this flaw to crash the\nkrb5kdc daemon, disclose portions of its memory, or possibly execute\narbitrary code using malformed or truncated Kerberos v4 protocol requests.\n(CVE-2008-0062, CVE-2008-0063)\n\nThis issue only affected krb5kdc with Kerberos v4 protocol compatibility\nenabled, which is the default setting on Red Hat Enterprise Linux 4.\nKerberos v4 protocol support can be disabled by adding \"v4_mode=none\"\n(without the quotes) to the \"[kdcdefaults]\" section of\n/var/kerberos/krb5kdc/kdc.conf.\n\nJeff Altman of Secure Endpoints discovered a flaw in the RPC library as\nused by MIT Kerberos kadmind server. An unauthenticated remote attacker\ncould use this flaw to crash kadmind or possibly execute arbitrary code.\nThis issue only affected systems with certain resource limits configured\nand did not affect systems using default resource limits used by Red Hat\nEnterprise Linux 5. (CVE-2008-0947)\n\nRed Hat would like to thank MIT for reporting these issues.\n\nMultiple memory management flaws were discovered in the GSSAPI library used\nby MIT Kerberos. These flaws could possibly result in use of already freed\nmemory or an attempt to free already freed memory blocks (double-free\nflaw), possibly causing a crash or arbitrary code execution.\n(CVE-2007-5901, CVE-2007-5971)\n\nIn addition to the security issues resolved above, the following bugs were\nalso fixed:\n\n* delegated krb5 credentials were not properly stored when SPNEGO was the\nunderlying mechanism during GSSAPI authentication. Consequently,\napplications attempting to copy delegated Kerberos 5 credentials into a\ncredential cache received an \"Invalid credential was supplied\" message\nrather than a copy of the delegated credentials. With this update, SPNEGO\ncredentials can be properly searched, allowing applications to copy\ndelegated credentials as expected.\n\n* applications can initiate context acceptance (via gss_accept_sec_context)\nwithout passing a ret_flags value that would indicate that credentials were\ndelegated. A delegated credential handle should have been returned in such\ninstances. This updated package adds a temp_ret_flag that stores the\ncredential status in the event no other ret_flags value is passed by an\napplication calling gss_accept_sec_context.\n\n* kpasswd did not fallback to TCP on receipt of certain errors, or when a\npacket was too big for UDP. This update corrects this.\n\n* when the libkrb5 password-routine generated a set-password or\nchange-password request, incorrect sequence numbers were generated for all\nrequests subsequent to the first request. This caused password change\nrequests to fail if the primary server was unavailable. This updated\npackage corrects this by saving the sequence number value after the AP-REQ\ndata is built and restoring this value before the request is generated.\n\n* when a user\u0027s password expired, kinit would not prompt that user to\nchange the password, instead simply informing the user their password had\nexpired. This update corrects this behavior: kinit now prompts for a new\npassword to be set when a password has expired.\n\nAll krb5 users are advised to upgrade to these updated packages, which\ncontain backported fixes to address these vulnerabilities and fix these\nbugs.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0164",
"url": "https://access.redhat.com/errata/RHSA-2008:0164"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "415321",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=415321"
},
{
"category": "external",
"summary": "415351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=415351"
},
{
"category": "external",
"summary": "432620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432620"
},
{
"category": "external",
"summary": "432621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432621"
},
{
"category": "external",
"summary": "433596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=433596"
},
{
"category": "external",
"summary": "436460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=436460"
},
{
"category": "external",
"summary": "436465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=436465"
},
{
"category": "external",
"summary": "436467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=436467"
},
{
"category": "external",
"summary": "436468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=436468"
},
{
"category": "external",
"summary": "436470",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=436470"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0164.json"
}
],
"title": "Red Hat Security Advisory: krb5 security and bugfix update",
"tracking": {
"current_release_date": "2025-11-21T17:33:00+00:00",
"generator": {
"date": "2025-11-21T17:33:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0164",
"initial_release_date": "2008-03-18T19:26:00+00:00",
"revision_history": [
{
"date": "2008-03-18T19:26:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-03-18T15:26:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.6.1-17.el5_1.1.src",
"product": {
"name": "krb5-0:1.6.1-17.el5_1.1.src",
"product_id": "krb5-0:1.6.1-17.el5_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.6.1-17.el5_1.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"product_id": "krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.6.1-17.el5_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"product": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"product_id": "krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.6.1-17.el5_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"product": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"product_id": "krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.6.1-17.el5_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"product": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"product_id": "krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.6.1-17.el5_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"product": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"product_id": "krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.6.1-17.el5_1.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"product": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"product_id": "krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.6.1-17.el5_1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.6.1-17.el5_1.1.i386",
"product": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.i386",
"product_id": "krb5-devel-0:1.6.1-17.el5_1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.6.1-17.el5_1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.6.1-17.el5_1.1.i386",
"product": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.i386",
"product_id": "krb5-server-0:1.6.1-17.el5_1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.6.1-17.el5_1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.6.1-17.el5_1.1.i386",
"product": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.i386",
"product_id": "krb5-libs-0:1.6.1-17.el5_1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.6.1-17.el5_1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"product": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"product_id": "krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.6.1-17.el5_1.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"product": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"product_id": "krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.6.1-17.el5_1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"product": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"product_id": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.6.1-17.el5_1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.6.1-17.el5_1.1.ia64",
"product": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.ia64",
"product_id": "krb5-server-0:1.6.1-17.el5_1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.6.1-17.el5_1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"product": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"product_id": "krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.6.1-17.el5_1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"product": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"product_id": "krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.6.1-17.el5_1.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"product": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"product_id": "krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.6.1-17.el5_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"product": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"product_id": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.6.1-17.el5_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"product": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"product_id": "krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.6.1-17.el5_1.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"product": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"product_id": "krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.6.1-17.el5_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"product": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"product_id": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.6.1-17.el5_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.6.1-17.el5_1.1.ppc",
"product": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.ppc",
"product_id": "krb5-server-0:1.6.1-17.el5_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.6.1-17.el5_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"product": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"product_id": "krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.6.1-17.el5_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"product": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"product_id": "krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.6.1-17.el5_1.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"product": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"product_id": "krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.6.1-17.el5_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"product": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"product_id": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.6.1-17.el5_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.6.1-17.el5_1.1.s390x",
"product": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.s390x",
"product_id": "krb5-server-0:1.6.1-17.el5_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.6.1-17.el5_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"product": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"product_id": "krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.6.1-17.el5_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"product": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"product_id": "krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.6.1-17.el5_1.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.6.1-17.el5_1.1.s390",
"product": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.s390",
"product_id": "krb5-libs-0:1.6.1-17.el5_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.6.1-17.el5_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"product": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"product_id": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.6.1-17.el5_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.6.1-17.el5_1.1.s390",
"product": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.s390",
"product_id": "krb5-devel-0:1.6.1-17.el5_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.6.1-17.el5_1.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.6.1-17.el5_1.1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-0:1.6.1-17.el5_1.1.src"
},
"product_reference": "krb5-0:1.6.1-17.el5_1.1.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc64"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc64"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.6.1-17.el5_1.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-0:1.6.1-17.el5_1.1.src"
},
"product_reference": "krb5-0:1.6.1-17.el5_1.1.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-devel-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-devel-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc64"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-devel-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-libs-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-libs-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc64"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-libs-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-server-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-server-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-server-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-server-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-server-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-workstation-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-workstation-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.6.1-17.el5_1.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-0:1.6.1-17.el5_1.1.src"
},
"product_reference": "krb5-0:1.6.1-17.el5_1.1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-devel-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-devel-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc64"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-devel-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-libs-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-libs-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc64"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-libs-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-server-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-server-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-server-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-server-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-server-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-workstation-0:1.6.1-17.el5_1.1.i386"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ia64"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ppc"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-workstation-0:1.6.1-17.el5_1.1.s390x"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.6.1-17.el5_1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5901",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2007-11-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "415321"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the gss_indicate_mechs function in lib/gssapi/mechglue/g_initialize.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors. NOTE: this might be the result of a typo in the source code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: use-after-free in gssapi lib",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5901\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:krb5-0:1.6.1-17.el5_1.1.src",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-0:1.6.1-17.el5_1.1.src",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-0:1.6.1-17.el5_1.1.src",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5901"
},
{
"category": "external",
"summary": "RHBZ#415321",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=415321"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5901",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5901"
}
],
"release_date": "2007-11-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-18T19:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:krb5-0:1.6.1-17.el5_1.1.src",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-0:1.6.1-17.el5_1.1.src",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-0:1.6.1-17.el5_1.1.src",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0164"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "krb5: use-after-free in gssapi lib"
},
{
"cve": "CVE-2007-5971",
"discovery_date": "2007-11-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "415351"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/krb5/k5sealv3.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: double free in gssapi lib",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. See https://marc.info/?m=119743235325151",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:krb5-0:1.6.1-17.el5_1.1.src",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-0:1.6.1-17.el5_1.1.src",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-0:1.6.1-17.el5_1.1.src",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5971"
},
{
"category": "external",
"summary": "RHBZ#415351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=415351"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5971",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5971"
}
],
"release_date": "2007-11-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-18T19:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:krb5-0:1.6.1-17.el5_1.1.src",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-0:1.6.1-17.el5_1.1.src",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-0:1.6.1-17.el5_1.1.src",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0164"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "krb5: double free in gssapi lib"
},
{
"acknowledgments": [
{
"names": [
"MIT"
]
}
],
"cve": "CVE-2008-0062",
"discovery_date": "2008-02-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "432620"
}
],
"notes": [
{
"category": "description",
"text": "KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: uninitialized pointer use in krb5kdc",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:krb5-0:1.6.1-17.el5_1.1.src",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-0:1.6.1-17.el5_1.1.src",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-0:1.6.1-17.el5_1.1.src",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0062"
},
{
"category": "external",
"summary": "RHBZ#432620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432620"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0062"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0062",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0062"
}
],
"release_date": "2008-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-18T19:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:krb5-0:1.6.1-17.el5_1.1.src",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-0:1.6.1-17.el5_1.1.src",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-0:1.6.1-17.el5_1.1.src",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0164"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "krb5: uninitialized pointer use in krb5kdc"
},
{
"acknowledgments": [
{
"names": [
"MIT"
]
}
],
"cve": "CVE-2008-0063",
"discovery_date": "2008-02-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "432621"
}
],
"notes": [
{
"category": "description",
"text": "The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka \"Uninitialized stack values.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: possible leak of sensitive data from krb5kdc using krb4 request",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:krb5-0:1.6.1-17.el5_1.1.src",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-0:1.6.1-17.el5_1.1.src",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-0:1.6.1-17.el5_1.1.src",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0063"
},
{
"category": "external",
"summary": "RHBZ#432621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432621"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0063"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0063",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0063"
}
],
"release_date": "2008-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-18T19:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:krb5-0:1.6.1-17.el5_1.1.src",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-0:1.6.1-17.el5_1.1.src",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-0:1.6.1-17.el5_1.1.src",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0164"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: possible leak of sensitive data from krb5kdc using krb4 request"
},
{
"acknowledgments": [
{
"names": [
"MIT"
]
},
{
"names": [
"Jeff Altman"
],
"organization": "Secure Endpoints"
}
],
"cve": "CVE-2008-0947",
"discovery_date": "2008-02-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "433596"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the RPC library used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.4 through 1.6.3 allows remote attackers to execute arbitrary code by triggering a large number of open file descriptors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: file descriptor array overflow in RPC library",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:krb5-0:1.6.1-17.el5_1.1.src",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-0:1.6.1-17.el5_1.1.src",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-0:1.6.1-17.el5_1.1.src",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0947"
},
{
"category": "external",
"summary": "RHBZ#433596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=433596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0947"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0947",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0947"
}
],
"release_date": "2008-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-03-18T19:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:krb5-0:1.6.1-17.el5_1.1.src",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client-Workstation:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-0:1.6.1-17.el5_1.1.src",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Client:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-0:1.6.1-17.el5_1.1.src",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-debuginfo-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-devel-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.ppc64",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-libs-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-server-0:1.6.1-17.el5_1.1.x86_64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.i386",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ia64",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.ppc",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.s390x",
"5Server:krb5-workstation-0:1.6.1-17.el5_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0164"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: file descriptor array overflow in RPC library"
}
]
}
VAR-200803-0028
Vulnerability from variot - Updated: 2025-12-22 20:51The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values.". Vulnerabilities in the MIT Kerberos libgssrpc library may allow an attacker to cause a denial of service or potentially execute arbitrary code. MIT Kerberos 5 KDC is prone to multiple information-disclosure vulnerabilities resulting from memory corruption. These issues occur when KDC is configured to support Kerberos 4 and processes malformed krb4 messages. An attacker can exploit these issues to obtain potentially sensitive information that will aid in further attacks. Failed exploit attempts will likely result in denial-of-service conditions. MIT Kerberos 5 version 1.6.3 KDC is vulnerable; other versions may also be affected. It adopts a client/server structure, and both the client and the server can authenticate each other (that is, double verification), which can prevent eavesdropping and replay attack, etc. ), which can prevent eavesdropping, prevent replay attacks, etc. If a Kerberos 4 message is truncated, the missing part of the message is replaced with what was previously on the stack, and some parts of the principal name are read from the string in the message. These strings are limited to 40 bytes or the next ASCII NUL found in the buffer. If the KDC returns an error message indicating that the master name was not found in the database, it will include the master name in the error message, which may contain previous stack contents. It is theoretically possible for the exposed information to include secret key data on some platforms.
For the stable distribution (etch), these problems have been fixed in version 1.4.4-7etch5.
For the old stable distribution (sarge), these problems have been fixed in version krb5 1.3.6-2sarge6.
We recommend that you upgrade your krb5 packages.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian 3.1 (oldstable)
Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6.orig.tar.gz Size/MD5 checksum: 6526510 7974d0fc413802712998d5fc5eec2919 http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6-2sarge6.diff.gz Size/MD5 checksum: 673705 93382126a3c73ac44ed7daa7d85f166d http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6-2sarge6.dsc Size/MD5 checksum: 782 0391aaf485ef1636ef18c6ba183c3fbe
Architecture independent packages:
http://security.debian.org/pool/updates/main/k/krb5/krb5-doc_1.3.6-2sarge6_all.deb Size/MD5 checksum: 718916 ca2fb37b53a19207f1e1f1de90c4c1f3
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_amd64.deb Size/MD5 checksum: 137834 d43e9d3f3ef65fe8c8cbbb7b5dcbd144 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_amd64.deb Size/MD5 checksum: 177730 947fb82dd795f9272935ea4cb027e543 http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_amd64.deb Size/MD5 checksum: 124864 4f1d0aa9d18013023f4a9f2b9a10db65 http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_amd64.deb Size/MD5 checksum: 104886 15037693de0d9dc27460d713b547872a http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_amd64.deb Size/MD5 checksum: 63606 c4cfe2b01bfe0b579b216210817c4fa3 http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_amd64.deb Size/MD5 checksum: 369420 c8d1eaf98400880ff82f727fe20f90cd http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_amd64.deb Size/MD5 checksum: 82806 30230dfe2605b88fdeac8811d408acdb http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_amd64.deb Size/MD5 checksum: 57048 741292984684fddae11e130dcd388161 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_amd64.deb Size/MD5 checksum: 652378 d8f3493f4354e0b3717ffc72d6592b88 http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_amd64.deb Size/MD5 checksum: 216990 0df13c59411cf57b86bd94e250cf458e
arm architecture (ARM)
http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_arm.deb Size/MD5 checksum: 115684 ef39b71c5ecf4187e24d27c1111c9a54 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_arm.deb Size/MD5 checksum: 633330 08566aa29ab8d56e26070137a16731a4 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_arm.deb Size/MD5 checksum: 158874 4f60129aa092ea3d750deb168299abe7 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_arm.deb Size/MD5 checksum: 54134 e23173f4ad3a59af03fbab0369a714a9 http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_arm.deb Size/MD5 checksum: 58252 255394fcc06d13b6dabc2e87c91dac02 http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_arm.deb Size/MD5 checksum: 198848 aaba0529c817ff11728515f5a116f71b http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_arm.deb Size/MD5 checksum: 126814 85d31333aa01c4ab1f7b14ffaaa4c08b http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_arm.deb Size/MD5 checksum: 74940 706b7cbfb01d66cbdb371a9019b3f725 http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_arm.deb Size/MD5 checksum: 329190 a661364db9bd2d5c5340a0c6a5c939f4 http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_arm.deb Size/MD5 checksum: 93938 04dc96993c79d0113a0626a4439c8cbf
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_hppa.deb Size/MD5 checksum: 125154 afd4a9608fff5b1b3e793881bb2c9c2c http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_hppa.deb Size/MD5 checksum: 64286 b85cf8b5680c12c093ff34150623a3a0 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_hppa.deb Size/MD5 checksum: 59368 3df43bbb40e060d0522495ff3e78412d http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_hppa.deb Size/MD5 checksum: 669644 50027bd1d314e911c4a91647989fad1e http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_hppa.deb Size/MD5 checksum: 104948 a013d1818ed8d6dd7d75a8ac11e795f9 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_hppa.deb Size/MD5 checksum: 187304 401a8e21722c104f3d3aae86cf3640e9 http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_hppa.deb Size/MD5 checksum: 383876 d50afad26c9a0416fe47dfdf5ff649f4 http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_hppa.deb Size/MD5 checksum: 81992 b6c84f121f66616f578b13a3f0c654ca http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_hppa.deb Size/MD5 checksum: 139202 4972377b638f980ad757128f14132874 http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_hppa.deb Size/MD5 checksum: 224154 8a8436e210dd8892487ea482a1de6522
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_i386.deb Size/MD5 checksum: 116324 445bced4eb764a78e51b68e4d7558363 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_i386.deb Size/MD5 checksum: 574784 40fa136876b3219e55de089340c0c85e http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_i386.deb Size/MD5 checksum: 52890 a6ae74be5b338ab7f215d0846353833e http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_i386.deb Size/MD5 checksum: 165726 4b2485d3b8a50cd61ffcd2e0748d70fe http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_i386.deb Size/MD5 checksum: 349416 2f33d4592484a2adf276fd29cfe9d728 http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_i386.deb Size/MD5 checksum: 127878 7232e14b8bc1d78fa4346b4ed393a3b9 http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_i386.deb Size/MD5 checksum: 95656 00f7666dac13adf2a7bfc81c9d801f2f http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_i386.deb Size/MD5 checksum: 191526 d8613e5a3d87838ee7155f54c1c12f3d http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_i386.deb Size/MD5 checksum: 57762 2baa509aad5f6b837753e5a3e65e63f1 http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_i386.deb Size/MD5 checksum: 75890 5e52830c36794bb8ed2cdd14611ec690
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_ia64.deb Size/MD5 checksum: 134332 473be671406f747295c4a94d3f2ca3c5 http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_ia64.deb Size/MD5 checksum: 289396 c95c79f18a2a8cb78131a35073c09ebe http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_ia64.deb Size/MD5 checksum: 890018 a9ca82650f5f96ac66d2b4436b0d1345 http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_ia64.deb Size/MD5 checksum: 167350 f448dced91316668c1d33d6a0776eb2c http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_ia64.deb Size/MD5 checksum: 240384 5dc95c9ea35a7b052041e177114c5acf http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_ia64.deb Size/MD5 checksum: 79982 8980a39a06eeca5ef5adb623786742a2 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_ia64.deb Size/MD5 checksum: 73692 039a88dc8793fa4de6e461408cde62bd http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_ia64.deb Size/MD5 checksum: 105008 273a9dbaf7a4882f39ebd9de527f76fb http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_ia64.deb Size/MD5 checksum: 502382 97f1d32991c1778752bad887f4029990 http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_ia64.deb Size/MD5 checksum: 165288 7d2e3c354cc50db22fc34a396902690f
m68k architecture (Motorola Mc680x0)
http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_m68k.deb Size/MD5 checksum: 71116 2f35c57d9f24856b013e27b0eef24a25 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_m68k.deb Size/MD5 checksum: 516020 203205bb2e6f66161c2aa98746687190 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_m68k.deb Size/MD5 checksum: 49768 39d4529ec4e27e2fdc75de762c5643fa http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_m68k.deb Size/MD5 checksum: 107660 0659ab018fbf062504348fc63ef97cc6 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_m68k.deb Size/MD5 checksum: 147864 b86ebef3ec1541aeabc20be31e503049 http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_m68k.deb Size/MD5 checksum: 305872 1fc4f6385b5196c1c892731eac06f5b3 http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_m68k.deb Size/MD5 checksum: 122106 c60b71edc9196adda91d40c4b84a908e http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_m68k.deb Size/MD5 checksum: 174180 6d750c072a8d641bd661ea5c688199f3 http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_m68k.deb Size/MD5 checksum: 53478 74055ea66e27e24d79c824691da8fe0f http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_m68k.deb Size/MD5 checksum: 88692 074a5c747c652e7ce8d911077ca5586c
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_mips.deb Size/MD5 checksum: 145108 f432457761497dcfd8e1ba6fe7ac43fa http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_mips.deb Size/MD5 checksum: 164386 512e3b183ffc5f121f82981f32235377 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_mips.deb Size/MD5 checksum: 57750 d827cf9980ed4eba196dedf93e7d9b5d http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_mips.deb Size/MD5 checksum: 680860 b4718176172f14d54d2a4662ae28e534 http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_mips.deb Size/MD5 checksum: 128738 a9592a522e7cc0f6db4c121ac04db438 http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_mips.deb Size/MD5 checksum: 65060 9b5613121aff8f341cb2dc3786b28d78 http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_mips.deb Size/MD5 checksum: 103404 eb3ca8cddb900bd4dfdb10b67ca9622c http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_mips.deb Size/MD5 checksum: 225708 d09d386a5705b48584ffd51b0127883d http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_mips.deb Size/MD5 checksum: 355178 359ca6a220b6a9e7af7b949e7a64fb5d http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_mips.deb Size/MD5 checksum: 80956 407fec89580608afebb4ff89d95bdf72
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_mipsel.deb Size/MD5 checksum: 146678 76f8820a81a1c068ab60348f1302d087 http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_mipsel.deb Size/MD5 checksum: 103808 db8b0c06f58646093ca80554061cc0d1 http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_mipsel.deb Size/MD5 checksum: 65266 c27b18832cafb60109ba97e529706a53 http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_mipsel.deb Size/MD5 checksum: 226540 0ddfa3be4f63eeb0066682928c193996 http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_mipsel.deb Size/MD5 checksum: 82060 2479f67cadc3533fb499507fc1977b5d http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_mipsel.deb Size/MD5 checksum: 355120 d1644230bb4cc0788a04f5f0c8eb961c http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_mipsel.deb Size/MD5 checksum: 58164 5dcd7db602701983272b2fbb0db88864 http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_mipsel.deb Size/MD5 checksum: 130098 472042e34a7ac48352205df510767ddd http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_mipsel.deb Size/MD5 checksum: 165632 3074194d27a16bd4e737a9462d6a217a http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_mipsel.deb Size/MD5 checksum: 682776 b0046283d8860fc6c8fe968b335ff463
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_powerpc.deb Size/MD5 checksum: 61758 9496fefe85772ad549b84ae523c56e77 http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_powerpc.deb Size/MD5 checksum: 217812 c5aa73b8513a3698002cc3cedfeff012 http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_powerpc.deb Size/MD5 checksum: 105320 3677c003bd4c271bbe3daef5cf8f52df http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_powerpc.deb Size/MD5 checksum: 143838 61244dbf640bd19ee1cc738ee7b44b34 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_powerpc.deb Size/MD5 checksum: 57018 9afa2ba534be545b9d76d1f69c8e5468 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_powerpc.deb Size/MD5 checksum: 165746 74c29add119101782727226dc9200db0 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_powerpc.deb Size/MD5 checksum: 634906 93dd67378ead6cb763cc304516cbf632 http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_powerpc.deb Size/MD5 checksum: 353104 c5b16a1f26d01435b2bcb540b5b97730 http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_powerpc.deb Size/MD5 checksum: 82702 f728717a6a25b233526ad69934e376f4 http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_powerpc.deb Size/MD5 checksum: 126246 da0e3adca803929ae44fad884949cbe2
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_s390.deb Size/MD5 checksum: 214176 9c4b2684ce790d6544d078efde32f5d3 http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_s390.deb Size/MD5 checksum: 132996 1ed627f09d5b25bb3eaaaa4148207d7f http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_s390.deb Size/MD5 checksum: 63428 332d6f0c94eabdca1df666a3ec0c6184 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_s390.deb Size/MD5 checksum: 57214 f518a8dd4336c3916bb8c533bd8b6301 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_s390.deb Size/MD5 checksum: 624898 27ed5f1406b97c3a429ed6cc41a5421a http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_s390.deb Size/MD5 checksum: 99652 0e49258823390960faaf06522ab8f1cc http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_s390.deb Size/MD5 checksum: 376188 ec0fdc218fbe9c53fa5aaec87667b5a7 http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_s390.deb Size/MD5 checksum: 82370 3a26a1e22c24add8b16498a641444a77 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_s390.deb Size/MD5 checksum: 180336 34967e4eb80a75b18a23a9f3bf05bb5f http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_s390.deb Size/MD5 checksum: 121318 883136f99bce1a8f9f413dc3d68f5762
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_sparc.deb Size/MD5 checksum: 576786 3c142ce93bd9b408ea9a6d6046e3d067 http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_sparc.deb Size/MD5 checksum: 58950 91be8dfc1160f334f0ed514eaeddb3c4 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_sparc.deb Size/MD5 checksum: 53520 89ceeef920ad596b129365a1f6876818 http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_sparc.deb Size/MD5 checksum: 73596 cca4a24557097c3be9dc611d686d0688 http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_sparc.deb Size/MD5 checksum: 93348 0a954f5b7f637eeaea3b656699314b99 http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_sparc.deb Size/MD5 checksum: 114068 e7a1986874465f458987516f27a705d1 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_sparc.deb Size/MD5 checksum: 157712 2c8a0b75fc4982ee9265d2dd8cab2cc4 http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_sparc.deb Size/MD5 checksum: 126780 d6faa238b06d1ff65c6b20b54c7b4fac http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_sparc.deb Size/MD5 checksum: 194584 39322280b333988d5cce973c7c00cdad http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_sparc.deb Size/MD5 checksum: 330436 27d8b24e5a2bbb57d8078c7b1d391d53
Debian 4.0 (stable)
Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/k/krb5/krb5_1.4.4-7etch5.dsc Size/MD5 checksum: 876 e8f30ac6b710091985a2b669632ca174 http://security.debian.org/pool/updates/main/k/krb5/krb5_1.4.4.orig.tar.gz Size/MD5 checksum: 11017910 a675e5953bb8a29b5c6eb6f4ab0bb32a http://security.debian.org/pool/updates/main/k/krb5/krb5_1.4.4-7etch5.diff.gz Size/MD5 checksum: 1590551 c7d7bfb6aa34876ec8b5d0767ed65c2d
Architecture independent packages:
http://security.debian.org/pool/updates/main/k/krb5/krb5-doc_1.4.4-7etch5_all.deb Size/MD5 checksum: 1806352 0e3b03d93b1a62a41f9d004d3f6a69eb
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_alpha.deb Size/MD5 checksum: 76136 61c8f8b99cd2c5e08fe20121d5a33119 http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_alpha.deb Size/MD5 checksum: 461032 12fe64d352941f674f01b875532ec91f http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_alpha.deb Size/MD5 checksum: 91648 ee8cf04beb8687f4afc0684fbed232e9 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_alpha.deb Size/MD5 checksum: 1087614 dc627be2679028513f541ab0db184758 http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_alpha.deb Size/MD5 checksum: 245650 57d128cab47e74d75ad56da8b81866fe http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_alpha.deb Size/MD5 checksum: 154868 4cac528d66a64df26a385bb15552061c http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_alpha.deb Size/MD5 checksum: 136110 a0d904994baba8064c640014e238020c http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_alpha.deb Size/MD5 checksum: 216328 7e96a8117e5397282f9027dc99fee308 http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_alpha.deb Size/MD5 checksum: 89690 a14489d539fc5274175e92b8c1f99cc4 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_alpha.deb Size/MD5 checksum: 65866 c153e17e3514e566d1b719bd4941c3f2 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_alpha.deb Size/MD5 checksum: 1017046 543b2403aee468ad0a1692708de9a587
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_amd64.deb Size/MD5 checksum: 83852 4e7e51683f130dfdbaaaa2b6bbdfd70b http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_amd64.deb Size/MD5 checksum: 61474 5ed45d3180ad5cda0839f53d8d9fc716 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_amd64.deb Size/MD5 checksum: 768634 4f227f866f481d0a11a90b1a41d14bbb http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_amd64.deb Size/MD5 checksum: 141926 5944b339ff70c630a2d04026dc8a436c http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_amd64.deb Size/MD5 checksum: 68170 d5b5cc9a99c26889dcf685f88cc92a9a http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_amd64.deb Size/MD5 checksum: 129822 8f01b6b85827382fcb2ac54b561a1ec0 http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_amd64.deb Size/MD5 checksum: 222262 b16ea5bddeb302c73844a465d5b27020 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_amd64.deb Size/MD5 checksum: 1072208 5458abcef1aa9174a703a51d9910bf42 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_amd64.deb Size/MD5 checksum: 190378 b663d232374d5d8ea6a1aeb6596e1e66 http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_amd64.deb Size/MD5 checksum: 426424 39665f5600ac062e43d78823f79016a6 http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_amd64.deb Size/MD5 checksum: 86108 786e35f5915b137445eb034ef1f53eee
arm architecture (ARM)
http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_arm.deb Size/MD5 checksum: 1013602 3087dae461053141fd9099ba1bf1f520 http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_arm.deb Size/MD5 checksum: 63418 6d76005bc5336972fff07aa9961bcbca http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_arm.deb Size/MD5 checksum: 682712 20f548e7e7fe59ffc450c46c58b73fd1 http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_arm.deb Size/MD5 checksum: 136110 b1774fea7cea371790dc1d7b9a293395 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_arm.deb Size/MD5 checksum: 173154 785af0fd07d78658edb4a4c25082ca22 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_arm.deb Size/MD5 checksum: 59834 e369f2b68c8090e91191718d207da76d http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_arm.deb Size/MD5 checksum: 206238 c69f58637e68a2d455750e32b5b770c0 http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_arm.deb Size/MD5 checksum: 390054 b972d264ad97b69120ee4e4d898f3055 http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_arm.deb Size/MD5 checksum: 81426 82979ab1f34edf407dc1a32f4be2a911 http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_arm.deb Size/MD5 checksum: 123540 f9534a82bfa054018029c9a3934fc121 http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_arm.deb Size/MD5 checksum: 78826 62163e751d27902012a16758fbbf67e0
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_hppa.deb Size/MD5 checksum: 1050680 8ea8f26032837464c794e615623ac59e http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_hppa.deb Size/MD5 checksum: 87564 ec92090e89dc2c03500c52cbd188e4c3 http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_hppa.deb Size/MD5 checksum: 441724 6cc26ce6c3e4fa233222786b15bc08ac http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_hppa.deb Size/MD5 checksum: 64206 fa4e68946117f10d2dbbcea75fabe5d0 http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_hppa.deb Size/MD5 checksum: 132802 23e6e453b5943c8df76fd87a18fe2182 http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_hppa.deb Size/MD5 checksum: 85370 9011819683422a091d363e0d0064e82e http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_hppa.deb Size/MD5 checksum: 815220 652f24a16193c3d8bf9f128000888850 http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_hppa.deb Size/MD5 checksum: 145028 88cb8fd42c037cca495bb200a8d5bacd http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_hppa.deb Size/MD5 checksum: 69692 0ce8e82456cc62420ba31f7ce0aa3a39 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_hppa.deb Size/MD5 checksum: 201216 b7aa6c970117a632b2e60d14829ba7b7 http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_hppa.deb Size/MD5 checksum: 232082 7a823371e31f4b3e937a4e9d7a83d09b
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_i386.deb Size/MD5 checksum: 80306 8c8461beb8bd866080134bf1a25ef557 http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_i386.deb Size/MD5 checksum: 62446 22a83f7567df841b9f34ffc133534a64 http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_i386.deb Size/MD5 checksum: 133360 5e72e490c20ac03f49b7fd6921047048 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_i386.deb Size/MD5 checksum: 680166 991c24aa3b8e2d82f07e49865d70119b http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_i386.deb Size/MD5 checksum: 408376 f375a2157e2b1de2eadecbb2f03c8637 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_i386.deb Size/MD5 checksum: 174112 f9efe4ee2c52dba6806f548d778e0f53 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_i386.deb Size/MD5 checksum: 58050 b99734e1b92043a8cc816c588b04fce5 http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_i386.deb Size/MD5 checksum: 196558 0b03b5d3920efa1c5efbf8cbe3901f15 http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_i386.deb Size/MD5 checksum: 124206 21cc6d63e1eeaeb9deb70e227d61d84b http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_i386.deb Size/MD5 checksum: 1037936 a1a2470171c5403563ed285be9caaa9a http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_i386.deb Size/MD5 checksum: 78598 80b9f57c39a90e17b67480271ec8cc2a
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_ia64.deb Size/MD5 checksum: 305920 940370e13598d9c00b123f97aa3f09ad http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_ia64.deb Size/MD5 checksum: 164602 6dd81cf1a5487ad63e2ab3cf1ce342f1 http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_ia64.deb Size/MD5 checksum: 112994 4ccb79847d301064e5e6496f2577b5e5 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_ia64.deb Size/MD5 checksum: 80324 88cc01f93ed8fe3b9c9861176050f004 http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_ia64.deb Size/MD5 checksum: 105592 8745ddb42d7cb7afb95ef4f946a26c60 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_ia64.deb Size/MD5 checksum: 1088562 0d2cdc97965b7827a78bca972aed38fd http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_ia64.deb Size/MD5 checksum: 91338 40c9d44d05f3262c1a5d6950c4255e16 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_ia64.deb Size/MD5 checksum: 269600 4acf36a3831bd4d2bb0af4d9130d0f27 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_ia64.deb Size/MD5 checksum: 1043576 6e487c186d462bc98b8ccdfbb5891324 http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_ia64.deb Size/MD5 checksum: 190500 4cc37a9cd6bb13da4ca73f87b60738d3 http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_ia64.deb Size/MD5 checksum: 592208 ac3bd63fc244d99757d33c8b8fa8f745
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_mips.deb Size/MD5 checksum: 71184 99f78076e71ddc74b7809de695945048 http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_mips.deb Size/MD5 checksum: 128534 d08156f659ccfaa953e612ab0f1be1e0 http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_mips.deb Size/MD5 checksum: 86416 a0ccc69288f43974099646a0b4df2702 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_mips.deb Size/MD5 checksum: 807408 caa736a161edf63d4b7b0200642293cc http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_mips.deb Size/MD5 checksum: 81794 820abd7cda885cfbcd651eeb819b6ea2 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_mips.deb Size/MD5 checksum: 176908 eb82211002e6f5fa451b8c6fc72cd8c5 http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_mips.deb Size/MD5 checksum: 230468 6498dab212c73d4c618a77b105d40302 http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_mips.deb Size/MD5 checksum: 389766 cb2be7e8aa8890f3011c7721474048cb http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_mips.deb Size/MD5 checksum: 145004 1d8436cb03bf8df56127ab37a1787096 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_mips.deb Size/MD5 checksum: 62920 610d234fcd0e209b0d2e6c0f3be39f6b http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_mips.deb Size/MD5 checksum: 1112710 5b98f43fa267c04b32bc96927ad868a2
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_mipsel.deb Size/MD5 checksum: 87478 dce62567d27548de56ad38615fd5a8fe http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_mipsel.deb Size/MD5 checksum: 71596 8cfffdf23386228753133a6d675a75dc http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_mipsel.deb Size/MD5 checksum: 131106 22011c6b9dfeaf6318baffbb40b4b005 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_mipsel.deb Size/MD5 checksum: 63834 9a2e78369d8fa1d0d8688eb48e443518 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_mipsel.deb Size/MD5 checksum: 810348 c36eb2099ac9fd31e57d5693ec8eb92b http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_mipsel.deb Size/MD5 checksum: 82652 3699856d5fe3d28c74e0e66469d05859 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_mipsel.deb Size/MD5 checksum: 1087382 a5cac22f1da48cbb4c80f7f736b70b2f http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_mipsel.deb Size/MD5 checksum: 179494 4a1d3e8cc558c330b9f4a6bded87913b http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_mipsel.deb Size/MD5 checksum: 145716 1f45bb37dd7e13ea4c6b21f52c43c657 http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_mipsel.deb Size/MD5 checksum: 232788 88bc4c67b09b541769a7a00abc5d2688 http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_mipsel.deb Size/MD5 checksum: 391848 05272bb8eb78e5e3fa374c9cb6597403
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_powerpc.deb Size/MD5 checksum: 222776 d87408739c95de5b207a88550278a0d0 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_powerpc.deb Size/MD5 checksum: 1083104 a5a89067cd381199a75e9751be977884 http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_powerpc.deb Size/MD5 checksum: 143844 488e4411a9d507c14961e8c1a867a18b http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_powerpc.deb Size/MD5 checksum: 84364 fd1d52f855615c98fc8d207dcea36d2f http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_powerpc.deb Size/MD5 checksum: 137308 16ac4ae9b3a4eec6e584d4b9902771ed http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_powerpc.deb Size/MD5 checksum: 399370 2c4951062f1fa124af1a36a8b0c1e761 http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_powerpc.deb Size/MD5 checksum: 86864 33e72918f1ae2f968537d4e3328237b8 http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_powerpc.deb Size/MD5 checksum: 67384 3547b618672d7e775018128fa421551d http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_powerpc.deb Size/MD5 checksum: 753506 cdc2c41be06d280160c3f7ee8b7f3417 http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_powerpc.deb Size/MD5 checksum: 61930 dad1ac368a357004137a4beaf0a4f8ba http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_powerpc.deb Size/MD5 checksum: 179574 499b4b287b5726f7a8afea620d5606c5
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_s390.deb Size/MD5 checksum: 63392 7e446e33886543cc1432026dbde49ea8 http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_s390.deb Size/MD5 checksum: 87886 02735411cb4acaa71b8aa72bf7d9683d http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_s390.deb Size/MD5 checksum: 438990 5aacff7c6ec54f708cb98fa0718bfcc0 http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_s390.deb Size/MD5 checksum: 129266 31c153db1328ee93b97e64bdb01a3cc3 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_s390.deb Size/MD5 checksum: 195506 d3175c75393ac80363919b170e1446e0 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_s390.deb Size/MD5 checksum: 1073530 ac4c767b43f20d304e9683ebfddf3a68 http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_s390.deb Size/MD5 checksum: 224438 5a59744997773137c0409af842e7fdf0 http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_s390.deb Size/MD5 checksum: 68782 57ed0962a4cf4f2f7c7d60edf52449ed http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_s390.deb Size/MD5 checksum: 140470 8fd23a0ec4c4b5c81c48d7b0228a5fa8 http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_s390.deb Size/MD5 checksum: 82118 7a84a0ceeb5110380a231be90d6f36ce http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_s390.deb Size/MD5 checksum: 733368 6a3ea5e404cebc11888aaad6fdc2cedd
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_sparc.deb Size/MD5 checksum: 131724 561314d157da780fc7de7c06524e8a3c http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_sparc.deb Size/MD5 checksum: 77124 6de298978f0404514a0b16d863efa276 http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_sparc.deb Size/MD5 checksum: 961534 754258b22c1eaf83c3167775c3138a58 http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_sparc.deb Size/MD5 checksum: 372674 20c48448253a262988a3ca876cfb2931 http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_sparc.deb Size/MD5 checksum: 123040 00e2f8c76353547804f9ff516de1f65d http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_sparc.deb Size/MD5 checksum: 680434 6bf7c8d82d481a8d6d9d784f5ed617ec http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_sparc.deb Size/MD5 checksum: 58242 f7e89e959e30e2bd36ac3ce1191a7711 http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_sparc.deb Size/MD5 checksum: 63800 21beab0b247e7bdeea2004876f388c59 http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_sparc.deb Size/MD5 checksum: 166710 b5127d835935bee8ce49a1154e5fa2eb http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_sparc.deb Size/MD5 checksum: 200282 49524ee10fb4d4e7be223a1f25dffba7 http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_sparc.deb Size/MD5 checksum: 78204 2462352e5493e856bd8a784ca49f95f0
These files will probably be moved into the stable distribution on its next update.
A flaw was discovered in how the Kerberos krb5kdc handled Kerberos v4 protocol packets.
This issue only affects krb5kdc when it has Kerberos v4 protocol compatibility enabled, which is a compiled-in default in all Kerberos versions that Mandriva Linux ships prior to Mandriva Linux 2008.0.
The updated packages have been patched to correct these issues.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5901 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947 http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt
Updated Packages:
Mandriva Linux 2007.1: 64c3f5c31177dcacc99b021ec6ed1271 2007.1/i586/ftp-client-krb5-1.5.2-6.6mdv2007.1.i586.rpm 11b4194bc9edba8c0951e44660ba9955 2007.1/i586/ftp-server-krb5-1.5.2-6.6mdv2007.1.i586.rpm 23794e6e0cb1d46a329c42a04f672c5f 2007.1/i586/krb5-server-1.5.2-6.6mdv2007.1.i586.rpm 0fbb29bd81c8452d937d30fbbda62242 2007.1/i586/krb5-workstation-1.5.2-6.6mdv2007.1.i586.rpm 8f4eea60bf4ea3bfc776f1c117ceb26d 2007.1/i586/libkrb53-1.5.2-6.6mdv2007.1.i586.rpm fd5b1da0a056d995011d2b1a692e4292 2007.1/i586/libkrb53-devel-1.5.2-6.6mdv2007.1.i586.rpm ca79ccbe3f286b9069f0ae028d9816f7 2007.1/i586/telnet-client-krb5-1.5.2-6.6mdv2007.1.i586.rpm 8a7c84f1fe1bbb5338723f28d12a9f21 2007.1/i586/telnet-server-krb5-1.5.2-6.6mdv2007.1.i586.rpm 22830790ad7715479b7d4fbecc6c1e7f 2007.1/SRPMS/krb5-1.5.2-6.6mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64: fc02060b7c1da08c33952e6c14fb5627 2007.1/x86_64/ftp-client-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm 513fca34bdd1f2a5643a8e6adeb62e0e 2007.1/x86_64/ftp-server-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm 4f42d639753a885212e6d62bfe84a121 2007.1/x86_64/krb5-server-1.5.2-6.6mdv2007.1.x86_64.rpm 6b2ca028321fb08199be20a4aedef4a0 2007.1/x86_64/krb5-workstation-1.5.2-6.6mdv2007.1.x86_64.rpm 4d453dc2a579e74e29dfc052197fedc1 2007.1/x86_64/lib64krb53-1.5.2-6.6mdv2007.1.x86_64.rpm b22d9f1b515df1a5270d2d4c373b7dd3 2007.1/x86_64/lib64krb53-devel-1.5.2-6.6mdv2007.1.x86_64.rpm 21b245649de9e38e43782bd1a18922a7 2007.1/x86_64/telnet-client-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm 1322374ab1c15b5c1392ee4ae5f915e7 2007.1/x86_64/telnet-server-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm 22830790ad7715479b7d4fbecc6c1e7f 2007.1/SRPMS/krb5-1.5.2-6.6mdv2007.1.src.rpm
Mandriva Linux 2008.0: 3ee5a309927b830bf8559a872161384b 2008.0/i586/ftp-client-krb5-1.6.2-7.1mdv2008.0.i586.rpm 1835baa43ab27aac2493dc7821bafa8a 2008.0/i586/ftp-server-krb5-1.6.2-7.1mdv2008.0.i586.rpm 5e8369c201ac4678a7bc46590107e45f 2008.0/i586/krb5-1.6.2-7.1mdv2008.0.i586.rpm 94277e76faf2b75553c2e6250e428a43 2008.0/i586/krb5-server-1.6.2-7.1mdv2008.0.i586.rpm 695d5b85347b906401433fa55177be1a 2008.0/i586/krb5-workstation-1.6.2-7.1mdv2008.0.i586.rpm 4696cbae0ce644c265b74ff4ce59a865 2008.0/i586/libkrb53-1.6.2-7.1mdv2008.0.i586.rpm cc8122a1c6a3449fc41d3022bbdffeb2 2008.0/i586/libkrb53-devel-1.6.2-7.1mdv2008.0.i586.rpm d5e75835b35e81a3f7d038e501dabd1c 2008.0/i586/telnet-client-krb5-1.6.2-7.1mdv2008.0.i586.rpm 072b5ba782fbd1659ed8bde15bd11b5a 2008.0/i586/telnet-server-krb5-1.6.2-7.1mdv2008.0.i586.rpm cfd133fde8cc72b038ea61dc94405701 2008.0/SRPMS/krb5-1.6.2-7.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64: 7a8c1c390b1d1a0b2a8fe28e8fb6a458 2008.0/x86_64/ftp-client-krb5-1.6.2-7.1mdv2008.0.x86_64.rpm 9b312bd49bd858d00d00ec299866a275 2008.0/x86_64/ftp-server-krb5-1.6.2-7.1mdv2008.0.x86_64.rpm 19f7d0590227c4cc636ee5528db8027a 2008.0/x86_64/krb5-1.6.2-7.1mdv2008.0.x86_64.rpm 6a84bc19cb8e32f7331ce4c1ed36dc9d 2008.0/x86_64/krb5-server-1.6.2-7.1mdv2008.0.x86_64.rpm dabaf97b9b36316dc2b69e9edc953793 2008.0/x86_64/krb5-workstation-1.6.2-7.1mdv2008.0.x86_64.rpm 2810bbed78b7480ff48b021a798cb5a1 2008.0/x86_64/lib64krb53-1.6.2-7.1mdv2008.0.x86_64.rpm 734b018e6b05204767d07a7d53ef2c3c 2008.0/x86_64/lib64krb53-devel-1.6.2-7.1mdv2008.0.x86_64.rpm 787fb5ea70eff84b91eea5d68c1e956d 2008.0/x86_64/telnet-client-krb5-1.6.2-7.1mdv2008.0.x86_64.rpm d6224c005bc7c818c117e3fc61643840 2008.0/x86_64/telnet-server-krb5-1.6.2-7.1mdv2008.0.x86_64.rpm cfd133fde8cc72b038ea61dc94405701 2008.0/SRPMS/krb5-1.6.2-7.1mdv2008.0.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
SUSE Security Announcement
Package: krb5
Announcement ID: SUSE-SA:2008:016
Date: Wed, 19 Mar 2008 10:00:00 +0000
Affected Products: SUSE LINUX 10.1
openSUSE 10.2
openSUSE 10.3
SUSE Linux Enterprise Desktop 10 SP1
SLE SDK 10 SP1
SUSE Linux Enterprise Server 10 SP1
Vulnerability Type: remote code execution
Severity (1-10): 7
SUSE Default Package: no
Cross-References: CVE-2008-0062
CVE-2008-0063
CVE-2008-0947
CVE-2008-0948
Content of This Advisory:
1) Security Vulnerability Resolved:
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
6) Authenticity Verification and Additional Information
1) Problem Description and Brief Discussion
The krb5 package is the implementation of the Kerberos protocol suite from MIT. This update fixes three vulnerabilities, two of them are only possible if krb4 support is enabled: - CVE-2008-0062: null/dangling pointer (krb4) - CVE-2008-0063: operations on uninitialized buffer content, possible information leak (krb4) - CVE-2008-0947/8: out-of-bound array access in kadmind's RPC lib
2) Solution or Work-Around
Please install the new packages.
3) Special Instructions and Notes
Please restart the kerberos services.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST Online Update (YOU) tool. YOU detects which updates are required and automatically performs the necessary steps to verify and install them. Alternatively, download the update packages for your distribution manually and verify their integrity by the methods listed in Section 6 of this announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing with the filename of the downloaded RPM package.
x86 Platform:
openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-1.6.2-22.4.i586.rpm 53f6c9b454e27c47ec4cb32679757c48 http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-apps-clients-1.6.2-22.4.i586.rpm 66ee0e785595b000842c5cd2c9162c55 http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-apps-servers-1.6.2-22.4.i586.rpm f3fba89b56860b8f46691c69bba8b3c7 http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-client-1.6.2-22.4.i586.rpm 193a8298aa8bb866e19e0c48f23e523e http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-devel-1.6.2-22.4.i586.rpm a9b01b5c846e02c588664cddcae4c5c6 http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-server-1.6.2-22.4.i586.rpm ff536136c01b5f900aebe6fdc1ec62e6
openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-1.5.1-23.14.i586.rpm 5764e87b834c6a5b8a467fa6aa8ec40e ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-apps-clients-1.5.1-23.14.i586.rpm 94db70009c4c6e099a9807584c701686 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-apps-servers-1.5.1-23.14.i586.rpm 5881c8be92dc3eb215a1e837b6468922 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-client-1.5.1-23.14.i586.rpm c45980b430614c2371dd1ad4f8d21a34 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-devel-1.5.1-23.14.i586.rpm 1c6a45d60e5eabffedc2c1e3e755ac73 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-server-1.5.1-23.14.i586.rpm 03793b23aced1c01d9e2817648d7c777
SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-1.4.3-19.30.6.i586.rpm 51d1c53aaf25a36dd1e2e74662cbabd9 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-apps-clients-1.4.3-19.30.6.i586.rpm 6b4d89a932988685993dba1e87aea95f ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-apps-servers-1.4.3-19.30.6.i586.rpm c7ff44ef5a8453d5223da71d670fdea4 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-client-1.4.3-19.30.6.i586.rpm bc0456ed7708ee3ffdc2501e849e9dbe ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-devel-1.4.3-19.30.6.i586.rpm 9942cbbfd032ea80d8a20daa34ce5374 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-server-1.4.3-19.30.6.i586.rpm d4596d47caafa6ea4ee4b4f4e218f831
Power PC Platform:
openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-1.6.2-22.4.ppc.rpm f0d1399edebb3e1d715d84568065130a http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-apps-clients-1.6.2-22.4.ppc.rpm 8e444214994c1e7297b5332d96967ec0 http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-apps-servers-1.6.2-22.4.ppc.rpm 2eecfe960c969bf3a3dcce2fcab010f0 http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-client-1.6.2-22.4.ppc.rpm 8052a7d7a942545a46fa5e962c562ab8 http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-devel-1.6.2-22.4.ppc.rpm 6a118f48123ebfc23715bf797bf8b7d0 http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-server-1.6.2-22.4.ppc.rpm fd8f73d6d8757d9ce3dea43997b56b0c
openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-1.5.1-23.14.ppc.rpm 04289bb24041d226f27eb92025b25463 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-apps-clients-1.5.1-23.14.ppc.rpm 731ea1ef473c0d1c8990a8045a9fe587 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-apps-servers-1.5.1-23.14.ppc.rpm f911f86a0d2e8c9da16930525bd8b163 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-client-1.5.1-23.14.ppc.rpm a4c560015bbaddcbc88603e1e194146e ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-devel-1.5.1-23.14.ppc.rpm 64d0f163ebff972f2e70c6cc4d760555 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-server-1.5.1-23.14.ppc.rpm 8b06dc5e5ac5b3fa410559017403378a
SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-1.4.3-19.30.6.ppc.rpm ae1652f3ea622c5c91b0fd1d47b066ef ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-apps-clients-1.4.3-19.30.6.ppc.rpm a389841f387e37732c80d9d5095f9ae6 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-apps-servers-1.4.3-19.30.6.ppc.rpm cb6b4e402570e45767c5ae7a5c26e34c ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-client-1.4.3-19.30.6.ppc.rpm 3a2c13bc932e84f7a451f3a2c77c99f0 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-devel-1.4.3-19.30.6.ppc.rpm b34f9511e269e0dfc2896ac88cf41cce ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-server-1.4.3-19.30.6.ppc.rpm 0263cbb8f0f41e50dacfed082eca0835
x86-64 Platform:
openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-1.6.2-22.4.x86_64.rpm 6df39c9ddfb04cd4889b5f4bb271213a http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-32bit-1.6.2-22.4.x86_64.rpm 77ba221640964cc90ad8e0010ad5c07e http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-apps-clients-1.6.2-22.4.x86_64.rpm fccb50e18045baa2c78165f20eb13eec http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-apps-servers-1.6.2-22.4.x86_64.rpm 3bfd6270a31f2a6a35728bcd274ae327 http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-client-1.6.2-22.4.x86_64.rpm 53b3634e9e92255b62a932ed6d30742d http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-devel-1.6.2-22.4.x86_64.rpm 54071b2e12004117b0599f53c4a6027b http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-devel-32bit-1.6.2-22.4.x86_64.rpm 07069062d1e7b140c6774cc2aaa821d5 http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-server-1.6.2-22.4.x86_64.rpm b07d395220662db193b6f54753931ccc
openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-1.5.1-23.14.x86_64.rpm 3f2d8918cf5da2cab839bf2c72af1495 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-32bit-1.5.1-23.14.x86_64.rpm 4348a17ec69b6c64c69e11f74fa88a08 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-apps-clients-1.5.1-23.14.x86_64.rpm 433ffcced3ede0163628854ae3296baf ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-apps-servers-1.5.1-23.14.x86_64.rpm c24ab880f1314c1d25f3e9561b204c10 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-client-1.5.1-23.14.x86_64.rpm 6022c2534c50718a2a4fd18fde346daf ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-devel-1.5.1-23.14.x86_64.rpm d82a0204e6e0f5e9d6bcd8f60aa4fbde ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-devel-32bit-1.5.1-23.14.x86_64.rpm 17dc2896ebc7f252e39fc8e23a41abc1 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-server-1.5.1-23.14.x86_64.rpm 45596c22ec6d0c1eebf42f683e4e0cd4
SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-1.4.3-19.30.6.x86_64.rpm 684c7d1363494a7854afd3755bdb2a20 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-32bit-1.4.3-19.30.6.x86_64.rpm b8552a99f0785f1eee434f6d7293731a ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-apps-clients-1.4.3-19.30.6.x86_64.rpm 060fac873ba1bc13e4b5b813ae6a6cd2 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-apps-servers-1.4.3-19.30.6.x86_64.rpm 28235a5328a8a982e2a1784793a17863 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-client-1.4.3-19.30.6.x86_64.rpm 056f5e479561d2b831e3dd969261f8de ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-devel-1.4.3-19.30.6.x86_64.rpm d81c85af0ca1812c273bbd1c6ddf3cb1 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-devel-32bit-1.4.3-19.30.6.x86_64.rpm d17b2d40649a83e28afd6a7a3dec96d6 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-server-1.4.3-19.30.6.x86_64.rpm dd8096c153fb51bdd67352cbe8a51953
Sources:
openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/krb5-1.6.2-22.4.src.rpm 6ead1c530f58e6255b1c9ba1b78eb3ae
openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/krb5-1.5.1-23.14.src.rpm add4417c6743a6dd26f35182e85ee956
SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/krb5-1.4.3-19.30.6.src.rpm 2185d5b60fe733640f16a3a561ec6888
Our maintenance customers are notified individually. The packages are offered for installation from the maintenance web:
SUSE Linux Enterprise Server 10 SP1 http://support.novell.com/techcenter/psdb/a1cba9b24d53ae5d2b80a81acd449edb.html
SLE SDK 10 SP1 http://support.novell.com/techcenter/psdb/a1cba9b24d53ae5d2b80a81acd449edb.html
SUSE Linux Enterprise Desktop 10 SP1 http://support.novell.com/techcenter/psdb/a1cba9b24d53ae5d2b80a81acd449edb.html
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
Please read our weekly security report.
6) Authenticity Verification and Additional Information
-
Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web sites. The authenticity and integrity of a SUSE security announcement is guaranteed by a cryptographic signature in each announcement. All SUSE security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file and run the command
gpg --verify
replacing with the name of the file where you saved the announcement. The output for a valid signature looks like:
gpg: Signature made using RSA key ID 3D25D3D9 gpg: Good signature from "SuSE Security Team security@suse.de"
where is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can import it from the first installation CD. To import the key, use the command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
-
Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the world. While this service is considered valuable and important to the free and open source software community, the authenticity and the integrity of a package needs to be verified to ensure that it has not been tampered with.
There are two verification methods that can be used independently from each other to prove the authenticity of a downloaded file or RPM package:
1) Using the internal gpg signatures of the rpm package 2) MD5 checksums as provided in this announcement
1) The internal rpm package signatures provide an easy way to verify the authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>to verify the signature of the package, replacing with the filename of the RPM package downloaded. The package is unmodified if it contains a valid signature from build@suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on RPMv4-based distributions) and the gpg key ring of 'root' during installation. You can also find it on the first installation CD and at the end of this announcement.
2) If you need an alternative means of verification, use the md5sum command to verify the authenticity of the packages. Execute the command
md5sum <filename.rpm>after you downloaded the file from a SUSE FTP server or its mirrors. Then compare the resulting md5sum with the one that is listed in the SUSE security announcement. Because the announcement containing the checksums is cryptographically signed (by security@suse.de), the checksums show proof of the authenticity of the package if the signature of the announcement is valid. Note that the md5 sums published in the SUSE Security Announcements are valid for the respective packages only. Newer versions of these packages cannot be verified.
-
SUSE runs two security mailing lists to which any interested party may subscribe:
opensuse-security@opensuse.org - General Linux and SUSE security discussion. All SUSE security announcements are sent to this list. To subscribe, send an e-mail to opensuse-security+subscribe@opensuse.org.
opensuse-security-announce@opensuse.org - SUSE's announce-only mailing list. Only SUSE's security announcements are sent to this list. To subscribe, send an e-mail to opensuse-security-announce+subscribe@opensuse.org.
===================================================================== SUSE's security contact is security@suse.com or security@suse.de. The security@suse.de public key is listed below. =====================================================================
The information in this advisory may be distributed or reproduced, provided that the advisory is not modified in any way. In particular, the clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever with respect to the information contained in this security advisory. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
VMware Security Advisory
Advisory ID: VMSA-2008-0009 Synopsis: Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues Issue date: 2008-06-04 Updated on: 2008-06-04 (initial release of advisory) CVE numbers: CVE-2007-5671 CVE-2008-0967 CVE-2008-2097 CVE-2008-2100 CVE-2006-1721 CVE-2008-0553 CVE-2007-5378 CVE-2007-4772 CVE-2008-0888 CVE-2008-0062 CVE-2008-0063 CVE-2008-0948
- Summary:
Several critical security vulnerabilities have been addressed in patches in ESX and in the newest releases of VMware's hosted product line.
- Relevant releases:
VMware Workstation 6.0.3 and earlier, VMware Workstation 5.5.6 and earlier, VMware Player 2.0.3 and earlier, VMware Player 1.0.6 and earlier, VMware ACE 2.0.3 and earlier, VMware ACE 1.0.5 and earlier, VMware Server 1.0.5 and earlier, VMware Fusion 1.1.1 and earlier
VMware ESXi 3.5 without patches ESXe350-200805501-I-SG, ESXe350-200805502-T-SG, ESXe350-200805503-C-SG
VMware ESX 3.5 without patches ESX350-200805515-SG, ESX350-200805508-SG, ESX350-200805501-BG, ESX350-200805504-SG, ESX350-200805506-SG, ESX350-200805505-SG, ESX350-200805507-SG
VMware ESX 3.0.2 without patches ESX-1004727, ESX-1004821, ESX-1004216, ESX-1004726, ESX-1004722, ESX-1004724, ESX-1004719, ESX-1004219
VMware ESX 3.0.1 without patches ESX-1004186, ESX-1004728, ESX-1004725, ESX-1004721, ESX-1004723, ESX-1004190, ESX-1004189
VMware ESX 2.5.5 without update patch 8 VMware ESX 2.5.4 without update patch 19
NOTES: Hosted products VMware Workstation 5.x, VMware Player 1.x, and VMware ACE 1.x will reach end of general support 2008-11-09. Customers should plan to upgrade to the latest version of their respective products.
ESX 3.0.1 is in Extended Support and its end of extended
support (Security and Bug fixes) is 2008-07-31. Users should plan
to upgrade to at least 3.0.2 update 1 and preferably the newest
release available before the end of extended support.
ESX 2.5.4 is in Extended Support and its end of extended support
(Security and Bug fixes) is 2008-10-08. Users should plan to upgrade
to at least 2.5.5 and preferably the newest release available before
the end of extended support.
- Problem description:
a. VMware Tools Local Privilege Escalation on Windows-based guest OS
The VMware Tools Package provides support required for shared folders
(HGFS) and other features.
An input validation error is present in the Windows-based VMware
HGFS.sys driver. Exploitation of this flaw might result in
arbitrary code execution on the guest system by an unprivileged
guest user. It doesn't matter on what host the Windows guest OS
is running, as this is a guest driver vulnerability and not a
vulnerability on the host.
The HGFS.sys driver is present in the guest operating system if the
VMware Tools package is loaded. Even if the host has HGFS disabled
and has no shared folders, Windows-based guests may be affected. This
is regardless if a host supports HGFS.
This issue could be mitigated by removing the VMware Tools package
from Windows based guests. However this is not recommended as it
would impact usability of the product.
NOTE: Installing the new hosted release or ESX patches will not
remediate the issue. The VMware Tools packages will need
to be updated on each Windows-based guest followed by a
reboot of the guest system.
VMware would like to thank iDefense and Stephen Fewer of Harmony
Security for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2007-5671 to this issue.
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
Workstation 6.x Windows not affected
Workstation 6.x Linux not affected
Workstation 5.x Windows 5.5.6 build 80404 or later
Workstation 5.x Linux 5.5.6 build 80404 or later
Player 2.x Windows not affected
Player 2.x Linux not affected
Player 1.x Windows 1.0.6 build 80404 or later
Player 1.x Linux 1.0.6 build 80404 or later
ACE 2.x Windows not affected
ACE 1.x Windows 1.0.5 build 79846 or later
Server 1.x Windows 1.0.5 build 80187 or later
Server 1.x Linux 1.0.5 build 80187 or later
Fusion 1.x Mac OS/X not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX not affected
ESX 3.0.2 ESX ESX-1004727
ESX 3.0.1 ESX ESX-1004186
ESX 2.5.5 ESX ESX 2.5.5 upgrade patch 5 or later
ESX 2.5.4 ESX ESX 2.5.4 upgrade patch 16 or later
b. Privilege escalation on ESX or Linux based hosted operating systems
This update fixes a security issue related to local exploitation of
an untrusted library path vulnerability in vmware-authd. In order to
exploit this vulnerability, an attacker must have local access and
the ability to execute the set-uid vmware-authd binary on an affected
system. Exploitation of this flaw might result in arbitrary code
execution on the Linux host system by an unprivileged user.
VMware would like to thank iDefense for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-0967 to this issue.
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
Workstation 6.x Windows not affected
Workstation 6.x Linux 6.0.4 build 93057
Workstation 5.x Windows not affected
Workstation 5.x Linux 5.5.7 build 91707
Player 2.x Windows not affected
Player 2.x Linux 2.0.4 build 93057
Player 1.x Windows not affected
Player 1.x Linux 1.0.7 build 91707
ACE 2.x Windows not affected
ACE 1.x Windows not affected
Server 1.x Windows not affected
Server 1.x Linux 1.0.6 build 91891
Fusion 1.x Mac OS/X not affected
ESXi 3.5 ESXi ESXe350-200805501-I-SG
ESX 3.5 ESX ESX350-200805515-SG
ESX 3.0.2 ESX ESX-1004821
ESX 3.0.1 ESX ESX-1004728
ESX 2.5.5 ESX ESX 2.5.5 update patch 8
ESX 2.5.4 ESX ESX 2.5.4 update patch 19
c. Openwsman Invalid Content-Length Vulnerability
Openwsman is a system management platform that implements the Web
Services Management protocol (WS-Management). It is installed and
running by default. It is used in the VMware Management Service
Console and in ESXi.
The openwsman management service on ESX 3.5 and ESXi 3.5 is vulnerable
to a privilege escalation vulnerability, which may allow users with
non-privileged ESX or Virtual Center accounts to gain root privileges.
To exploit this vulnerability, an attacker would need a local ESX
account or a VirtualCenter account with the Host.Cim.CimInteraction
permission.
Systems with no local ESX accounts and no VirtualCenter accounts with
the Host.Cim.CimInteraction permission are not vulnerable.
This vulnerability cannot be exploited by users without valid login
credentials.
Discovery: Alexander Sotirov, VMware Security Research
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-2097 to this issue.
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
hosted any any not affected
ESXi 3.5 ESXi ESXe350-200805501-I-SG
ESX 3.5 ESX ESX350-200805508-SG
ESX 3.0.2 ESX not affected
ESX 3.0.1 ESX not affected
ESX 2.5.5 ESX not affected
ESX 2.5.4 ESX not affected
NOTE: VMware hosted products are not affected by this issue.
d. VMware VIX Application Programming Interface (API) Memory Overflow Vulnerabilities
The VIX API (also known as "Vix") is an API that lets users write scripts
and programs to manipulate virtual machines.
Multiple buffer overflow vulnerabilities are present in the VIX API.
Exploitation of these vulnerabilities might result in code execution on
the host system or on the service console in ESX Server from the guest
operating system.
The VIX API can be enabled and disabled using the "vix.inGuest.enable"
setting in the VMware configuration file. This default value for this
setting is "disabled". This configuration setting is present in the
following products:
VMware Workstation 6.0.2 and higher
VMware ACE 6.0.2 and higher
VMware Server 1.06 and higher
VMware Fusion 1.1.2 and higher
ESX Server 3.0 and higher
ESX Server 3.5 and higher
In previous versions of VMware products where the VIX API was introduced,
the VIX API couldn't be disabled.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-2100 to this issue.
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
VIX API 1.1.x Windows VMware-vix-1.1.4-93057.exe
VIX API 1.1.x Linux VMware-vix-1.1.4-93057.i386.tar.gz
VIX API 1.1.x Linux64 VMware-vix-1.1.4-93057.x86_64.tar.gz
Workstation 6.x Windows 6.0.4 build 93057
Workstation 6.x Linux 6.0.4 build 93057
Workstation 5.x Windows 5.5.7 build 91707
Workstation 5.x Linux 5.5.7 build 91707
Player 2.x Windows 2.0.4 build 93057
Player 2.x Linux 2.0.4 build 93057
Player 1.x Windows 1.0.6 build 91707
Player 1.x Linux 1.0.6 build 91707
ACE 2.x Windows 2.0.4 build 93057
ACE 1.x Windows not affected
Server 1.x Windows 1.0.6 build 91891
Server 1.x Linux 1.0.6 build 91891
Fusion 1.x Mac OS/X 1.1.2 build 87978 or later
ESXi 3.5 ESXi ESXe350-200805501-I-SG,
ESXe350-200805502-T-SG
ESX 3.5 ESX ESX350-200805501-BG
ESX 3.0.2 ESX ESX-1004216, ESX-1004726, ESX-1004727
ESX 3.0.1 ESX ESX-1004186, ESX-1004725
ESX 2.5.5 ESX not affected
ESX 2.5.4 ESX not affected
II Service Console rpm updates
NOTE: ESXi and hosted products are not affected by any service console security updates
a. Security update for cyrus-sasl
Updated cyrus-sasl package for the ESX Service Console corrects a security
issue found in the DIGEST-MD5 authentication mechanism of Cyrus'
implementation of Simple Authentication and Security Layer (SASL).
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2006-1721 to this issue.
RPMs Updated:
cyrus-sasl-2.1.15-15.i386.rpm
cyrus-sasl-md5-2.1.15-1.i386.rpm
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
hosted any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX ESX350-200805504-SG
ESX 3.0.2 ESX ESX-1004722
ESX 3.0.1 ESX ESX-1004721
ESX 2.5.5 ESX not affected
ESX 2.5.4 ESX not affected
b. Security update for tcltk
An input validation flaw was discovered in Tk's GIF image handling. A
code-size value read from a GIF image was not properly validated before
being used, leading to a buffer overflow. A specially crafted GIF file
could use this to cause a crash or, potentially, execute code with the
privileges of the application using the Tk graphical toolkit.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2008-0553 to this issue.
A buffer overflow flaw was discovered in Tk's animated GIF image handling.
An animated GIF containing an initial image smaller than subsequent images
could cause a crash or, potentially, execute code with the privileges of
the application using the Tk library.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2007-5378 to this issue.
A flaw first discovered in the Tcl regular expression engine used in the
PostgreSQL database server, resulted in an infinite loop when processing
certain regular expressions.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2007-4772 to this issue.
RPM Updated:
tcl-8.3.5-92.8.i386.rpm
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
hosted any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX ESX350-200805506-SG
ESX 3.0.2 ESX ESX-1004724
ESX 3.0.1 ESX ESX-1004723
ESX 2.5.5 ESX ESX 2.5.5 Upgrade Patch 8
ESX 2.5.4 ESX ESX 2.5.4 Upgrade Patch 19
c. Security update for unzip
This patch includes a moderate security update to the service console that
fixes a flaw in unzip.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2008-0888 to this issue.
RPM Updated:
Unzip-5.50-36.EL3.i386.rpm
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
hosted any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX ESX350-200805505-SG
ESX 3.0.2 ESX ESX-1004719
ESX 3.0.1 ESX ESX-1004190
ESX 2.5.5 ESX ESX 2.5.5 Upgrade Patch 8
ESX 2.5.4 ESX ESX 2.5.4 Upgrade Patch 19
d.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-0062 to this issue.
NOTE: ESX doesn't contain the krb5kdc binary and is not vulnerable
to this issue.
NOTE: ESX doesn't contain the krb5kdc binary and is not vulnerable
to this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-0948 to this issue.
RPM Updated:
krb5-libs-1.2.7-68.i386.rpm
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
hosted any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX ESX350-200805507-SG
ESX 3.0.2 ESX ESX-1004219
ESX 3.0.1 ESX ESX-1004189
ESX 2.5.5 ESX ESX 2.5.5 Upgrade Patch 8
ESX 2.5.4 ESX ESX 2.5.4 Upgrade Patch 19
- Solution:
Please review the release notes for your product and version and verify the md5sum of your downloaded file.
VMware Workstation 6.0.4
http://www.vmware.com/download/ws/ Release notes: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Windows binary md5sum: f50a05831e94c19d98f363c752fca5f9
RPM Installation file for 32-bit Linux md5sum: e7793b14b995d3b505f093c84e849421
tar Installation file for 32-bit Linux md5sum: a0a8e1d8188f4be03357872a57a767ab
RPM Installation file for 64-bit Linux md5sum: 960d753038a268b8f101f4b853c0257e
tar Installation file for 64-bit Linux md5sum: 4697ec8a9d6c1152d785f3b77db9d539
VMware Workstation 5.5.7
http://www.vmware.com/download/ws/ws5.html Release notes: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Windows binary: md5sum: 4c6a6653b7296240197aac048591c659
Compressed Tar archive for 32-bit Linux md5sum: 8fc15d72031489cf5cd5d47b966787e6
Linux RPM version for 32-bit Linux md5sum: f0872fe447ac654a583af16b2f4bba3f
VMware Player 2.0.4 and 1.0.7
http://www.vmware.com/download/player/ Release notes Player 1.x: http://www.vmware.com/support/player/doc/releasenotes_player.html Release notes Player 2.0 http://www.vmware.com/support/player2/doc/releasenotes_player2.html
2.0.4 Windows binary md5sum: a117664a8bfa7336b846117e5fc048dd
VMware Player 2.0.4 for Linux (.rpm) md5sum: de6ab6364a0966b68eadda2003561cd2
VMware Player 2.0.4 for Linux (.tar) md5sum: 9e1c2bfda6b22a3fc195a86aec11903a
VMware Player 2.0.4 - 64-bit (.rpm) md5sum: 997e5ceffe72f9ce9146071144dacafa
VMware Player 2.0.4 - 64-bit (.tar) md5sum: 18eb4ee49dd7e33ec155ef69d7d259ef
1.0.7 Windows binary md5sum: 51114b3b433dc1b3bf3e434aebbf2b9c
Player 1.0.7 for Linux (.rpm) md5sum: 3b5f97a37df3b984297fa595a5cdba9c
Player 1.0.7 for Linux (.tar) md5sum: b755739144944071492a16fa20f86a51
VMware ACE
http://www.vmware.com/download/ace/ Release notes 2.0: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
VMware-workstation-6.0.4-93057.exe md5sum: f50a05831e94c19d98f363c752fca5f9
VMware-ACE-Management-Server-Appliance-2.0.4-93057.zip md5sum: d2ae2246f3d87268cf84c1421d94e86c
VMware-ACE-Management-Server-2.0.4-93057.exe md5sum: 41b31b3392d5da2cef77a7bb28654dbf
VMware-ACE-Management-Server-2.0.4-93057.i386-rhel4.rpm md5sum: 9920be4c33773df53a1728b41af4b109
VMware-ACE-Management-Server-2.0.4-93057.i386-sles9.rpm md5sum: 4ec4c37203db863e8844460b5e80920b
Release notes 1.x: http://www.vmware.com/support/ace/doc/releasenotes_ace.html
VMware-ACE-1.0.6-89199.exe md5sum: 110f6e24842a0d154d9ec55ef9225f4f
VMware Server 1.0.6
http://www.vmware.com/download/server/ Release notes: http://www.vmware.com/support/server/doc/releasenotes_server.html
VMware Server for Windows 32-bit and 64-bit md5sum: 3e00d5cfae123d875e4298bddabf12f5
VMware Server Windows client package md5sum: 64f3fc1b4520626ae465237d7ec4773e
VMware Server for Linux md5sum: 46ea876bfb018edb6602a921f6597245
VMware Server for Linux rpm md5sum: 9d2f0af908aba443ef80bec8f7ef3485
Management Interface md5sum: 1b3daabbbb49a036fe49f53f812ef64b
VMware Server Linux client package md5sum: 185e5b174659f366fcb38b1c4ad8d3c6
VMware Fusion 1.1.3
http://www.vmware.com/download/fusion/ Release notes: http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html md5sum: D15A3DFD3E7B11FC37AC684586086D
VMware VIX 1.1.4
http://www.vmware.com/support/developer/vix-api/ Release notes: http://www.vmware.com/support/pubs/vix-api/VIXAPI-1.1.4-Release-Notes.html VMware-vix-1.1.4-93057.exe md5sum: 2efb74618c7ead627ecb3b3033e3f9f6
VMware-vix-1.1.4-93057.i386.tar.gz md5sum: 988df2b2bbc975a6fc11f27ad1519832
VMware-vix-1.1.4-93057.x86_64.tar.gz md5sum: a64f951c6fb5b2795a29a5a7607059c0
ESXi
VMware ESXi 3.5 patch ESXe350-200805501-O-SG (authd, openwsman, VIX) http://download3.vmware.com/software/esx/ESXe350-200805501-O-SG.zip md5sum: 4ce06985d520e94243db1e0504a56d8c http://kb.vmware.com/kb/1005073 http://kb.vmware.com/kb/1004173 http://kb.vmware.com/kb/1004172
NOTE: ESXe350-200805501-O-SG contains the following patch bundles: ESXe350-200805501-I-SG, ESXe350-200805502-T-SG, ESXe350-200805503-C-SG
ESX
VMware ESX 3.5 patch ESX350-200805515-SG (authd) http://download3.vmware.com/software/esx/ESX350-200805515-SG.zip md5sum: 324b50ade230bcd5079a76e3636163c5 http://kb.vmware.com/kb/1004170
VMware ESX 3.5 patch ESX350-200805508-SG (openwsman) http://download3.vmware.com/software/esx/ESX350-200805508-SG.zip md5sum: 3ff8c06d4a9dd406f64f89c51bf26d12 http://kb.vmware.com/kb/1004644
VMware ESX 3.5 patch ESX350-200805501-BG (VIX) http://download3.vmware.com/software/esx/ESX350-200805501-BG.zip md5sum: 31a620aa249c593c30015b5b6f8c8650 http://kb.vmware.com/kb/1004637
VMware ESX 3.5 patch ESX350-200805504-SG (cyrus-sasl) http://download3.vmware.com/software/esx/ESX350-200805504-SG.zip md5sum: 4c1b1a8dcb09a636b55c64c290f7de51 http://kb.vmware.com/kb/1004640
VMware ESX 3.5 patch ESX350-200805506-SG (tcltk) http://download3.vmware.com/software/esx/ESX350-200805506-SG.zip md5sum: af279eef8fdeddb7808630da1ae717b1 http://kb.vmware.com/kb/1004642
VMware ESX 3.5 patch ESX350-200805505-SG (unzip) http://download3.vmware.com/software/esx/ESX350-200805505-SG.zip md5sum: 07af82d9fd97cccb89d9b90c6ecc41c6 http://kb.vmware.com/kb/1004641
VMware ESX 3.5 patch ESX350-200805507-SG (krb5) http://download3.vmware.com/software/esx/ESX350-200805507-SG.zip md5sum: 5d35a1c470daf13c9f4df5bdc9438748 http://kb.vmware.com/kb/1004643
VMware ESX 3.0.2 patch ESX-1004727 (HGFS,VIX) http://download3.vmware.com/software/vi/ESX-1004727.tgz md5sum: 31a67b0fa3449747887945f8d370f19e http://kb.vmware.com/kb/1004727
VMware ESX 3.0.2 patch ESX-1004821 (authd) http://download3.vmware.com/software/vi/ESX-1004821.tgz md5sum: 5c147bedd07245c903d44257522aeba1 http://kb.vmware.com/kb/1004821
VMware ESX 3.0.2 patch ESX-1004216 (VIX) http://download3.vmware.com/software/vi/ESX-1004216.tgz md5sum: 0784ef70420d28a9a5d6113769f6669a http://kb.vmware.com/kb/1004216
VMware ESX 3.0.2 patch ESX-1004726 (VIX) http://download3.vmware.com/software/vi/ESX-1004726.tgz md5sum: 44f03b274867b534cd274ccdf4630b86 http://kb.vmware.com/kb/1004726
VMware ESX 3.0.2 patch ESX-1004722 (cyrus-sasl) http://download3.vmware.com/software/vi/ESX-1004722.tgz md5sum: 99dc71aed5bab7711f573b6d322123d6 http://kb.vmware.com/kb/1004722
VMware ESX 3.0.2 patch ESX-1004724 (tcltk) http://download3.vmware.com/software/vi/ESX-1004724.tgz md5sum: fd9a160ca7baa5fc443f2adc8120ecf7 http://kb.vmware.com/kb/1004724
VMware ESX 3.0.2 patch ESX-1004719 (unzip) http://download3.vmware.com/software/vi/ESX-1004719.tgz md5sum: f0c37b9f6be3399536d60f6c6944de82 http://kb.vmware.com/kb/1004719
VMware ESX 3.0.2 patch ESX-1004219 (krb5) http://download3.vmware.com/software/vi/ESX-1004219.tgz md5sum: 7c68279762f407a7a5ee151a650ebfd4 http://kb.vmware.com/kb/1004219
VMware ESX 3.0.1 patch ESX-1004186 (HGFS,VIX) http://download3.vmware.com/software/vi/ESX-1004186.tgz md5sum: f64389a8b97718eccefadce1a14d1198 http://kb.vmware.com/kb/1004186
VMware ESX 3.0.1 patch ESX-1004728 (authd) http://download3.vmware.com/software/vi/ESX-1004728.tgz md5sum: 1f01bb819805b855ffa2ec1040eff5ca http://kb.vmware.com/kb/1004728
VMware ESX 3.0.1 patch ESX-1004725 (VIX) http://download3.vmware.com/software/vi/ESX-1004725.tgz md5sum: 9fafb04c6d3f6959e623832f539d2dc8 http://kb.vmware.com/kb/1004725
VMware ESX 3.0.1 patch ESX-1004721 (cyrus-sasl) http://download3.vmware.com/software/vi/ESX-1004721.tgz md5sum: 48190819b0f5afddefcb8d209d12b585 http://kb.vmware.com/kb/1004721
VMware ESX 3.0.1 patch ESX-1004723 (tcltk) http://download3.vmware.com/software/vi/ESX-1004723.tgz md5sum: c34ca0a5886e0c0917a93a97c331fd7d http://kb.vmware.com/kb/1004723
VMware ESX 3.0.1 patch ESX-1004190 (unzip) http://download3.vmware.com/software/vi/ESX-1004190.tgz md5sum: 05187b9f534048c79c62741367cc0dd2 http://kb.vmware.com/kb/1004190
VMware ESX 3.0.1 patch ESX-1004189 (krb5) http://download3.vmware.com/software/vi/ESX-1004189.tgz md5sum: 21b620530b99009f469c872e73a439e8 http://kb.vmware.com/kb/1004189
VMware ESX 2.5.5 Upgrade Patch 8 http://download3.vmware.com/software/esx/esx-2.5.5-90521-upgrade.tar.gz md5sum: 392b6947fc3600ca0e8e7788cd5bbb6e http://vmware.com/support/esx25/doc/esx-255-200805-patch.html
VMware ESX 2.5.4 Upgrade Patch 19 http://download3.vmware.com/software/esx/esx-2.5.4-90520-upgrade.tar.gz md5sum: 442788fd0bccb0d994c75b268bd12760 http://vmware.com/support/esx25/doc/esx-254-200805-patch.html
- References:
CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5671 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0967 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2097 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2100 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1721 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0553 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5378 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0948
- Change log:
2008-06-04 VMSA-2008-0009 Initial release
- Contact:
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce@lists.vmware.com
- bugtraq@securityfocus.com
- full-disclosure@lists.grok.org.uk
E-mail: security@vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center http://www.vmware.com/security
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2008 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFIRs08S2KysvBH1xkRCMxFAJ0WJX76quFzCV+avwupq3Lu72UKigCfRftj CZvxoXw/sZxDCSDjVzYAhrA= =s04s -----END PGP SIGNATURE----- .
II.
III. Solution
Install updates from your vendor
Check with your vendors for patches or updates. For information about a vendor, please see the systems affected section in vulnerability notes VU#895609 and VU#374121 or contact your vendor directly. Administrators who compile MIT Kerberos from source should refer to MIT Security Advisory 2008-002 for more information.
IV. References
-
US-CERT Vulnerability Note VU#895609 - http://www.kb.cert.org/vuls/id/895609
-
US-CERT Vulnerability Note VU#374121 - http://www.kb.cert.org/vuls/id/374121
-
MIT krb5 Security Advisory 2008-002 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt2
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA08-079B.html>
Feedback can be directed to US-CERT Technical Staff.
Produced 2008 by US-CERT, a government organization.
Background
MIT Kerberos 5 is a suite of applications that implement the Kerberos network protocol. kadmind is the MIT Kerberos 5 administration daemon, KDC is the Key Distribution Center.
-
Jeff Altman (Secure Endpoints) discovered a buffer overflow in the RPC library server code, used in the kadmin server, caused when too many file descriptors are opened (CVE-2008-0947).
-
Venustech AD-LAB discovered multiple vulnerabilities in the GSSAPI library: usage of a freed variable in the gss_indicate_mechs() function (CVE-2007-5901) and a double free() vulnerability in the gss_krb5int_make_seal_token_v3() function (CVE-2007-5971). These bugs can only be triggered when Kerberos 4 support is enabled. This bug can only be triggered in configurations that allow large numbers of open file descriptors in a process.
Workaround
Kerberos 4 support can be disabled via disabling the "krb4" USE flag and recompiling the ebuild, or setting "v4_mode=none" in the [kdcdefaults] section of /etc/krb5/kdc.conf. This will only work around the KDC related vulnerabilities.
Resolution
All MIT Kerberos 5 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.6.3-r1"
References
[ 1 ] CVE-2007-5901 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894 [ 2 ] CVE-2007-5971 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971 [ 3 ] CVE-2008-0062 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062 [ 4 ] CVE-2008-0063 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063 [ 5 ] CVE-2008-0947 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200803-31.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200803-0028",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": null,
"scope": null,
"trust": 1.6,
"vendor": "mit kerberos team",
"version": null
},
{
"model": null,
"scope": null,
"trust": 1.6,
"vendor": "ubuntu",
"version": null
},
{
"model": "linux",
"scope": "eq",
"trust": 1.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux enterprise desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "10"
},
{
"model": "mac os x",
"scope": "gte",
"trust": 1.0,
"vendor": "apple",
"version": "10.5.0"
},
{
"model": "fedora",
"scope": "eq",
"trust": 1.0,
"vendor": "fedoraproject",
"version": "7"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "10.1"
},
{
"model": "kerberos 5",
"scope": "lte",
"trust": 1.0,
"vendor": "mit",
"version": "1.6.3"
},
{
"model": "linux enterprise software development kit",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "10"
},
{
"model": "opensuse",
"scope": "eq",
"trust": 1.0,
"vendor": "opensuse",
"version": "10.2"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "7.10"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "7.04"
},
{
"model": "opensuse",
"scope": "eq",
"trust": 1.0,
"vendor": "opensuse",
"version": "10.3"
},
{
"model": "mac os x server",
"scope": "gte",
"trust": 1.0,
"vendor": "apple",
"version": "10.5.0"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "6.10"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "6.06"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "10"
},
{
"model": "mac os x",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "10.5.2"
},
{
"model": "mac os x server",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "10.5.2"
},
{
"model": "fedora",
"scope": "eq",
"trust": 1.0,
"vendor": "fedoraproject",
"version": "8"
},
{
"model": "mac os x",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "10.4.11"
},
{
"model": "mac os x server",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "10.4.11"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "apple computer",
"version": null
},
{
"model": "apple mac os x server",
"scope": null,
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": null
},
{
"model": "red hat enterprise linux",
"scope": null,
"trust": 0.8,
"vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
"version": null
},
{
"model": "red hat linux advanced workstation",
"scope": null,
"trust": 0.8,
"vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
"version": null
},
{
"model": "apple mac os x",
"scope": null,
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": null
},
{
"model": "rhel desktop workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
"version": "5 (client)"
},
{
"model": "turbolinux server",
"scope": null,
"trust": 0.8,
"vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9",
"version": null
},
{
"model": "red hat enterprise linux desktop",
"scope": null,
"trust": 0.8,
"vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
"version": null
},
{
"model": "kerberos",
"scope": null,
"trust": 0.8,
"vendor": "mit kerberos",
"version": null
},
{
"model": "asianux server",
"scope": null,
"trust": 0.8,
"vendor": "\u30b5\u30a4\u30d0\u30fc\u30c8\u30e9\u30b9\u30c8\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "10.4.11"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "10.5.2"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "10.5.2"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "10.4.11"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.0.2"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.0.1"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.0"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.56"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.54"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.52"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.5"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.45"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.43"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.417"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.416"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.415"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.413"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.410"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.41"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.4"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.5"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.04"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.04"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.04"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.04"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.10"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.10"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.10"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.10"
},
{
"model": "linux lts sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "linux lts powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "linux lts i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "linux lts amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "server",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "11x64"
},
{
"model": "server",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "11"
},
{
"model": "linux enterprise server sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "linux enterprise sdk 10.sp1",
"scope": null,
"trust": 0.3,
"vendor": "suse",
"version": null
},
{
"model": "linux enterprise desktop sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.3"
},
{
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.2"
},
{
"model": "linux professional",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.1"
},
{
"model": "linux personal",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.1"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "rpath",
"version": "1"
},
{
"model": "appliance platform linux service",
"scope": "eq",
"trust": 0.3,
"vendor": "rpath",
"version": "1"
},
{
"model": "linux advanced workstation for the ita ia64",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "2.12.1"
},
{
"model": "fedora",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "7"
},
{
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "enterprise linux es 4.5.z",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "enterprise linux desktop workstation client",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "enterprise linux desktop client",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "enterprise linux as 4.5.z",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"model": "enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"model": "enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4.0"
},
{
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3.0"
},
{
"model": "open enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "0"
},
{
"model": "open enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "2"
},
{
"model": "kerberos",
"scope": "eq",
"trust": 0.3,
"vendor": "mit",
"version": "51.6.3"
},
{
"model": "kerberos",
"scope": "eq",
"trust": 0.3,
"vendor": "mit",
"version": "51.6.2"
},
{
"model": "kerberos",
"scope": "eq",
"trust": 0.3,
"vendor": "mit",
"version": "51.5.2"
},
{
"model": "kerberos",
"scope": "eq",
"trust": 0.3,
"vendor": "mit",
"version": "51.4.3"
},
{
"model": "kerberos",
"scope": "eq",
"trust": 0.3,
"vendor": "mit",
"version": "51.3"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.0"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.0"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2007.1"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2007.1"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2007.0"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2007.0"
},
{
"model": "multi network firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "2.0"
},
{
"model": "corporate server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "4.0"
},
{
"model": "corporate server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "3.0"
},
{
"model": "corporate server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "3.0"
},
{
"model": "corporate server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "4.0"
},
{
"model": "kerberos for openvms",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3.1"
},
{
"model": "linux",
"scope": null,
"trust": 0.3,
"vendor": "gentoo",
"version": null
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux ppc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux mipsel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux m68k",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux hppa",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux mipsel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux m68k",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux hppa",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.11"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.11"
},
{
"model": "esx server patch",
"scope": "ne",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.58"
},
{
"model": "esx server patch",
"scope": "ne",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.419"
},
{
"model": "kerberos for openvms",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": "3.2"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#895609"
},
{
"db": "CERT/CC",
"id": "VU#374121"
},
{
"db": "BID",
"id": "28303"
},
{
"db": "CNNVD",
"id": "CNNVD-200803-310"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001183"
},
{
"db": "NVD",
"id": "CVE-2008-0063"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ken Raeburn",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200803-310"
}
],
"trust": 0.6
},
"cve": "CVE-2008-0063",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2008-0063",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-30188",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2008-0063",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2008-0063",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2008-0063",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#895609",
"trust": 0.8,
"value": "10.10"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#374121",
"trust": 0.8,
"value": "2.87"
},
{
"author": "NVD",
"id": "CVE-2008-0063",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200803-310",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-30188",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#895609"
},
{
"db": "CERT/CC",
"id": "VU#374121"
},
{
"db": "VULHUB",
"id": "VHN-30188"
},
{
"db": "CNNVD",
"id": "CNNVD-200803-310"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001183"
},
{
"db": "NVD",
"id": "CVE-2008-0063"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka \"Uninitialized stack values.\". Vulnerabilities in the MIT Kerberos libgssrpc library may allow an attacker to cause a denial of service or potentially execute arbitrary code. MIT Kerberos 5 KDC is prone to multiple information-disclosure vulnerabilities resulting from memory corruption. \nThese issues occur when KDC is configured to support Kerberos 4 and processes malformed krb4 messages. \nAn attacker can exploit these issues to obtain potentially sensitive information that will aid in further attacks. Failed exploit attempts will likely result in denial-of-service conditions. \nMIT Kerberos 5 version 1.6.3 KDC is vulnerable; other versions may also be affected. It adopts a client/server structure, and both the client and the server can authenticate each other (that is, double verification), which can prevent eavesdropping and replay attack, etc. ), which can prevent eavesdropping, prevent replay attacks, etc. If a Kerberos 4 message is truncated, the missing part of the message is replaced with what was previously on the stack, and some parts of the principal name are read from the string in the message. These strings are limited to 40 bytes or the next ASCII NUL found in the buffer. If the KDC returns an error message indicating that the master name was not found in the database, it will include the master name in the error message, which may contain previous stack contents. It is theoretically possible for the exposed\ninformation to include secret key data on some platforms. \n\nFor the stable distribution (etch), these problems have been fixed in\nversion 1.4.4-7etch5. \n\nFor the old stable distribution (sarge), these problems have been fixed\nin version krb5 1.3.6-2sarge6. \n\nWe recommend that you upgrade your krb5 packages. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\nDebian 3.1 (oldstable)\n- ----------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6.orig.tar.gz\n Size/MD5 checksum: 6526510 7974d0fc413802712998d5fc5eec2919\n http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6-2sarge6.diff.gz\n Size/MD5 checksum: 673705 93382126a3c73ac44ed7daa7d85f166d\n http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6-2sarge6.dsc\n Size/MD5 checksum: 782 0391aaf485ef1636ef18c6ba183c3fbe\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-doc_1.3.6-2sarge6_all.deb\n Size/MD5 checksum: 718916 ca2fb37b53a19207f1e1f1de90c4c1f3\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_amd64.deb\n Size/MD5 checksum: 137834 d43e9d3f3ef65fe8c8cbbb7b5dcbd144\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_amd64.deb\n Size/MD5 checksum: 177730 947fb82dd795f9272935ea4cb027e543\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_amd64.deb\n Size/MD5 checksum: 124864 4f1d0aa9d18013023f4a9f2b9a10db65\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_amd64.deb\n Size/MD5 checksum: 104886 15037693de0d9dc27460d713b547872a\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_amd64.deb\n Size/MD5 checksum: 63606 c4cfe2b01bfe0b579b216210817c4fa3\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_amd64.deb\n Size/MD5 checksum: 369420 c8d1eaf98400880ff82f727fe20f90cd\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_amd64.deb\n Size/MD5 checksum: 82806 30230dfe2605b88fdeac8811d408acdb\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_amd64.deb\n Size/MD5 checksum: 57048 741292984684fddae11e130dcd388161\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_amd64.deb\n Size/MD5 checksum: 652378 d8f3493f4354e0b3717ffc72d6592b88\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_amd64.deb\n Size/MD5 checksum: 216990 0df13c59411cf57b86bd94e250cf458e\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_arm.deb\n Size/MD5 checksum: 115684 ef39b71c5ecf4187e24d27c1111c9a54\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_arm.deb\n Size/MD5 checksum: 633330 08566aa29ab8d56e26070137a16731a4\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_arm.deb\n Size/MD5 checksum: 158874 4f60129aa092ea3d750deb168299abe7\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_arm.deb\n Size/MD5 checksum: 54134 e23173f4ad3a59af03fbab0369a714a9\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_arm.deb\n Size/MD5 checksum: 58252 255394fcc06d13b6dabc2e87c91dac02\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_arm.deb\n Size/MD5 checksum: 198848 aaba0529c817ff11728515f5a116f71b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_arm.deb\n Size/MD5 checksum: 126814 85d31333aa01c4ab1f7b14ffaaa4c08b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_arm.deb\n Size/MD5 checksum: 74940 706b7cbfb01d66cbdb371a9019b3f725\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_arm.deb\n Size/MD5 checksum: 329190 a661364db9bd2d5c5340a0c6a5c939f4\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_arm.deb\n Size/MD5 checksum: 93938 04dc96993c79d0113a0626a4439c8cbf\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_hppa.deb\n Size/MD5 checksum: 125154 afd4a9608fff5b1b3e793881bb2c9c2c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_hppa.deb\n Size/MD5 checksum: 64286 b85cf8b5680c12c093ff34150623a3a0\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_hppa.deb\n Size/MD5 checksum: 59368 3df43bbb40e060d0522495ff3e78412d\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_hppa.deb\n Size/MD5 checksum: 669644 50027bd1d314e911c4a91647989fad1e\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_hppa.deb\n Size/MD5 checksum: 104948 a013d1818ed8d6dd7d75a8ac11e795f9\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_hppa.deb\n Size/MD5 checksum: 187304 401a8e21722c104f3d3aae86cf3640e9\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_hppa.deb\n Size/MD5 checksum: 383876 d50afad26c9a0416fe47dfdf5ff649f4\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_hppa.deb\n Size/MD5 checksum: 81992 b6c84f121f66616f578b13a3f0c654ca\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_hppa.deb\n Size/MD5 checksum: 139202 4972377b638f980ad757128f14132874\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_hppa.deb\n Size/MD5 checksum: 224154 8a8436e210dd8892487ea482a1de6522\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_i386.deb\n Size/MD5 checksum: 116324 445bced4eb764a78e51b68e4d7558363\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_i386.deb\n Size/MD5 checksum: 574784 40fa136876b3219e55de089340c0c85e\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_i386.deb\n Size/MD5 checksum: 52890 a6ae74be5b338ab7f215d0846353833e\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_i386.deb\n Size/MD5 checksum: 165726 4b2485d3b8a50cd61ffcd2e0748d70fe\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_i386.deb\n Size/MD5 checksum: 349416 2f33d4592484a2adf276fd29cfe9d728\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_i386.deb\n Size/MD5 checksum: 127878 7232e14b8bc1d78fa4346b4ed393a3b9\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_i386.deb\n Size/MD5 checksum: 95656 00f7666dac13adf2a7bfc81c9d801f2f\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_i386.deb\n Size/MD5 checksum: 191526 d8613e5a3d87838ee7155f54c1c12f3d\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_i386.deb\n Size/MD5 checksum: 57762 2baa509aad5f6b837753e5a3e65e63f1\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_i386.deb\n Size/MD5 checksum: 75890 5e52830c36794bb8ed2cdd14611ec690\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_ia64.deb\n Size/MD5 checksum: 134332 473be671406f747295c4a94d3f2ca3c5\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_ia64.deb\n Size/MD5 checksum: 289396 c95c79f18a2a8cb78131a35073c09ebe\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_ia64.deb\n Size/MD5 checksum: 890018 a9ca82650f5f96ac66d2b4436b0d1345\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_ia64.deb\n Size/MD5 checksum: 167350 f448dced91316668c1d33d6a0776eb2c\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_ia64.deb\n Size/MD5 checksum: 240384 5dc95c9ea35a7b052041e177114c5acf\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_ia64.deb\n Size/MD5 checksum: 79982 8980a39a06eeca5ef5adb623786742a2\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_ia64.deb\n Size/MD5 checksum: 73692 039a88dc8793fa4de6e461408cde62bd\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_ia64.deb\n Size/MD5 checksum: 105008 273a9dbaf7a4882f39ebd9de527f76fb\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_ia64.deb\n Size/MD5 checksum: 502382 97f1d32991c1778752bad887f4029990\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_ia64.deb\n Size/MD5 checksum: 165288 7d2e3c354cc50db22fc34a396902690f\n\nm68k architecture (Motorola Mc680x0)\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_m68k.deb\n Size/MD5 checksum: 71116 2f35c57d9f24856b013e27b0eef24a25\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_m68k.deb\n Size/MD5 checksum: 516020 203205bb2e6f66161c2aa98746687190\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_m68k.deb\n Size/MD5 checksum: 49768 39d4529ec4e27e2fdc75de762c5643fa\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_m68k.deb\n Size/MD5 checksum: 107660 0659ab018fbf062504348fc63ef97cc6\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_m68k.deb\n Size/MD5 checksum: 147864 b86ebef3ec1541aeabc20be31e503049\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_m68k.deb\n Size/MD5 checksum: 305872 1fc4f6385b5196c1c892731eac06f5b3\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_m68k.deb\n Size/MD5 checksum: 122106 c60b71edc9196adda91d40c4b84a908e\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_m68k.deb\n Size/MD5 checksum: 174180 6d750c072a8d641bd661ea5c688199f3\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_m68k.deb\n Size/MD5 checksum: 53478 74055ea66e27e24d79c824691da8fe0f\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_m68k.deb\n Size/MD5 checksum: 88692 074a5c747c652e7ce8d911077ca5586c\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_mips.deb\n Size/MD5 checksum: 145108 f432457761497dcfd8e1ba6fe7ac43fa\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_mips.deb\n Size/MD5 checksum: 164386 512e3b183ffc5f121f82981f32235377\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_mips.deb\n Size/MD5 checksum: 57750 d827cf9980ed4eba196dedf93e7d9b5d\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_mips.deb\n Size/MD5 checksum: 680860 b4718176172f14d54d2a4662ae28e534\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_mips.deb\n Size/MD5 checksum: 128738 a9592a522e7cc0f6db4c121ac04db438\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_mips.deb\n Size/MD5 checksum: 65060 9b5613121aff8f341cb2dc3786b28d78\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_mips.deb\n Size/MD5 checksum: 103404 eb3ca8cddb900bd4dfdb10b67ca9622c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_mips.deb\n Size/MD5 checksum: 225708 d09d386a5705b48584ffd51b0127883d\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_mips.deb\n Size/MD5 checksum: 355178 359ca6a220b6a9e7af7b949e7a64fb5d\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_mips.deb\n Size/MD5 checksum: 80956 407fec89580608afebb4ff89d95bdf72\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_mipsel.deb\n Size/MD5 checksum: 146678 76f8820a81a1c068ab60348f1302d087\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_mipsel.deb\n Size/MD5 checksum: 103808 db8b0c06f58646093ca80554061cc0d1\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_mipsel.deb\n Size/MD5 checksum: 65266 c27b18832cafb60109ba97e529706a53\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_mipsel.deb\n Size/MD5 checksum: 226540 0ddfa3be4f63eeb0066682928c193996\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_mipsel.deb\n Size/MD5 checksum: 82060 2479f67cadc3533fb499507fc1977b5d\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_mipsel.deb\n Size/MD5 checksum: 355120 d1644230bb4cc0788a04f5f0c8eb961c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_mipsel.deb\n Size/MD5 checksum: 58164 5dcd7db602701983272b2fbb0db88864\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_mipsel.deb\n Size/MD5 checksum: 130098 472042e34a7ac48352205df510767ddd\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_mipsel.deb\n Size/MD5 checksum: 165632 3074194d27a16bd4e737a9462d6a217a\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_mipsel.deb\n Size/MD5 checksum: 682776 b0046283d8860fc6c8fe968b335ff463\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_powerpc.deb\n Size/MD5 checksum: 61758 9496fefe85772ad549b84ae523c56e77\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_powerpc.deb\n Size/MD5 checksum: 217812 c5aa73b8513a3698002cc3cedfeff012\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_powerpc.deb\n Size/MD5 checksum: 105320 3677c003bd4c271bbe3daef5cf8f52df\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_powerpc.deb\n Size/MD5 checksum: 143838 61244dbf640bd19ee1cc738ee7b44b34\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_powerpc.deb\n Size/MD5 checksum: 57018 9afa2ba534be545b9d76d1f69c8e5468\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_powerpc.deb\n Size/MD5 checksum: 165746 74c29add119101782727226dc9200db0\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_powerpc.deb\n Size/MD5 checksum: 634906 93dd67378ead6cb763cc304516cbf632\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_powerpc.deb\n Size/MD5 checksum: 353104 c5b16a1f26d01435b2bcb540b5b97730\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_powerpc.deb\n Size/MD5 checksum: 82702 f728717a6a25b233526ad69934e376f4\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_powerpc.deb\n Size/MD5 checksum: 126246 da0e3adca803929ae44fad884949cbe2\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_s390.deb\n Size/MD5 checksum: 214176 9c4b2684ce790d6544d078efde32f5d3\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_s390.deb\n Size/MD5 checksum: 132996 1ed627f09d5b25bb3eaaaa4148207d7f\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_s390.deb\n Size/MD5 checksum: 63428 332d6f0c94eabdca1df666a3ec0c6184\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_s390.deb\n Size/MD5 checksum: 57214 f518a8dd4336c3916bb8c533bd8b6301\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_s390.deb\n Size/MD5 checksum: 624898 27ed5f1406b97c3a429ed6cc41a5421a\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_s390.deb\n Size/MD5 checksum: 99652 0e49258823390960faaf06522ab8f1cc\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_s390.deb\n Size/MD5 checksum: 376188 ec0fdc218fbe9c53fa5aaec87667b5a7\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_s390.deb\n Size/MD5 checksum: 82370 3a26a1e22c24add8b16498a641444a77\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_s390.deb\n Size/MD5 checksum: 180336 34967e4eb80a75b18a23a9f3bf05bb5f\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_s390.deb\n Size/MD5 checksum: 121318 883136f99bce1a8f9f413dc3d68f5762\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_sparc.deb\n Size/MD5 checksum: 576786 3c142ce93bd9b408ea9a6d6046e3d067\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_sparc.deb\n Size/MD5 checksum: 58950 91be8dfc1160f334f0ed514eaeddb3c4\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_sparc.deb\n Size/MD5 checksum: 53520 89ceeef920ad596b129365a1f6876818\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_sparc.deb\n Size/MD5 checksum: 73596 cca4a24557097c3be9dc611d686d0688\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_sparc.deb\n Size/MD5 checksum: 93348 0a954f5b7f637eeaea3b656699314b99\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_sparc.deb\n Size/MD5 checksum: 114068 e7a1986874465f458987516f27a705d1\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_sparc.deb\n Size/MD5 checksum: 157712 2c8a0b75fc4982ee9265d2dd8cab2cc4\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_sparc.deb\n Size/MD5 checksum: 126780 d6faa238b06d1ff65c6b20b54c7b4fac\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_sparc.deb\n Size/MD5 checksum: 194584 39322280b333988d5cce973c7c00cdad\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_sparc.deb\n Size/MD5 checksum: 330436 27d8b24e5a2bbb57d8078c7b1d391d53\n\nDebian 4.0 (stable)\n- ---------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5_1.4.4-7etch5.dsc\n Size/MD5 checksum: 876 e8f30ac6b710091985a2b669632ca174\n http://security.debian.org/pool/updates/main/k/krb5/krb5_1.4.4.orig.tar.gz\n Size/MD5 checksum: 11017910 a675e5953bb8a29b5c6eb6f4ab0bb32a\n http://security.debian.org/pool/updates/main/k/krb5/krb5_1.4.4-7etch5.diff.gz\n Size/MD5 checksum: 1590551 c7d7bfb6aa34876ec8b5d0767ed65c2d\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-doc_1.4.4-7etch5_all.deb\n Size/MD5 checksum: 1806352 0e3b03d93b1a62a41f9d004d3f6a69eb\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_alpha.deb\n Size/MD5 checksum: 76136 61c8f8b99cd2c5e08fe20121d5a33119\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_alpha.deb\n Size/MD5 checksum: 461032 12fe64d352941f674f01b875532ec91f\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_alpha.deb\n Size/MD5 checksum: 91648 ee8cf04beb8687f4afc0684fbed232e9\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_alpha.deb\n Size/MD5 checksum: 1087614 dc627be2679028513f541ab0db184758\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_alpha.deb\n Size/MD5 checksum: 245650 57d128cab47e74d75ad56da8b81866fe\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_alpha.deb\n Size/MD5 checksum: 154868 4cac528d66a64df26a385bb15552061c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_alpha.deb\n Size/MD5 checksum: 136110 a0d904994baba8064c640014e238020c\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_alpha.deb\n Size/MD5 checksum: 216328 7e96a8117e5397282f9027dc99fee308\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_alpha.deb\n Size/MD5 checksum: 89690 a14489d539fc5274175e92b8c1f99cc4\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_alpha.deb\n Size/MD5 checksum: 65866 c153e17e3514e566d1b719bd4941c3f2\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_alpha.deb\n Size/MD5 checksum: 1017046 543b2403aee468ad0a1692708de9a587\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_amd64.deb\n Size/MD5 checksum: 83852 4e7e51683f130dfdbaaaa2b6bbdfd70b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_amd64.deb\n Size/MD5 checksum: 61474 5ed45d3180ad5cda0839f53d8d9fc716\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_amd64.deb\n Size/MD5 checksum: 768634 4f227f866f481d0a11a90b1a41d14bbb\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_amd64.deb\n Size/MD5 checksum: 141926 5944b339ff70c630a2d04026dc8a436c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_amd64.deb\n Size/MD5 checksum: 68170 d5b5cc9a99c26889dcf685f88cc92a9a\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_amd64.deb\n Size/MD5 checksum: 129822 8f01b6b85827382fcb2ac54b561a1ec0\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_amd64.deb\n Size/MD5 checksum: 222262 b16ea5bddeb302c73844a465d5b27020\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_amd64.deb\n Size/MD5 checksum: 1072208 5458abcef1aa9174a703a51d9910bf42\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_amd64.deb\n Size/MD5 checksum: 190378 b663d232374d5d8ea6a1aeb6596e1e66\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_amd64.deb\n Size/MD5 checksum: 426424 39665f5600ac062e43d78823f79016a6\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_amd64.deb\n Size/MD5 checksum: 86108 786e35f5915b137445eb034ef1f53eee\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_arm.deb\n Size/MD5 checksum: 1013602 3087dae461053141fd9099ba1bf1f520\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_arm.deb\n Size/MD5 checksum: 63418 6d76005bc5336972fff07aa9961bcbca\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_arm.deb\n Size/MD5 checksum: 682712 20f548e7e7fe59ffc450c46c58b73fd1\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_arm.deb\n Size/MD5 checksum: 136110 b1774fea7cea371790dc1d7b9a293395\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_arm.deb\n Size/MD5 checksum: 173154 785af0fd07d78658edb4a4c25082ca22\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_arm.deb\n Size/MD5 checksum: 59834 e369f2b68c8090e91191718d207da76d\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_arm.deb\n Size/MD5 checksum: 206238 c69f58637e68a2d455750e32b5b770c0\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_arm.deb\n Size/MD5 checksum: 390054 b972d264ad97b69120ee4e4d898f3055\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_arm.deb\n Size/MD5 checksum: 81426 82979ab1f34edf407dc1a32f4be2a911\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_arm.deb\n Size/MD5 checksum: 123540 f9534a82bfa054018029c9a3934fc121\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_arm.deb\n Size/MD5 checksum: 78826 62163e751d27902012a16758fbbf67e0\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_hppa.deb\n Size/MD5 checksum: 1050680 8ea8f26032837464c794e615623ac59e\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_hppa.deb\n Size/MD5 checksum: 87564 ec92090e89dc2c03500c52cbd188e4c3\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_hppa.deb\n Size/MD5 checksum: 441724 6cc26ce6c3e4fa233222786b15bc08ac\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_hppa.deb\n Size/MD5 checksum: 64206 fa4e68946117f10d2dbbcea75fabe5d0\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_hppa.deb\n Size/MD5 checksum: 132802 23e6e453b5943c8df76fd87a18fe2182\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_hppa.deb\n Size/MD5 checksum: 85370 9011819683422a091d363e0d0064e82e\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_hppa.deb\n Size/MD5 checksum: 815220 652f24a16193c3d8bf9f128000888850\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_hppa.deb\n Size/MD5 checksum: 145028 88cb8fd42c037cca495bb200a8d5bacd\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_hppa.deb\n Size/MD5 checksum: 69692 0ce8e82456cc62420ba31f7ce0aa3a39\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_hppa.deb\n Size/MD5 checksum: 201216 b7aa6c970117a632b2e60d14829ba7b7\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_hppa.deb\n Size/MD5 checksum: 232082 7a823371e31f4b3e937a4e9d7a83d09b\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_i386.deb\n Size/MD5 checksum: 80306 8c8461beb8bd866080134bf1a25ef557\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_i386.deb\n Size/MD5 checksum: 62446 22a83f7567df841b9f34ffc133534a64\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_i386.deb\n Size/MD5 checksum: 133360 5e72e490c20ac03f49b7fd6921047048\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_i386.deb\n Size/MD5 checksum: 680166 991c24aa3b8e2d82f07e49865d70119b\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_i386.deb\n Size/MD5 checksum: 408376 f375a2157e2b1de2eadecbb2f03c8637\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_i386.deb\n Size/MD5 checksum: 174112 f9efe4ee2c52dba6806f548d778e0f53\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_i386.deb\n Size/MD5 checksum: 58050 b99734e1b92043a8cc816c588b04fce5\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_i386.deb\n Size/MD5 checksum: 196558 0b03b5d3920efa1c5efbf8cbe3901f15\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_i386.deb\n Size/MD5 checksum: 124206 21cc6d63e1eeaeb9deb70e227d61d84b\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_i386.deb\n Size/MD5 checksum: 1037936 a1a2470171c5403563ed285be9caaa9a\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_i386.deb\n Size/MD5 checksum: 78598 80b9f57c39a90e17b67480271ec8cc2a\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_ia64.deb\n Size/MD5 checksum: 305920 940370e13598d9c00b123f97aa3f09ad\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_ia64.deb\n Size/MD5 checksum: 164602 6dd81cf1a5487ad63e2ab3cf1ce342f1\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_ia64.deb\n Size/MD5 checksum: 112994 4ccb79847d301064e5e6496f2577b5e5\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_ia64.deb\n Size/MD5 checksum: 80324 88cc01f93ed8fe3b9c9861176050f004\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_ia64.deb\n Size/MD5 checksum: 105592 8745ddb42d7cb7afb95ef4f946a26c60\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_ia64.deb\n Size/MD5 checksum: 1088562 0d2cdc97965b7827a78bca972aed38fd\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_ia64.deb\n Size/MD5 checksum: 91338 40c9d44d05f3262c1a5d6950c4255e16\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_ia64.deb\n Size/MD5 checksum: 269600 4acf36a3831bd4d2bb0af4d9130d0f27\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_ia64.deb\n Size/MD5 checksum: 1043576 6e487c186d462bc98b8ccdfbb5891324\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_ia64.deb\n Size/MD5 checksum: 190500 4cc37a9cd6bb13da4ca73f87b60738d3\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_ia64.deb\n Size/MD5 checksum: 592208 ac3bd63fc244d99757d33c8b8fa8f745\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_mips.deb\n Size/MD5 checksum: 71184 99f78076e71ddc74b7809de695945048\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_mips.deb\n Size/MD5 checksum: 128534 d08156f659ccfaa953e612ab0f1be1e0\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_mips.deb\n Size/MD5 checksum: 86416 a0ccc69288f43974099646a0b4df2702\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_mips.deb\n Size/MD5 checksum: 807408 caa736a161edf63d4b7b0200642293cc\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_mips.deb\n Size/MD5 checksum: 81794 820abd7cda885cfbcd651eeb819b6ea2\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_mips.deb\n Size/MD5 checksum: 176908 eb82211002e6f5fa451b8c6fc72cd8c5\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_mips.deb\n Size/MD5 checksum: 230468 6498dab212c73d4c618a77b105d40302\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_mips.deb\n Size/MD5 checksum: 389766 cb2be7e8aa8890f3011c7721474048cb\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_mips.deb\n Size/MD5 checksum: 145004 1d8436cb03bf8df56127ab37a1787096\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_mips.deb\n Size/MD5 checksum: 62920 610d234fcd0e209b0d2e6c0f3be39f6b\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_mips.deb\n Size/MD5 checksum: 1112710 5b98f43fa267c04b32bc96927ad868a2\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_mipsel.deb\n Size/MD5 checksum: 87478 dce62567d27548de56ad38615fd5a8fe\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_mipsel.deb\n Size/MD5 checksum: 71596 8cfffdf23386228753133a6d675a75dc\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_mipsel.deb\n Size/MD5 checksum: 131106 22011c6b9dfeaf6318baffbb40b4b005\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_mipsel.deb\n Size/MD5 checksum: 63834 9a2e78369d8fa1d0d8688eb48e443518\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_mipsel.deb\n Size/MD5 checksum: 810348 c36eb2099ac9fd31e57d5693ec8eb92b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_mipsel.deb\n Size/MD5 checksum: 82652 3699856d5fe3d28c74e0e66469d05859\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_mipsel.deb\n Size/MD5 checksum: 1087382 a5cac22f1da48cbb4c80f7f736b70b2f\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_mipsel.deb\n Size/MD5 checksum: 179494 4a1d3e8cc558c330b9f4a6bded87913b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_mipsel.deb\n Size/MD5 checksum: 145716 1f45bb37dd7e13ea4c6b21f52c43c657\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_mipsel.deb\n Size/MD5 checksum: 232788 88bc4c67b09b541769a7a00abc5d2688\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_mipsel.deb\n Size/MD5 checksum: 391848 05272bb8eb78e5e3fa374c9cb6597403\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_powerpc.deb\n Size/MD5 checksum: 222776 d87408739c95de5b207a88550278a0d0\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_powerpc.deb\n Size/MD5 checksum: 1083104 a5a89067cd381199a75e9751be977884\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_powerpc.deb\n Size/MD5 checksum: 143844 488e4411a9d507c14961e8c1a867a18b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_powerpc.deb\n Size/MD5 checksum: 84364 fd1d52f855615c98fc8d207dcea36d2f\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_powerpc.deb\n Size/MD5 checksum: 137308 16ac4ae9b3a4eec6e584d4b9902771ed\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_powerpc.deb\n Size/MD5 checksum: 399370 2c4951062f1fa124af1a36a8b0c1e761\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_powerpc.deb\n Size/MD5 checksum: 86864 33e72918f1ae2f968537d4e3328237b8\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_powerpc.deb\n Size/MD5 checksum: 67384 3547b618672d7e775018128fa421551d\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_powerpc.deb\n Size/MD5 checksum: 753506 cdc2c41be06d280160c3f7ee8b7f3417\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_powerpc.deb\n Size/MD5 checksum: 61930 dad1ac368a357004137a4beaf0a4f8ba\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_powerpc.deb\n Size/MD5 checksum: 179574 499b4b287b5726f7a8afea620d5606c5\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_s390.deb\n Size/MD5 checksum: 63392 7e446e33886543cc1432026dbde49ea8\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_s390.deb\n Size/MD5 checksum: 87886 02735411cb4acaa71b8aa72bf7d9683d\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_s390.deb\n Size/MD5 checksum: 438990 5aacff7c6ec54f708cb98fa0718bfcc0\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_s390.deb\n Size/MD5 checksum: 129266 31c153db1328ee93b97e64bdb01a3cc3\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_s390.deb\n Size/MD5 checksum: 195506 d3175c75393ac80363919b170e1446e0\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_s390.deb\n Size/MD5 checksum: 1073530 ac4c767b43f20d304e9683ebfddf3a68\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_s390.deb\n Size/MD5 checksum: 224438 5a59744997773137c0409af842e7fdf0\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_s390.deb\n Size/MD5 checksum: 68782 57ed0962a4cf4f2f7c7d60edf52449ed\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_s390.deb\n Size/MD5 checksum: 140470 8fd23a0ec4c4b5c81c48d7b0228a5fa8\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_s390.deb\n Size/MD5 checksum: 82118 7a84a0ceeb5110380a231be90d6f36ce\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_s390.deb\n Size/MD5 checksum: 733368 6a3ea5e404cebc11888aaad6fdc2cedd\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_sparc.deb\n Size/MD5 checksum: 131724 561314d157da780fc7de7c06524e8a3c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_sparc.deb\n Size/MD5 checksum: 77124 6de298978f0404514a0b16d863efa276\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_sparc.deb\n Size/MD5 checksum: 961534 754258b22c1eaf83c3167775c3138a58\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_sparc.deb\n Size/MD5 checksum: 372674 20c48448253a262988a3ca876cfb2931\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_sparc.deb\n Size/MD5 checksum: 123040 00e2f8c76353547804f9ff516de1f65d\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_sparc.deb\n Size/MD5 checksum: 680434 6bf7c8d82d481a8d6d9d784f5ed617ec\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_sparc.deb\n Size/MD5 checksum: 58242 f7e89e959e30e2bd36ac3ce1191a7711\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_sparc.deb\n Size/MD5 checksum: 63800 21beab0b247e7bdeea2004876f388c59\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_sparc.deb\n Size/MD5 checksum: 166710 b5127d835935bee8ce49a1154e5fa2eb\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_sparc.deb\n Size/MD5 checksum: 200282 49524ee10fb4d4e7be223a1f25dffba7\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_sparc.deb\n Size/MD5 checksum: 78204 2462352e5493e856bd8a784ca49f95f0\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n \n A flaw was discovered in how the Kerberos krb5kdc handled Kerberos v4\n protocol packets. \n \n This issue only affects krb5kdc when it has Kerberos v4 protocol\n compatibility enabled, which is a compiled-in default in all\n Kerberos versions that Mandriva Linux ships prior to Mandriva\n Linux 2008.0. \n \n The updated packages have been patched to correct these issues. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5901\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947\n http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt\n http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2007.1:\n 64c3f5c31177dcacc99b021ec6ed1271 2007.1/i586/ftp-client-krb5-1.5.2-6.6mdv2007.1.i586.rpm\n 11b4194bc9edba8c0951e44660ba9955 2007.1/i586/ftp-server-krb5-1.5.2-6.6mdv2007.1.i586.rpm\n 23794e6e0cb1d46a329c42a04f672c5f 2007.1/i586/krb5-server-1.5.2-6.6mdv2007.1.i586.rpm\n 0fbb29bd81c8452d937d30fbbda62242 2007.1/i586/krb5-workstation-1.5.2-6.6mdv2007.1.i586.rpm\n 8f4eea60bf4ea3bfc776f1c117ceb26d 2007.1/i586/libkrb53-1.5.2-6.6mdv2007.1.i586.rpm\n fd5b1da0a056d995011d2b1a692e4292 2007.1/i586/libkrb53-devel-1.5.2-6.6mdv2007.1.i586.rpm\n ca79ccbe3f286b9069f0ae028d9816f7 2007.1/i586/telnet-client-krb5-1.5.2-6.6mdv2007.1.i586.rpm\n 8a7c84f1fe1bbb5338723f28d12a9f21 2007.1/i586/telnet-server-krb5-1.5.2-6.6mdv2007.1.i586.rpm \n 22830790ad7715479b7d4fbecc6c1e7f 2007.1/SRPMS/krb5-1.5.2-6.6mdv2007.1.src.rpm\n\n Mandriva Linux 2007.1/X86_64:\n fc02060b7c1da08c33952e6c14fb5627 2007.1/x86_64/ftp-client-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm\n 513fca34bdd1f2a5643a8e6adeb62e0e 2007.1/x86_64/ftp-server-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm\n 4f42d639753a885212e6d62bfe84a121 2007.1/x86_64/krb5-server-1.5.2-6.6mdv2007.1.x86_64.rpm\n 6b2ca028321fb08199be20a4aedef4a0 2007.1/x86_64/krb5-workstation-1.5.2-6.6mdv2007.1.x86_64.rpm\n 4d453dc2a579e74e29dfc052197fedc1 2007.1/x86_64/lib64krb53-1.5.2-6.6mdv2007.1.x86_64.rpm\n b22d9f1b515df1a5270d2d4c373b7dd3 2007.1/x86_64/lib64krb53-devel-1.5.2-6.6mdv2007.1.x86_64.rpm\n 21b245649de9e38e43782bd1a18922a7 2007.1/x86_64/telnet-client-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm\n 1322374ab1c15b5c1392ee4ae5f915e7 2007.1/x86_64/telnet-server-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm \n 22830790ad7715479b7d4fbecc6c1e7f 2007.1/SRPMS/krb5-1.5.2-6.6mdv2007.1.src.rpm\n\n Mandriva Linux 2008.0:\n 3ee5a309927b830bf8559a872161384b 2008.0/i586/ftp-client-krb5-1.6.2-7.1mdv2008.0.i586.rpm\n 1835baa43ab27aac2493dc7821bafa8a 2008.0/i586/ftp-server-krb5-1.6.2-7.1mdv2008.0.i586.rpm\n 5e8369c201ac4678a7bc46590107e45f 2008.0/i586/krb5-1.6.2-7.1mdv2008.0.i586.rpm\n 94277e76faf2b75553c2e6250e428a43 2008.0/i586/krb5-server-1.6.2-7.1mdv2008.0.i586.rpm\n 695d5b85347b906401433fa55177be1a 2008.0/i586/krb5-workstation-1.6.2-7.1mdv2008.0.i586.rpm\n 4696cbae0ce644c265b74ff4ce59a865 2008.0/i586/libkrb53-1.6.2-7.1mdv2008.0.i586.rpm\n cc8122a1c6a3449fc41d3022bbdffeb2 2008.0/i586/libkrb53-devel-1.6.2-7.1mdv2008.0.i586.rpm\n d5e75835b35e81a3f7d038e501dabd1c 2008.0/i586/telnet-client-krb5-1.6.2-7.1mdv2008.0.i586.rpm\n 072b5ba782fbd1659ed8bde15bd11b5a 2008.0/i586/telnet-server-krb5-1.6.2-7.1mdv2008.0.i586.rpm \n cfd133fde8cc72b038ea61dc94405701 2008.0/SRPMS/krb5-1.6.2-7.1mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n 7a8c1c390b1d1a0b2a8fe28e8fb6a458 2008.0/x86_64/ftp-client-krb5-1.6.2-7.1mdv2008.0.x86_64.rpm\n 9b312bd49bd858d00d00ec299866a275 2008.0/x86_64/ftp-server-krb5-1.6.2-7.1mdv2008.0.x86_64.rpm\n 19f7d0590227c4cc636ee5528db8027a 2008.0/x86_64/krb5-1.6.2-7.1mdv2008.0.x86_64.rpm\n 6a84bc19cb8e32f7331ce4c1ed36dc9d 2008.0/x86_64/krb5-server-1.6.2-7.1mdv2008.0.x86_64.rpm\n dabaf97b9b36316dc2b69e9edc953793 2008.0/x86_64/krb5-workstation-1.6.2-7.1mdv2008.0.x86_64.rpm\n 2810bbed78b7480ff48b021a798cb5a1 2008.0/x86_64/lib64krb53-1.6.2-7.1mdv2008.0.x86_64.rpm\n 734b018e6b05204767d07a7d53ef2c3c 2008.0/x86_64/lib64krb53-devel-1.6.2-7.1mdv2008.0.x86_64.rpm\n 787fb5ea70eff84b91eea5d68c1e956d 2008.0/x86_64/telnet-client-krb5-1.6.2-7.1mdv2008.0.x86_64.rpm\n d6224c005bc7c818c117e3fc61643840 2008.0/x86_64/telnet-server-krb5-1.6.2-7.1mdv2008.0.x86_64.rpm \n cfd133fde8cc72b038ea61dc94405701 2008.0/SRPMS/krb5-1.6.2-7.1mdv2008.0.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n______________________________________________________________________________\n\n SUSE Security Announcement\n\n Package: krb5\n Announcement ID: SUSE-SA:2008:016\n Date: Wed, 19 Mar 2008 10:00:00 +0000\n Affected Products: SUSE LINUX 10.1\n openSUSE 10.2\n openSUSE 10.3\n SUSE Linux Enterprise Desktop 10 SP1\n SLE SDK 10 SP1\n SUSE Linux Enterprise Server 10 SP1\n Vulnerability Type: remote code execution\n Severity (1-10): 7\n SUSE Default Package: no\n Cross-References: CVE-2008-0062\n CVE-2008-0063\n CVE-2008-0947\n CVE-2008-0948\n\n Content of This Advisory:\n 1) Security Vulnerability Resolved:\n Problem Description\n 2) Solution or Work-Around\n 3) Special Instructions and Notes\n 4) Package Location and Checksums\n 5) Pending Vulnerabilities, Solutions, and Work-Arounds:\n 6) Authenticity Verification and Additional Information\n\n______________________________________________________________________________\n\n1) Problem Description and Brief Discussion\n\n The krb5 package is the implementation of the Kerberos protocol suite\n from MIT. \n This update fixes three vulnerabilities, two of them are only possible if\n krb4 support is enabled:\n - CVE-2008-0062: null/dangling pointer (krb4) \n - CVE-2008-0063: operations on uninitialized buffer content,\n possible information leak (krb4) \n - CVE-2008-0947/8: out-of-bound array\n access in kadmind\u0027s RPC lib\n\n2) Solution or Work-Around\n\n Please install the new packages. \n\n3) Special Instructions and Notes\n\n Please restart the kerberos services. \n\n4) Package Location and Checksums\n\n The preferred method for installing security updates is to use the YaST\n Online Update (YOU) tool. YOU detects which updates are required and\n automatically performs the necessary steps to verify and install them. \n Alternatively, download the update packages for your distribution manually\n and verify their integrity by the methods listed in Section 6 of this\n announcement. Then install the packages using the command\n\n rpm -Fhv \u003cfile.rpm\u003e\n\n to apply the update, replacing \u003cfile.rpm\u003e with the filename of the\n downloaded RPM package. \n\n \n x86 Platform:\n \n openSUSE 10.3:\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-1.6.2-22.4.i586.rpm\n 53f6c9b454e27c47ec4cb32679757c48\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-apps-clients-1.6.2-22.4.i586.rpm\n 66ee0e785595b000842c5cd2c9162c55\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-apps-servers-1.6.2-22.4.i586.rpm\n f3fba89b56860b8f46691c69bba8b3c7\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-client-1.6.2-22.4.i586.rpm\n 193a8298aa8bb866e19e0c48f23e523e\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-devel-1.6.2-22.4.i586.rpm\n a9b01b5c846e02c588664cddcae4c5c6\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-server-1.6.2-22.4.i586.rpm\n ff536136c01b5f900aebe6fdc1ec62e6\n \n openSUSE 10.2:\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-1.5.1-23.14.i586.rpm\n 5764e87b834c6a5b8a467fa6aa8ec40e\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-apps-clients-1.5.1-23.14.i586.rpm\n 94db70009c4c6e099a9807584c701686\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-apps-servers-1.5.1-23.14.i586.rpm\n 5881c8be92dc3eb215a1e837b6468922\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-client-1.5.1-23.14.i586.rpm\n c45980b430614c2371dd1ad4f8d21a34\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-devel-1.5.1-23.14.i586.rpm\n 1c6a45d60e5eabffedc2c1e3e755ac73\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-server-1.5.1-23.14.i586.rpm\n 03793b23aced1c01d9e2817648d7c777\n \n SUSE LINUX 10.1:\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-1.4.3-19.30.6.i586.rpm\n 51d1c53aaf25a36dd1e2e74662cbabd9\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-apps-clients-1.4.3-19.30.6.i586.rpm\n 6b4d89a932988685993dba1e87aea95f\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-apps-servers-1.4.3-19.30.6.i586.rpm\n c7ff44ef5a8453d5223da71d670fdea4\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-client-1.4.3-19.30.6.i586.rpm\n bc0456ed7708ee3ffdc2501e849e9dbe\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-devel-1.4.3-19.30.6.i586.rpm\n 9942cbbfd032ea80d8a20daa34ce5374\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-server-1.4.3-19.30.6.i586.rpm\n d4596d47caafa6ea4ee4b4f4e218f831\n \n Power PC Platform:\n \n openSUSE 10.3:\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-1.6.2-22.4.ppc.rpm\n f0d1399edebb3e1d715d84568065130a\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-apps-clients-1.6.2-22.4.ppc.rpm\n 8e444214994c1e7297b5332d96967ec0\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-apps-servers-1.6.2-22.4.ppc.rpm\n 2eecfe960c969bf3a3dcce2fcab010f0\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-client-1.6.2-22.4.ppc.rpm\n 8052a7d7a942545a46fa5e962c562ab8\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-devel-1.6.2-22.4.ppc.rpm\n 6a118f48123ebfc23715bf797bf8b7d0\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-server-1.6.2-22.4.ppc.rpm\n fd8f73d6d8757d9ce3dea43997b56b0c\n \n openSUSE 10.2:\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-1.5.1-23.14.ppc.rpm\n 04289bb24041d226f27eb92025b25463\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-apps-clients-1.5.1-23.14.ppc.rpm\n 731ea1ef473c0d1c8990a8045a9fe587\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-apps-servers-1.5.1-23.14.ppc.rpm\n f911f86a0d2e8c9da16930525bd8b163\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-client-1.5.1-23.14.ppc.rpm\n a4c560015bbaddcbc88603e1e194146e\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-devel-1.5.1-23.14.ppc.rpm\n 64d0f163ebff972f2e70c6cc4d760555\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-server-1.5.1-23.14.ppc.rpm\n 8b06dc5e5ac5b3fa410559017403378a\n \n SUSE LINUX 10.1:\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-1.4.3-19.30.6.ppc.rpm\n ae1652f3ea622c5c91b0fd1d47b066ef\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-apps-clients-1.4.3-19.30.6.ppc.rpm\n a389841f387e37732c80d9d5095f9ae6\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-apps-servers-1.4.3-19.30.6.ppc.rpm\n cb6b4e402570e45767c5ae7a5c26e34c\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-client-1.4.3-19.30.6.ppc.rpm\n 3a2c13bc932e84f7a451f3a2c77c99f0\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-devel-1.4.3-19.30.6.ppc.rpm\n b34f9511e269e0dfc2896ac88cf41cce\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-server-1.4.3-19.30.6.ppc.rpm\n 0263cbb8f0f41e50dacfed082eca0835\n \n x86-64 Platform:\n \n openSUSE 10.3:\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-1.6.2-22.4.x86_64.rpm\n 6df39c9ddfb04cd4889b5f4bb271213a\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-32bit-1.6.2-22.4.x86_64.rpm\n 77ba221640964cc90ad8e0010ad5c07e\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-apps-clients-1.6.2-22.4.x86_64.rpm\n fccb50e18045baa2c78165f20eb13eec\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-apps-servers-1.6.2-22.4.x86_64.rpm\n 3bfd6270a31f2a6a35728bcd274ae327\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-client-1.6.2-22.4.x86_64.rpm\n 53b3634e9e92255b62a932ed6d30742d\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-devel-1.6.2-22.4.x86_64.rpm\n 54071b2e12004117b0599f53c4a6027b\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-devel-32bit-1.6.2-22.4.x86_64.rpm\n 07069062d1e7b140c6774cc2aaa821d5\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-server-1.6.2-22.4.x86_64.rpm\n b07d395220662db193b6f54753931ccc\n \n openSUSE 10.2:\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-1.5.1-23.14.x86_64.rpm\n 3f2d8918cf5da2cab839bf2c72af1495\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-32bit-1.5.1-23.14.x86_64.rpm\n 4348a17ec69b6c64c69e11f74fa88a08\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-apps-clients-1.5.1-23.14.x86_64.rpm\n 433ffcced3ede0163628854ae3296baf\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-apps-servers-1.5.1-23.14.x86_64.rpm\n c24ab880f1314c1d25f3e9561b204c10\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-client-1.5.1-23.14.x86_64.rpm\n 6022c2534c50718a2a4fd18fde346daf\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-devel-1.5.1-23.14.x86_64.rpm\n d82a0204e6e0f5e9d6bcd8f60aa4fbde\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-devel-32bit-1.5.1-23.14.x86_64.rpm\n 17dc2896ebc7f252e39fc8e23a41abc1\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-server-1.5.1-23.14.x86_64.rpm\n 45596c22ec6d0c1eebf42f683e4e0cd4\n \n SUSE LINUX 10.1:\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-1.4.3-19.30.6.x86_64.rpm\n 684c7d1363494a7854afd3755bdb2a20\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-32bit-1.4.3-19.30.6.x86_64.rpm\n b8552a99f0785f1eee434f6d7293731a\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-apps-clients-1.4.3-19.30.6.x86_64.rpm\n 060fac873ba1bc13e4b5b813ae6a6cd2\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-apps-servers-1.4.3-19.30.6.x86_64.rpm\n 28235a5328a8a982e2a1784793a17863\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-client-1.4.3-19.30.6.x86_64.rpm\n 056f5e479561d2b831e3dd969261f8de\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-devel-1.4.3-19.30.6.x86_64.rpm\n d81c85af0ca1812c273bbd1c6ddf3cb1\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-devel-32bit-1.4.3-19.30.6.x86_64.rpm\n d17b2d40649a83e28afd6a7a3dec96d6\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-server-1.4.3-19.30.6.x86_64.rpm\n dd8096c153fb51bdd67352cbe8a51953\n \n Sources:\n \n openSUSE 10.3:\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/krb5-1.6.2-22.4.src.rpm\n 6ead1c530f58e6255b1c9ba1b78eb3ae\n \n openSUSE 10.2:\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/krb5-1.5.1-23.14.src.rpm\n add4417c6743a6dd26f35182e85ee956\n \n SUSE LINUX 10.1:\n ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/krb5-1.4.3-19.30.6.src.rpm\n 2185d5b60fe733640f16a3a561ec6888\n \n Our maintenance customers are notified individually. The packages are\n offered for installation from the maintenance web:\n \n SUSE Linux Enterprise Server 10 SP1\n http://support.novell.com/techcenter/psdb/a1cba9b24d53ae5d2b80a81acd449edb.html\n \n SLE SDK 10 SP1\n http://support.novell.com/techcenter/psdb/a1cba9b24d53ae5d2b80a81acd449edb.html\n \n SUSE Linux Enterprise Desktop 10 SP1\n http://support.novell.com/techcenter/psdb/a1cba9b24d53ae5d2b80a81acd449edb.html\n\n______________________________________________________________________________\n\n5) Pending Vulnerabilities, Solutions, and Work-Arounds:\n\n Please read our weekly security report. \n______________________________________________________________________________\n\n6) Authenticity Verification and Additional Information\n\n - Announcement authenticity verification:\n\n SUSE security announcements are published via mailing lists and on Web\n sites. The authenticity and integrity of a SUSE security announcement is\n guaranteed by a cryptographic signature in each announcement. All SUSE\n security announcements are published with a valid signature. \n\n To verify the signature of the announcement, save it as text into a file\n and run the command\n\n gpg --verify \u003cfile\u003e\n\n replacing \u003cfile\u003e with the name of the file where you saved the\n announcement. The output for a valid signature looks like:\n\n gpg: Signature made \u003cDATE\u003e using RSA key ID 3D25D3D9\n gpg: Good signature from \"SuSE Security Team \u003csecurity@suse.de\u003e\"\n\n where \u003cDATE\u003e is replaced by the date the document was signed. \n\n If the security team\u0027s key is not contained in your key ring, you can\n import it from the first installation CD. To import the key, use the\n command\n\n gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc\n\n - Package authenticity verification:\n\n SUSE update packages are available on many mirror FTP servers all over the\n world. While this service is considered valuable and important to the free\n and open source software community, the authenticity and the integrity of\n a package needs to be verified to ensure that it has not been tampered\n with. \n\n There are two verification methods that can be used independently from\n each other to prove the authenticity of a downloaded file or RPM package:\n\n 1) Using the internal gpg signatures of the rpm package\n 2) MD5 checksums as provided in this announcement\n\n 1) The internal rpm package signatures provide an easy way to verify the\n authenticity of an RPM package. Use the command\n\n rpm -v --checksig \u003cfile.rpm\u003e\n\n to verify the signature of the package, replacing \u003cfile.rpm\u003e with the\n filename of the RPM package downloaded. The package is unmodified if it\n contains a valid signature from build@suse.de with the key ID 9C800ACA. \n\n This key is automatically imported into the RPM database (on\n RPMv4-based distributions) and the gpg key ring of \u0027root\u0027 during\n installation. You can also find it on the first installation CD and at\n the end of this announcement. \n\n 2) If you need an alternative means of verification, use the md5sum\n command to verify the authenticity of the packages. Execute the command\n\n md5sum \u003cfilename.rpm\u003e\n\n after you downloaded the file from a SUSE FTP server or its mirrors. \n Then compare the resulting md5sum with the one that is listed in the\n SUSE security announcement. Because the announcement containing the\n checksums is cryptographically signed (by security@suse.de), the\n checksums show proof of the authenticity of the package if the\n signature of the announcement is valid. Note that the md5 sums\n published in the SUSE Security Announcements are valid for the\n respective packages only. Newer versions of these packages cannot be\n verified. \n\n - SUSE runs two security mailing lists to which any interested party may\n subscribe:\n\n opensuse-security@opensuse.org\n - General Linux and SUSE security discussion. \n All SUSE security announcements are sent to this list. \n To subscribe, send an e-mail to\n \u003copensuse-security+subscribe@opensuse.org\u003e. \n\n opensuse-security-announce@opensuse.org\n - SUSE\u0027s announce-only mailing list. \n Only SUSE\u0027s security announcements are sent to this list. \n To subscribe, send an e-mail to\n \u003copensuse-security-announce+subscribe@opensuse.org\u003e. \n\n =====================================================================\n SUSE\u0027s security contact is \u003csecurity@suse.com\u003e or \u003csecurity@suse.de\u003e. \n The \u003csecurity@suse.de\u003e public key is listed below. \n =====================================================================\n______________________________________________________________________________\n\n The information in this advisory may be distributed or reproduced,\n provided that the advisory is not modified in any way. In particular, the\n clear text signature should show proof of the authenticity of the text. \n\n SUSE Linux Products GmbH provides no warranties of any kind whatsoever\n with respect to the information contained in this security advisory. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n- -------------------------------------------------------------------\n VMware Security Advisory\n\nAdvisory ID: VMSA-2008-0009\nSynopsis: Updates to VMware Workstation, VMware Player,\n VMware ACE, VMware Fusion, VMware Server, VMware\n VIX API, VMware ESX, VMware ESXi resolve critical\n security issues\nIssue date: 2008-06-04\nUpdated on: 2008-06-04 (initial release of advisory)\nCVE numbers: CVE-2007-5671 CVE-2008-0967 CVE-2008-2097\n CVE-2008-2100 CVE-2006-1721 CVE-2008-0553\n CVE-2007-5378 CVE-2007-4772 CVE-2008-0888\n CVE-2008-0062 CVE-2008-0063 CVE-2008-0948\n- -------------------------------------------------------------------\n\n1. Summary:\n\n Several critical security vulnerabilities have been addressed\n in patches in ESX and in the newest releases of VMware\u0027s hosted\n product line. \n\n2. Relevant releases:\n\n VMware Workstation 6.0.3 and earlier,\n VMware Workstation 5.5.6 and earlier,\n VMware Player 2.0.3 and earlier,\n VMware Player 1.0.6 and earlier,\n VMware ACE 2.0.3 and earlier,\n VMware ACE 1.0.5 and earlier,\n VMware Server 1.0.5 and earlier,\n VMware Fusion 1.1.1 and earlier\n\n VMware ESXi 3.5 without patches ESXe350-200805501-I-SG,\n ESXe350-200805502-T-SG,\n ESXe350-200805503-C-SG\n\n VMware ESX 3.5 without patches ESX350-200805515-SG, ESX350-200805508-SG,\n ESX350-200805501-BG, ESX350-200805504-SG,\n ESX350-200805506-SG, ESX350-200805505-SG,\n ESX350-200805507-SG\n\n VMware ESX 3.0.2 without patches ESX-1004727, ESX-1004821, ESX-1004216,\n ESX-1004726, ESX-1004722, ESX-1004724,\n ESX-1004719, ESX-1004219\n\n VMware ESX 3.0.1 without patches ESX-1004186, ESX-1004728, ESX-1004725,\n ESX-1004721, ESX-1004723, ESX-1004190,\n ESX-1004189\n\n VMware ESX 2.5.5 without update patch 8\n VMware ESX 2.5.4 without update patch 19\n\nNOTES: Hosted products VMware Workstation 5.x, VMware Player 1.x,\n and VMware ACE 1.x will reach end of general support\n 2008-11-09. Customers should plan to upgrade to the latest\n version of their respective products. \n\n ESX 3.0.1 is in Extended Support and its end of extended\n support (Security and Bug fixes) is 2008-07-31. Users should plan\n to upgrade to at least 3.0.2 update 1 and preferably the newest\n release available before the end of extended support. \n\n ESX 2.5.4 is in Extended Support and its end of extended support\n (Security and Bug fixes) is 2008-10-08. Users should plan to upgrade\n to at least 2.5.5 and preferably the newest release available before\n the end of extended support. \n\n3. Problem description:\n\n a. VMware Tools Local Privilege Escalation on Windows-based guest OS\n\n The VMware Tools Package provides support required for shared folders\n (HGFS) and other features. \n\n An input validation error is present in the Windows-based VMware\n HGFS.sys driver. Exploitation of this flaw might result in\n arbitrary code execution on the guest system by an unprivileged\n guest user. It doesn\u0027t matter on what host the Windows guest OS\n is running, as this is a guest driver vulnerability and not a\n vulnerability on the host. \n\n The HGFS.sys driver is present in the guest operating system if the\n VMware Tools package is loaded. Even if the host has HGFS disabled\n and has no shared folders, Windows-based guests may be affected. This\n is regardless if a host supports HGFS. \n\n This issue could be mitigated by removing the VMware Tools package\n from Windows based guests. However this is not recommended as it\n would impact usability of the product. \n\n NOTE: Installing the new hosted release or ESX patches will not\n remediate the issue. The VMware Tools packages will need\n to be updated on each Windows-based guest followed by a\n reboot of the guest system. \n\n VMware would like to thank iDefense and Stephen Fewer of Harmony\n Security for reporting this issue to us. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the name CVE-2007-5671 to this issue. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============ ======== ======= =================\n Workstation 6.x Windows not affected\n Workstation 6.x Linux not affected\n Workstation 5.x Windows 5.5.6 build 80404 or later\n Workstation 5.x Linux 5.5.6 build 80404 or later\n\n Player 2.x Windows not affected\n Player 2.x Linux not affected\n Player 1.x Windows 1.0.6 build 80404 or later\n Player 1.x Linux 1.0.6 build 80404 or later\n\n ACE 2.x Windows not affected\n ACE 1.x Windows 1.0.5 build 79846 or later\n\n Server 1.x Windows 1.0.5 build 80187 or later\n Server 1.x Linux 1.0.5 build 80187 or later\n\n Fusion 1.x Mac OS/X not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX not affected\n ESX 3.0.2 ESX ESX-1004727\n ESX 3.0.1 ESX ESX-1004186\n ESX 2.5.5 ESX ESX 2.5.5 upgrade patch 5 or later\n ESX 2.5.4 ESX ESX 2.5.4 upgrade patch 16 or later\n\n\n b. Privilege escalation on ESX or Linux based hosted operating systems\n\n This update fixes a security issue related to local exploitation of\n an untrusted library path vulnerability in vmware-authd. In order to\n exploit this vulnerability, an attacker must have local access and\n the ability to execute the set-uid vmware-authd binary on an affected\n system. Exploitation of this flaw might result in arbitrary code\n execution on the Linux host system by an unprivileged user. \n\n VMware would like to thank iDefense for reporting this issue to us. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the name CVE-2008-0967 to this issue. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============ ======== ======= =================\n Workstation 6.x Windows not affected\n Workstation 6.x Linux 6.0.4 build 93057\n Workstation 5.x Windows not affected\n Workstation 5.x Linux 5.5.7 build 91707\n\n Player 2.x Windows not affected\n Player 2.x Linux 2.0.4 build 93057\n Player 1.x Windows not affected\n Player 1.x Linux 1.0.7 build 91707\n\n ACE 2.x Windows not affected\n ACE 1.x Windows not affected\n\n Server 1.x Windows not affected\n Server 1.x Linux 1.0.6 build 91891\n\n Fusion 1.x Mac OS/X not affected\n\n ESXi 3.5 ESXi ESXe350-200805501-I-SG\n\n ESX 3.5 ESX ESX350-200805515-SG\n ESX 3.0.2 ESX ESX-1004821\n ESX 3.0.1 ESX ESX-1004728\n ESX 2.5.5 ESX ESX 2.5.5 update patch 8\n ESX 2.5.4 ESX ESX 2.5.4 update patch 19\n\n c. Openwsman Invalid Content-Length Vulnerability\n\n Openwsman is a system management platform that implements the Web\n Services Management protocol (WS-Management). It is installed and\n running by default. It is used in the VMware Management Service\n Console and in ESXi. \n\n The openwsman management service on ESX 3.5 and ESXi 3.5 is vulnerable\n to a privilege escalation vulnerability, which may allow users with\n non-privileged ESX or Virtual Center accounts to gain root privileges. \n\n To exploit this vulnerability, an attacker would need a local ESX\n account or a VirtualCenter account with the Host.Cim.CimInteraction\n permission. \n\n Systems with no local ESX accounts and no VirtualCenter accounts with\n the Host.Cim.CimInteraction permission are not vulnerable. \n\n This vulnerability cannot be exploited by users without valid login\n credentials. \n\n Discovery: Alexander Sotirov, VMware Security Research\n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the name CVE-2008-2097 to this issue. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============ ======== ======= =================\n hosted any any not affected\n\n ESXi 3.5 ESXi ESXe350-200805501-I-SG\n\n ESX 3.5 ESX ESX350-200805508-SG\n ESX 3.0.2 ESX not affected\n ESX 3.0.1 ESX not affected\n ESX 2.5.5 ESX not affected\n ESX 2.5.4 ESX not affected\n\n NOTE: VMware hosted products are not affected by this issue. \n\n d. VMware VIX Application Programming Interface (API) Memory Overflow\nVulnerabilities\n\n The VIX API (also known as \"Vix\") is an API that lets users write scripts\n and programs to manipulate virtual machines. \n\n Multiple buffer overflow vulnerabilities are present in the VIX API. \n Exploitation of these vulnerabilities might result in code execution on\n the host system or on the service console in ESX Server from the guest\n operating system. \n\n The VIX API can be enabled and disabled using the \"vix.inGuest.enable\"\n setting in the VMware configuration file. This default value for this\n setting is \"disabled\". This configuration setting is present in the\n following products:\n VMware Workstation 6.0.2 and higher\n VMware ACE 6.0.2 and higher\n VMware Server 1.06 and higher\n VMware Fusion 1.1.2 and higher\n ESX Server 3.0 and higher\n ESX Server 3.5 and higher\n In previous versions of VMware products where the VIX API was introduced,\n the VIX API couldn\u0027t be disabled. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the name CVE-2008-2100 to this issue. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============ ======== ======= =================\n VIX API 1.1.x Windows VMware-vix-1.1.4-93057.exe\n VIX API 1.1.x Linux VMware-vix-1.1.4-93057.i386.tar.gz\n VIX API 1.1.x Linux64 VMware-vix-1.1.4-93057.x86_64.tar.gz\n\n Workstation 6.x Windows 6.0.4 build 93057\n Workstation 6.x Linux 6.0.4 build 93057\n Workstation 5.x Windows 5.5.7 build 91707\n Workstation 5.x Linux 5.5.7 build 91707\n\n Player 2.x Windows 2.0.4 build 93057\n Player 2.x Linux 2.0.4 build 93057\n Player 1.x Windows 1.0.6 build 91707\n Player 1.x Linux 1.0.6 build 91707\n\n ACE 2.x Windows 2.0.4 build 93057\n ACE 1.x Windows not affected\n\n Server 1.x Windows 1.0.6 build 91891\n Server 1.x Linux 1.0.6 build 91891\n\n Fusion 1.x Mac OS/X 1.1.2 build 87978 or later\n\n ESXi 3.5 ESXi ESXe350-200805501-I-SG,\n ESXe350-200805502-T-SG\n\n ESX 3.5 ESX ESX350-200805501-BG\n ESX 3.0.2 ESX ESX-1004216, ESX-1004726, ESX-1004727\n ESX 3.0.1 ESX ESX-1004186, ESX-1004725\n ESX 2.5.5 ESX not affected\n ESX 2.5.4 ESX not affected\n\n\nII Service Console rpm updates\n\n NOTE: ESXi and hosted products are not affected by any service console\n security updates\n\n a. Security update for cyrus-sasl\n\n Updated cyrus-sasl package for the ESX Service Console corrects a security\n issue found in the DIGEST-MD5 authentication mechanism of Cyrus\u0027\n implementation of Simple Authentication and Security Layer (SASL). \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the name CVE-2006-1721 to this issue. \n\n RPMs Updated:\n cyrus-sasl-2.1.15-15.i386.rpm\n cyrus-sasl-md5-2.1.15-1.i386.rpm\n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============ ======== ======= =================\n hosted any any not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX ESX350-200805504-SG\n ESX 3.0.2 ESX ESX-1004722\n ESX 3.0.1 ESX ESX-1004721\n ESX 2.5.5 ESX not affected\n ESX 2.5.4 ESX not affected\n\n b. Security update for tcltk\n\n An input validation flaw was discovered in Tk\u0027s GIF image handling. A\n code-size value read from a GIF image was not properly validated before\n being used, leading to a buffer overflow. A specially crafted GIF file\n could use this to cause a crash or, potentially, execute code with the\n privileges of the application using the Tk graphical toolkit. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the name CVE-2008-0553 to this issue. \n\n A buffer overflow flaw was discovered in Tk\u0027s animated GIF image handling. \n An animated GIF containing an initial image smaller than subsequent images\n could cause a crash or, potentially, execute code with the privileges of\n the application using the Tk library. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the name CVE-2007-5378 to this issue. \n\n A flaw first discovered in the Tcl regular expression engine used in the\n PostgreSQL database server, resulted in an infinite loop when processing\n certain regular expressions. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the name CVE-2007-4772 to this issue. \n\n RPM Updated:\n tcl-8.3.5-92.8.i386.rpm\n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============ ======== ======= =================\n hosted any any not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX ESX350-200805506-SG\n ESX 3.0.2 ESX ESX-1004724\n ESX 3.0.1 ESX ESX-1004723\n ESX 2.5.5 ESX ESX 2.5.5 Upgrade Patch 8\n ESX 2.5.4 ESX ESX 2.5.4 Upgrade Patch 19\n\n c. Security update for unzip\n\n This patch includes a moderate security update to the service console that\n fixes a flaw in unzip. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the name CVE-2008-0888 to this issue. \n\n RPM Updated:\n Unzip-5.50-36.EL3.i386.rpm\n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============ ======== ======= =================\n hosted any any not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX ESX350-200805505-SG\n ESX 3.0.2 ESX ESX-1004719\n ESX 3.0.1 ESX ESX-1004190\n ESX 2.5.5 ESX ESX 2.5.5 Upgrade Patch 8\n ESX 2.5.4 ESX ESX 2.5.4 Upgrade Patch 19\n\n d. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the name CVE-2008-0062 to this issue. \n\n NOTE: ESX doesn\u0027t contain the krb5kdc binary and is not vulnerable\n to this issue. \n\n NOTE: ESX doesn\u0027t contain the krb5kdc binary and is not vulnerable\n to this issue. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the name CVE-2008-0948 to this issue. \n\n RPM Updated:\n krb5-libs-1.2.7-68.i386.rpm\n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============ ======== ======= =================\n hosted any any not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX ESX350-200805507-SG\n ESX 3.0.2 ESX ESX-1004219\n ESX 3.0.1 ESX ESX-1004189\n ESX 2.5.5 ESX ESX 2.5.5 Upgrade Patch 8\n ESX 2.5.4 ESX ESX 2.5.4 Upgrade Patch 19\n\n4. Solution:\n\nPlease review the release notes for your product and version and verify the\nmd5sum of your downloaded file. \n\n VMware Workstation 6.0.4\n ------------------------\n http://www.vmware.com/download/ws/\n Release notes:\n http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html\n\n Windows binary\n md5sum: f50a05831e94c19d98f363c752fca5f9\n\n RPM Installation file for 32-bit Linux\n md5sum: e7793b14b995d3b505f093c84e849421\n\n tar Installation file for 32-bit Linux\n md5sum: a0a8e1d8188f4be03357872a57a767ab\n\n RPM Installation file for 64-bit Linux\n md5sum: 960d753038a268b8f101f4b853c0257e\n\n tar Installation file for 64-bit Linux\n md5sum: 4697ec8a9d6c1152d785f3b77db9d539\n\n VMware Workstation 5.5.7\n ------------------------\n http://www.vmware.com/download/ws/ws5.html\n Release notes:\n http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html\n\n Windows binary:\n md5sum: 4c6a6653b7296240197aac048591c659\n\n Compressed Tar archive for 32-bit Linux\n md5sum: 8fc15d72031489cf5cd5d47b966787e6\n\n Linux RPM version for 32-bit Linux\n md5sum: f0872fe447ac654a583af16b2f4bba3f\n\n\n VMware Player 2.0.4 and 1.0.7\n -----------------------------\n http://www.vmware.com/download/player/\n Release notes Player 1.x:\n http://www.vmware.com/support/player/doc/releasenotes_player.html\n Release notes Player 2.0\n http://www.vmware.com/support/player2/doc/releasenotes_player2.html\n\n 2.0.4 Windows binary\n md5sum: a117664a8bfa7336b846117e5fc048dd\n\n VMware Player 2.0.4 for Linux (.rpm)\n md5sum: de6ab6364a0966b68eadda2003561cd2\n\n VMware Player 2.0.4 for Linux (.tar)\n md5sum: 9e1c2bfda6b22a3fc195a86aec11903a\n\n VMware Player 2.0.4 - 64-bit (.rpm)\n md5sum: 997e5ceffe72f9ce9146071144dacafa\n\n VMware Player 2.0.4 - 64-bit (.tar)\n md5sum: 18eb4ee49dd7e33ec155ef69d7d259ef\n\n 1.0.7 Windows binary\n md5sum: 51114b3b433dc1b3bf3e434aebbf2b9c\n\n Player 1.0.7 for Linux (.rpm)\n md5sum: 3b5f97a37df3b984297fa595a5cdba9c\n\n Player 1.0.7 for Linux (.tar)\n md5sum: b755739144944071492a16fa20f86a51\n\n\n VMware ACE\n ----------\n http://www.vmware.com/download/ace/\n Release notes 2.0:\n http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html\n\n VMware-workstation-6.0.4-93057.exe\n md5sum: f50a05831e94c19d98f363c752fca5f9\n\n VMware-ACE-Management-Server-Appliance-2.0.4-93057.zip\n md5sum: d2ae2246f3d87268cf84c1421d94e86c\n\n VMware-ACE-Management-Server-2.0.4-93057.exe\n md5sum: 41b31b3392d5da2cef77a7bb28654dbf\n\n VMware-ACE-Management-Server-2.0.4-93057.i386-rhel4.rpm\n md5sum: 9920be4c33773df53a1728b41af4b109\n\n VMware-ACE-Management-Server-2.0.4-93057.i386-sles9.rpm\n md5sum: 4ec4c37203db863e8844460b5e80920b\n\n Release notes 1.x:\n http://www.vmware.com/support/ace/doc/releasenotes_ace.html\n\n VMware-ACE-1.0.6-89199.exe\n md5sum: 110f6e24842a0d154d9ec55ef9225f4f\n\n\n VMware Server 1.0.6\n -------------------\n http://www.vmware.com/download/server/\n Release notes:\n http://www.vmware.com/support/server/doc/releasenotes_server.html\n\n VMware Server for Windows 32-bit and 64-bit\n md5sum: 3e00d5cfae123d875e4298bddabf12f5\n\n VMware Server Windows client package\n md5sum: 64f3fc1b4520626ae465237d7ec4773e\n\n VMware Server for Linux\n md5sum: 46ea876bfb018edb6602a921f6597245\n\n VMware Server for Linux rpm\n md5sum: 9d2f0af908aba443ef80bec8f7ef3485\n\n Management Interface\n md5sum: 1b3daabbbb49a036fe49f53f812ef64b\n\n VMware Server Linux client package\n md5sum: 185e5b174659f366fcb38b1c4ad8d3c6\n\n\n VMware Fusion 1.1.3\n --------------\n http://www.vmware.com/download/fusion/\n Release notes:\n http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html\n md5sum: D15A3DFD3E7B11FC37AC684586086D\n\n\n VMware VIX 1.1.4\n ----------------\n http://www.vmware.com/support/developer/vix-api/\n Release notes:\n http://www.vmware.com/support/pubs/vix-api/VIXAPI-1.1.4-Release-Notes.html\n VMware-vix-1.1.4-93057.exe\n md5sum: 2efb74618c7ead627ecb3b3033e3f9f6\n\n VMware-vix-1.1.4-93057.i386.tar.gz\n md5sum: 988df2b2bbc975a6fc11f27ad1519832\n\n VMware-vix-1.1.4-93057.x86_64.tar.gz\n md5sum: a64f951c6fb5b2795a29a5a7607059c0\n\n\n ESXi\n ----\n VMware ESXi 3.5 patch ESXe350-200805501-O-SG (authd, openwsman, VIX)\n http://download3.vmware.com/software/esx/ESXe350-200805501-O-SG.zip\n md5sum: 4ce06985d520e94243db1e0504a56d8c\n http://kb.vmware.com/kb/1005073\n http://kb.vmware.com/kb/1004173\n http://kb.vmware.com/kb/1004172\n\n NOTE: ESXe350-200805501-O-SG contains the following patch bundles:\n ESXe350-200805501-I-SG, ESXe350-200805502-T-SG,\n ESXe350-200805503-C-SG\n\n\n ESX\n ---\n VMware ESX 3.5 patch ESX350-200805515-SG (authd)\n http://download3.vmware.com/software/esx/ESX350-200805515-SG.zip\n md5sum: 324b50ade230bcd5079a76e3636163c5\n http://kb.vmware.com/kb/1004170\n\n VMware ESX 3.5 patch ESX350-200805508-SG (openwsman)\n http://download3.vmware.com/software/esx/ESX350-200805508-SG.zip\n md5sum: 3ff8c06d4a9dd406f64f89c51bf26d12\n http://kb.vmware.com/kb/1004644\n\n VMware ESX 3.5 patch ESX350-200805501-BG (VIX)\n http://download3.vmware.com/software/esx/ESX350-200805501-BG.zip\n md5sum: 31a620aa249c593c30015b5b6f8c8650\n http://kb.vmware.com/kb/1004637\n\n VMware ESX 3.5 patch ESX350-200805504-SG (cyrus-sasl)\n http://download3.vmware.com/software/esx/ESX350-200805504-SG.zip\n md5sum: 4c1b1a8dcb09a636b55c64c290f7de51\n http://kb.vmware.com/kb/1004640\n\n VMware ESX 3.5 patch ESX350-200805506-SG (tcltk)\n http://download3.vmware.com/software/esx/ESX350-200805506-SG.zip\n md5sum: af279eef8fdeddb7808630da1ae717b1\n http://kb.vmware.com/kb/1004642\n\n VMware ESX 3.5 patch ESX350-200805505-SG (unzip)\n http://download3.vmware.com/software/esx/ESX350-200805505-SG.zip\n md5sum: 07af82d9fd97cccb89d9b90c6ecc41c6\n http://kb.vmware.com/kb/1004641\n\n VMware ESX 3.5 patch ESX350-200805507-SG (krb5)\n http://download3.vmware.com/software/esx/ESX350-200805507-SG.zip\n md5sum: 5d35a1c470daf13c9f4df5bdc9438748\n http://kb.vmware.com/kb/1004643\n\n VMware ESX 3.0.2 patch ESX-1004727 (HGFS,VIX)\n http://download3.vmware.com/software/vi/ESX-1004727.tgz\n md5sum: 31a67b0fa3449747887945f8d370f19e\n http://kb.vmware.com/kb/1004727\n\n VMware ESX 3.0.2 patch ESX-1004821 (authd)\n http://download3.vmware.com/software/vi/ESX-1004821.tgz\n md5sum: 5c147bedd07245c903d44257522aeba1\n http://kb.vmware.com/kb/1004821\n\n VMware ESX 3.0.2 patch ESX-1004216 (VIX)\n http://download3.vmware.com/software/vi/ESX-1004216.tgz\n md5sum: 0784ef70420d28a9a5d6113769f6669a\n http://kb.vmware.com/kb/1004216\n\n VMware ESX 3.0.2 patch ESX-1004726 (VIX)\n http://download3.vmware.com/software/vi/ESX-1004726.tgz\n md5sum: 44f03b274867b534cd274ccdf4630b86\n http://kb.vmware.com/kb/1004726\n\n VMware ESX 3.0.2 patch ESX-1004722 (cyrus-sasl)\n http://download3.vmware.com/software/vi/ESX-1004722.tgz\n md5sum: 99dc71aed5bab7711f573b6d322123d6\n http://kb.vmware.com/kb/1004722\n\n VMware ESX 3.0.2 patch ESX-1004724 (tcltk)\n http://download3.vmware.com/software/vi/ESX-1004724.tgz\n md5sum: fd9a160ca7baa5fc443f2adc8120ecf7\n http://kb.vmware.com/kb/1004724\n\n VMware ESX 3.0.2 patch ESX-1004719 (unzip)\n http://download3.vmware.com/software/vi/ESX-1004719.tgz\n md5sum: f0c37b9f6be3399536d60f6c6944de82\n http://kb.vmware.com/kb/1004719\n\n VMware ESX 3.0.2 patch ESX-1004219 (krb5)\n http://download3.vmware.com/software/vi/ESX-1004219.tgz\n md5sum: 7c68279762f407a7a5ee151a650ebfd4\n http://kb.vmware.com/kb/1004219\n\n VMware ESX 3.0.1 patch ESX-1004186 (HGFS,VIX)\n http://download3.vmware.com/software/vi/ESX-1004186.tgz\n md5sum: f64389a8b97718eccefadce1a14d1198\n http://kb.vmware.com/kb/1004186\n\n VMware ESX 3.0.1 patch ESX-1004728 (authd)\n http://download3.vmware.com/software/vi/ESX-1004728.tgz\n md5sum: 1f01bb819805b855ffa2ec1040eff5ca\n http://kb.vmware.com/kb/1004728\n\n VMware ESX 3.0.1 patch ESX-1004725 (VIX)\n http://download3.vmware.com/software/vi/ESX-1004725.tgz\n md5sum: 9fafb04c6d3f6959e623832f539d2dc8\n http://kb.vmware.com/kb/1004725\n\n VMware ESX 3.0.1 patch ESX-1004721 (cyrus-sasl)\n http://download3.vmware.com/software/vi/ESX-1004721.tgz\n md5sum: 48190819b0f5afddefcb8d209d12b585\n http://kb.vmware.com/kb/1004721\n\n VMware ESX 3.0.1 patch ESX-1004723 (tcltk)\n http://download3.vmware.com/software/vi/ESX-1004723.tgz\n md5sum: c34ca0a5886e0c0917a93a97c331fd7d\n http://kb.vmware.com/kb/1004723\n\n VMware ESX 3.0.1 patch ESX-1004190 (unzip)\n http://download3.vmware.com/software/vi/ESX-1004190.tgz\n md5sum: 05187b9f534048c79c62741367cc0dd2\n http://kb.vmware.com/kb/1004190\n\n VMware ESX 3.0.1 patch ESX-1004189 (krb5)\n http://download3.vmware.com/software/vi/ESX-1004189.tgz\n md5sum: 21b620530b99009f469c872e73a439e8\n http://kb.vmware.com/kb/1004189\n\n VMware ESX 2.5.5 Upgrade Patch 8\n http://download3.vmware.com/software/esx/esx-2.5.5-90521-upgrade.tar.gz\n md5sum: 392b6947fc3600ca0e8e7788cd5bbb6e\n http://vmware.com/support/esx25/doc/esx-255-200805-patch.html\n\n VMware ESX 2.5.4 Upgrade Patch 19\n http://download3.vmware.com/software/esx/esx-2.5.4-90520-upgrade.tar.gz\n md5sum: 442788fd0bccb0d994c75b268bd12760\n http://vmware.com/support/esx25/doc/esx-254-200805-patch.html\n\n5. References:\n\n CVE numbers\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5671\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0967\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2097\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2100\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1721\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0553\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5378\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0948\n\n6. Change log:\n\n2008-06-04 VMSA-2008-0009 Initial release\n\n- -------------------------------------------------------------------\n7. Contact:\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n * security-announce@lists.vmware.com\n * bugtraq@securityfocus.com\n * full-disclosure@lists.grok.org.uk\n\nE-mail: security@vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Center\nhttp://www.vmware.com/security\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2008 VMware Inc. All rights reserved. \n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.7 (GNU/Linux)\n\niD8DBQFIRs08S2KysvBH1xkRCMxFAJ0WJX76quFzCV+avwupq3Lu72UKigCfRftj\nCZvxoXw/sZxDCSDjVzYAhrA=\n=s04s\n-----END PGP SIGNATURE-----\n. \n\nII. \n\nIII. Solution\n\nInstall updates from your vendor\n\n Check with your vendors for patches or updates. For information about\n a vendor, please see the systems affected section in vulnerability\n notes VU#895609 and VU#374121 or contact your vendor directly. \n Administrators who compile MIT Kerberos from source should refer to\n MIT Security Advisory 2008-002 for more information. \n\nIV. References\n\n * US-CERT Vulnerability Note VU#895609 -\n \u003chttp://www.kb.cert.org/vuls/id/895609\u003e\n \n * US-CERT Vulnerability Note VU#374121 -\n \u003chttp://www.kb.cert.org/vuls/id/374121\u003e\n \n * MIT krb5 Security Advisory 2008-002 -\n \u003chttp://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt2\u003e\n\n _________________________________________________________________\n\n The most recent version of this document can be found at:\n\n \u003chttp://www.us-cert.gov/cas/techalerts/TA08-079B.html\u003e\n _________________________________________________________________\n\n Feedback can be directed to US-CERT Technical Staff. \n _________________________________________________________________\n\n Produced 2008 by US-CERT, a government organization. \n\nBackground\n==========\n\nMIT Kerberos 5 is a suite of applications that implement the Kerberos\nnetwork protocol. kadmind is the MIT Kerberos 5 administration daemon,\nKDC is the Key Distribution Center. \n\n* Jeff Altman (Secure Endpoints) discovered a buffer overflow in the\n RPC library server code, used in the kadmin server, caused when too\n many file descriptors are opened (CVE-2008-0947). \n\n* Venustech AD-LAB discovered multiple vulnerabilities in the GSSAPI\n library: usage of a freed variable in the gss_indicate_mechs()\n function (CVE-2007-5901) and a double free() vulnerability in the\n gss_krb5int_make_seal_token_v3() function (CVE-2007-5971). These bugs can only be triggered when Kerberos 4 support is\nenabled. This\nbug can only be triggered in configurations that allow large numbers of\nopen file descriptors in a process. \n\nWorkaround\n==========\n\nKerberos 4 support can be disabled via disabling the \"krb4\" USE flag\nand recompiling the ebuild, or setting \"v4_mode=none\" in the\n[kdcdefaults] section of /etc/krb5/kdc.conf. This will only work around\nthe KDC related vulnerabilities. \n\nResolution\n==========\n\nAll MIT Kerberos 5 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-crypt/mit-krb5-1.6.3-r1\"\n\nReferences\n==========\n\n [ 1 ] CVE-2007-5901\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894\n [ 2 ] CVE-2007-5971\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971\n [ 3 ] CVE-2008-0062\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062\n [ 4 ] CVE-2008-0063\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063\n [ 5 ] CVE-2008-0947\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200803-31.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2008 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2008-0063"
},
{
"db": "CERT/CC",
"id": "VU#895609"
},
{
"db": "CERT/CC",
"id": "VU#374121"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001183"
},
{
"db": "BID",
"id": "28303"
},
{
"db": "VULHUB",
"id": "VHN-30188"
},
{
"db": "PACKETSTORM",
"id": "64688"
},
{
"db": "PACKETSTORM",
"id": "64729"
},
{
"db": "PACKETSTORM",
"id": "64731"
},
{
"db": "PACKETSTORM",
"id": "64714"
},
{
"db": "PACKETSTORM",
"id": "67011"
},
{
"db": "PACKETSTORM",
"id": "64715"
},
{
"db": "PACKETSTORM",
"id": "64848"
}
],
"trust": 4.05
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2008-0063",
"trust": 4.2
},
{
"db": "BID",
"id": "28303",
"trust": 2.8
},
{
"db": "SECUNIA",
"id": "29428",
"trust": 2.5
},
{
"db": "CERT/CC",
"id": "VU#895609",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "29424",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "29435",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "29423",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "29457",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "29451",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "29438",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "29663",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "29420",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "30535",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "29462",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "29516",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "29450",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "29464",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1019627",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-0924",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-0922",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-1744",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-1102",
"trust": 1.7
},
{
"db": "CERT/CC",
"id": "VU#374121",
"trust": 0.9
},
{
"db": "USCERT",
"id": "TA08-079B",
"trust": 0.9
},
{
"db": "USCERT",
"id": "TA08-079A",
"trust": 0.8
},
{
"db": "USCERT",
"id": "SA08-079A",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001183",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200803-310",
"trust": 0.7
},
{
"db": "BUGTRAQ",
"id": "20080318 MITKRB5-SA-2008-001: DOUBLE-FREE, UNINITIALIZED DATA VULNERABILITIES IN KRB5KDC",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20080319 RPSA-2008-0112-1 KRB5 KRB5-SERVER KRB5-SERVICES KRB5-TEST KRB5-WORKSTATION",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20080604 VMSA-2008-0009 UPDATES TO VMWARE WORKSTATION, VMWARE PLAYER, VMWARE ACE, VMWARE FUSION, VMWARE SERVER, VMWARE VIX API, VMWARE ESX, VMWARE ESXI RESOLVE CRITICAL SECURITY ISSUES",
"trust": 0.6
},
{
"db": "REDHAT",
"id": "RHSA-2008:0164",
"trust": 0.6
},
{
"db": "REDHAT",
"id": "RHSA-2008:0181",
"trust": 0.6
},
{
"db": "REDHAT",
"id": "RHSA-2008:0180",
"trust": 0.6
},
{
"db": "REDHAT",
"id": "RHSA-2008:0182",
"trust": 0.6
},
{
"db": "MANDRIVA",
"id": "MDVSA-2008:069",
"trust": 0.6
},
{
"db": "MANDRIVA",
"id": "MDVSA-2008:070",
"trust": 0.6
},
{
"db": "MANDRIVA",
"id": "MDVSA-2008:071",
"trust": 0.6
},
{
"db": "FEDORA",
"id": "FEDORA-2008-2637",
"trust": 0.6
},
{
"db": "FEDORA",
"id": "FEDORA-2008-2647",
"trust": 0.6
},
{
"db": "XF",
"id": "5",
"trust": 0.6
},
{
"db": "XF",
"id": "41277",
"trust": 0.6
},
{
"db": "GENTOO",
"id": "GLSA-200803-31",
"trust": 0.6
},
{
"db": "UBUNTU",
"id": "USN-587-1",
"trust": 0.6
},
{
"db": "SUSE",
"id": "SUSE-SA:2008:016",
"trust": 0.6
},
{
"db": "DEBIAN",
"id": "DSA-1524",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-30188",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "64688",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "64729",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "64731",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "64714",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "67011",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "64715",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "64848",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#895609"
},
{
"db": "CERT/CC",
"id": "VU#374121"
},
{
"db": "VULHUB",
"id": "VHN-30188"
},
{
"db": "BID",
"id": "28303"
},
{
"db": "PACKETSTORM",
"id": "64688"
},
{
"db": "PACKETSTORM",
"id": "64729"
},
{
"db": "PACKETSTORM",
"id": "64731"
},
{
"db": "PACKETSTORM",
"id": "64714"
},
{
"db": "PACKETSTORM",
"id": "67011"
},
{
"db": "PACKETSTORM",
"id": "64715"
},
{
"db": "PACKETSTORM",
"id": "64848"
},
{
"db": "CNNVD",
"id": "CNNVD-200803-310"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001183"
},
{
"db": "NVD",
"id": "CVE-2008-0063"
}
]
},
"id": "VAR-200803-0028",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-30188"
}
],
"trust": 0.01
},
"last_update_date": "2025-12-22T20:51:54.802000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "RHSA-2008",
"trust": 0.8,
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-001183"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-908",
"trust": 1.0
},
{
"problemtype": "Use of uninitialized resources (CWE-908) [NVD evaluation ]",
"trust": 0.8
},
{
"problemtype": "CWE-119",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-30188"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001183"
},
{
"db": "NVD",
"id": "CVE-2008-0063"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://www.securityfocus.com/bid/28303"
},
{
"trust": 2.0,
"url": "http://support.novell.com/docs/readmes/infodocument/patchbuilder/readme_5022520.html"
},
{
"trust": 2.0,
"url": "http://support.novell.com/docs/readmes/infodocument/patchbuilder/readme_5022542.html"
},
{
"trust": 1.9,
"url": "http://web.mit.edu/kerberos/advisories/mitkrb5-sa-2008-001.txt"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/archive/1/489761"
},
{
"trust": 1.7,
"url": "http://wiki.rpath.com/advisories:rpsa-2008-0112"
},
{
"trust": 1.7,
"url": "http://wiki.rpath.com/wiki/advisories:rpsa-2008-0112"
},
{
"trust": 1.7,
"url": "http://www.vmware.com/security/advisories/vmsa-2008-0009.html"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2008/dsa-1524"
},
{
"trust": 1.7,
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-march/msg00537.html"
},
{
"trust": 1.7,
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-march/msg00544.html"
},
{
"trust": 1.7,
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml"
},
{
"trust": 1.7,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:069"
},
{
"trust": 1.7,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:070"
},
{
"trust": 1.7,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:071"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2008-0164.html"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2008-0180.html"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2008-0181.html"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2008-0182.html"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1019627"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/29420"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/29423"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/29424"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/29428"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/29435"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/29438"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/29450"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/29451"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/29457"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/29462"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/29464"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/29516"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/29663"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/30535"
},
{
"trust": 1.7,
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html"
},
{
"trust": 1.7,
"url": "http://www.ubuntu.com/usn/usn-587-1"
},
{
"trust": 1.6,
"url": "about vulnerability notes"
},
{
"trust": 1.6,
"url": "contact us about this vulnerability"
},
{
"trust": 1.6,
"url": "provide a vendor statement"
},
{
"trust": 1.1,
"url": "http://lists.apple.com/archives/security-announce/2008/mar/msg00001.html"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/489883/100/0/threaded"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded"
},
{
"trust": 1.1,
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"trust": 1.1,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a8916"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2008/0922/references"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2008/1102/references"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2008/1744"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41277"
},
{
"trust": 1.1,
"url": "http://www.kb.cert.org/vuls/id/895609"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta08-079a/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta08-079b/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/tr/trta08-079a/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/tr/trta08-079b/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0063"
},
{
"trust": 0.8,
"url": "http://www.us-cert.gov/cas/alerts/sa08-079a.html"
},
{
"trust": 0.8,
"url": "http://www.us-cert.gov/cas/techalerts/ta08-079a.html"
},
{
"trust": 0.8,
"url": "http://www.us-cert.gov/cas/techalerts/ta08-079b.html"
},
{
"trust": 0.8,
"url": "http://secunia.com/advisories/29428/"
},
{
"trust": 0.8,
"url": "http://www.frsirt.com/english/advisories/2008/0922"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0062"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0063"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/41277"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/493080/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/489883/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1744"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1102/references"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/0924/references"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/0922/references"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0947"
},
{
"trust": 0.4,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0062"
},
{
"trust": 0.4,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0063"
},
{
"trust": 0.3,
"url": "http://web.mit.edu/kerberos/"
},
{
"trust": 0.3,
"url": "/archive/1/489761"
},
{
"trust": 0.3,
"url": "http://support.avaya.com/elmodocs2/security/asa-2008-144.htm"
},
{
"trust": 0.3,
"url": "http://rhn.redhat.com/errata/rhsa-2008-0164.html"
},
{
"trust": 0.3,
"url": "http://rhn.redhat.com/errata/rhsa-2008-0180.html"
},
{
"trust": 0.3,
"url": "http://rhn.redhat.com/errata/rhsa-2008-0181.html"
},
{
"trust": 0.3,
"url": "http://rhn.redhat.com/errata/rhsa-2008-0182.html"
},
{
"trust": 0.3,
"url": "http://secunia.com/"
},
{
"trust": 0.3,
"url": "http://lists.grok.org.uk/full-disclosure-charter.html"
},
{
"trust": 0.2,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5971"
},
{
"trust": 0.2,
"url": "http://www.mandriva.com/security/"
},
{
"trust": 0.2,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0947"
},
{
"trust": 0.2,
"url": "http://www.mandriva.com/security/advisories"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-5901"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-5971"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0948"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_m68k.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5_1.4.4-7etch5.dsc"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5_1.4.4.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-doc_1.3.6-2sarge6_all.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_m68k.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_ia64.deb"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_m68k.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_m68k.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_m68k.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_m68k.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5_1.4.4-7etch5.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6-2sarge6.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6-2sarge6.dsc"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-doc_1.4.4-7etch5_all.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_hppa.deb"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch5_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge6_m68k.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge6_m68k.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge6_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge6_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_m68k.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch5_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_m68k.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch5_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch5_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch5_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge6_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_i386.deb"
},
{
"trust": 0.1,
"url": "http://packages.debian.org/\u003cpkg\u003e"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch5_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge6_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch5_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch5_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch5_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch5_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch5_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge6_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge6_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge6_mips.deb"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5901"
},
{
"trust": 0.1,
"url": "http://web.mit.edu/kerberos/advisories/mitkrb5-sa-2008-002.txt"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-apps-servers-1.6.2-22.4.x86_64.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-apps-clients-1.6.2-22.4.i586.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-devel-32bit-1.6.2-22.4.x86_64.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/krb5-1.6.2-22.4.src.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-devel-1.6.2-22.4.ppc.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-apps-clients-1.6.2-22.4.x86_64.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-1.6.2-22.4.ppc.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-client-1.6.2-22.4.i586.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-server-1.6.2-22.4.i586.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-devel-1.6.2-22.4.i586.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-server-1.6.2-22.4.ppc.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-client-1.6.2-22.4.x86_64.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-client-1.6.2-22.4.ppc.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-1.6.2-22.4.i586.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-devel-1.6.2-22.4.x86_64.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-32bit-1.6.2-22.4.x86_64.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-apps-servers-1.6.2-22.4.i586.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-apps-clients-1.6.2-22.4.ppc.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-apps-servers-1.6.2-22.4.ppc.rpm"
},
{
"trust": 0.1,
"url": "http://support.novell.com/techcenter/psdb/a1cba9b24d53ae5d2b80a81acd449edb.html"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-server-1.6.2-22.4.x86_64.rpm"
},
{
"trust": 0.1,
"url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-1.6.2-22.4.x86_64.rpm"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004189"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/esx/esx350-200805515-sg.zip"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004723"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004644"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004642"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004219"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004725"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1055"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0553"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004722.tgz"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004719.tgz"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004219.tgz"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5378"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-5378"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004724.tgz"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0967"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0967"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004719"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/server/doc/releasenotes_server.html"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/developer/vix-api/"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004172"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004725.tgz"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004727.tgz"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004641"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004724"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/eos_vi.html"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5671"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004170"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004726.tgz"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/ace/doc/releasenotes_ace.html"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/esx/esx350-200805501-bg.zip"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/download/player/"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004721"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/security"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2097"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004722"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004727"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004821"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/esx/esx-2.5.5-90521-upgrade.tar.gz"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/download/ws/"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004637"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0888"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004821.tgz"
},
{
"trust": 0.1,
"url": "http://vmware.com/support/esx25/doc/esx-255-200805-patch.html"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004721.tgz"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-5671"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0553"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1005073"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/eos.html"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/download/server/"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004186"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004186.tgz"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004723.tgz"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2097"
},
{
"trust": 0.1,
"url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/esx/esx350-200805508-sg.zip"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/esx/esx350-200805505-sg.zip"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2006-1721"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/player/doc/releasenotes_player.html"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004173"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/download/ws/ws5.html"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/download/fusion/"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/esx/esx-2.5.4-90520-upgrade.tar.gz"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-4772"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004643"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-1721"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0948"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/security_response.html"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004216.tgz"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004728"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004728.tgz"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004189.tgz"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/pubs/vix-api/vixapi-1.1.4-release-notes.html"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/download/ace/"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004190.tgz"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/esx/esxe350-200805501-o-sg.zip"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2100"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004216"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004190"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004726"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0888"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004640"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2100"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/esx/esx350-200805506-sg.zip"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/esx/esx350-200805504-sg.zip"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4772"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/esx/esx350-200805507-sg.zip"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
},
{
"trust": 0.1,
"url": "http://vmware.com/support/esx25/doc/esx-254-200805-patch.html"
},
{
"trust": 0.1,
"url": "http://www.us-cert.gov/cas/signup.html\u003e."
},
{
"trust": 0.1,
"url": "http://www.kb.cert.org/vuls/id/374121\u003e"
},
{
"trust": 0.1,
"url": "http://www.kb.cert.org/vuls/id/895609\u003e"
},
{
"trust": 0.1,
"url": "http://www.us-cert.gov/cas/techalerts/ta08-079b.html\u003e"
},
{
"trust": 0.1,
"url": "http://web.mit.edu/kerberos/advisories/mitkrb5-sa-2008-002.txt2\u003e"
},
{
"trust": 0.1,
"url": "http://www.us-cert.gov/legal.html\u003e"
},
{
"trust": 0.1,
"url": "http://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "http://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5894"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/glsa/glsa-200803-31.xml"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#895609"
},
{
"db": "CERT/CC",
"id": "VU#374121"
},
{
"db": "VULHUB",
"id": "VHN-30188"
},
{
"db": "BID",
"id": "28303"
},
{
"db": "PACKETSTORM",
"id": "64688"
},
{
"db": "PACKETSTORM",
"id": "64729"
},
{
"db": "PACKETSTORM",
"id": "64731"
},
{
"db": "PACKETSTORM",
"id": "64714"
},
{
"db": "PACKETSTORM",
"id": "67011"
},
{
"db": "PACKETSTORM",
"id": "64715"
},
{
"db": "PACKETSTORM",
"id": "64848"
},
{
"db": "CNNVD",
"id": "CNNVD-200803-310"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001183"
},
{
"db": "NVD",
"id": "CVE-2008-0063"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#895609"
},
{
"db": "CERT/CC",
"id": "VU#374121"
},
{
"db": "VULHUB",
"id": "VHN-30188"
},
{
"db": "BID",
"id": "28303"
},
{
"db": "PACKETSTORM",
"id": "64688"
},
{
"db": "PACKETSTORM",
"id": "64729"
},
{
"db": "PACKETSTORM",
"id": "64731"
},
{
"db": "PACKETSTORM",
"id": "64714"
},
{
"db": "PACKETSTORM",
"id": "67011"
},
{
"db": "PACKETSTORM",
"id": "64715"
},
{
"db": "PACKETSTORM",
"id": "64848"
},
{
"db": "CNNVD",
"id": "CNNVD-200803-310"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001183"
},
{
"db": "NVD",
"id": "CVE-2008-0063"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2008-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#895609"
},
{
"date": "2008-03-18T00:00:00",
"db": "CERT/CC",
"id": "VU#374121"
},
{
"date": "2008-03-19T00:00:00",
"db": "VULHUB",
"id": "VHN-30188"
},
{
"date": "2008-03-18T00:00:00",
"db": "BID",
"id": "28303"
},
{
"date": "2008-03-19T02:26:54",
"db": "PACKETSTORM",
"id": "64688"
},
{
"date": "2008-03-19T23:35:04",
"db": "PACKETSTORM",
"id": "64729"
},
{
"date": "2008-03-19T23:38:22",
"db": "PACKETSTORM",
"id": "64731"
},
{
"date": "2008-03-19T22:58:28",
"db": "PACKETSTORM",
"id": "64714"
},
{
"date": "2008-06-05T01:56:09",
"db": "PACKETSTORM",
"id": "67011"
},
{
"date": "2008-03-19T22:59:32",
"db": "PACKETSTORM",
"id": "64715"
},
{
"date": "2008-03-24T22:48:28",
"db": "PACKETSTORM",
"id": "64848"
},
{
"date": "2008-03-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200803-310"
},
{
"date": "2008-04-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-001183"
},
{
"date": "2008-03-19T10:44:00",
"db": "NVD",
"id": "CVE-2008-0063"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-07-22T00:00:00",
"db": "CERT/CC",
"id": "VU#895609"
},
{
"date": "2011-07-22T00:00:00",
"db": "CERT/CC",
"id": "VU#374121"
},
{
"date": "2018-10-15T00:00:00",
"db": "VULHUB",
"id": "VHN-30188"
},
{
"date": "2015-04-13T21:38:00",
"db": "BID",
"id": "28303"
},
{
"date": "2008-10-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200803-310"
},
{
"date": "2024-02-28T07:24:00",
"db": "JVNDB",
"id": "JVNDB-2008-001183"
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2008-0063"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "64688"
},
{
"db": "PACKETSTORM",
"id": "64715"
},
{
"db": "CNNVD",
"id": "CNNVD-200803-310"
}
],
"trust": 0.8
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "MIT Kerberos krb4-enabled KDC contains multiple vulnerabilities",
"sources": [
{
"db": "CERT/CC",
"id": "VU#895609"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200803-310"
}
],
"trust": 0.6
}
}
CERTA-2008-AVI-148
Vulnerability from certfr_avis - Published: 2008-03-19 - Updated: 2008-03-19None
Description
De multiples vulnérabilités ont été découvertes dans le système d'exploitation Apple Mac OS X. L'exploitation de ces vulnérabilités permet à un individu malveillant diverses actions dont exécuter du code arbitaire à distance, effectuer un déni de service, contourner la politique de sécurité, élever ses privilèges et effectuer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité Apple 307562 pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple Mac Os X version 10.4.11 et ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Mac Os X version 10.5.2 et ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le syst\u00e8me\nd\u0027exploitation Apple Mac OS X. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s\npermet \u00e0 un individu malveillant diverses actions dont ex\u00e9cuter du code\narbitaire \u00e0 distance, effectuer un d\u00e9ni de service, contourner la\npolitique de s\u00e9curit\u00e9, \u00e9lever ses privil\u00e8ges et effectuer une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 Apple 307562 pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0063"
},
{
"name": "CVE-2008-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0060"
},
{
"name": "CVE-2007-3847",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3847"
},
{
"name": "CVE-2007-6109",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6109"
},
{
"name": "CVE-2007-1661",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1661"
},
{
"name": "CVE-2008-0882",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0882"
},
{
"name": "CVE-2007-6336",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6336"
},
{
"name": "CVE-2007-2799",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2799"
},
{
"name": "CVE-2006-3747",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3747"
},
{
"name": "CVE-2007-5000",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5000"
},
{
"name": "CVE-2008-1089",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1089"
},
{
"name": "CVE-2008-0005",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0005"
},
{
"name": "CVE-2007-4768",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4768"
},
{
"name": "CVE-2008-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0059"
},
{
"name": "CVE-2008-1000",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1000"
},
{
"name": "CVE-2007-1660",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1660"
},
{
"name": "CVE-2007-4568",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4568"
},
{
"name": "CVE-2007-3378",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3378"
},
{
"name": "CVE-2008-0052",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0052"
},
{
"name": "CVE-2008-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0990"
},
{
"name": "CVE-2008-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0995"
},
{
"name": "CVE-2007-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0898"
},
{
"name": "CVE-2007-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5266"
},
{
"name": "CVE-2008-0055",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0055"
},
{
"name": "CVE-2007-1997",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1997"
},
{
"name": "CVE-2007-1659",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1659"
},
{
"name": "CVE-2007-6337",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6337"
},
{
"name": "CVE-2008-0044",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0044"
},
{
"name": "CVE-2008-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0045"
},
{
"name": "CVE-2007-5971",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5971"
},
{
"name": "CVE-2008-0046",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0046"
},
{
"name": "CVE-2008-0047",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0047"
},
{
"name": "CVE-2007-6335",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6335"
},
{
"name": "CVE-2007-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5267"
},
{
"name": "CVE-2007-3725",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3725"
},
{
"name": "CVE-2008-0054",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0054"
},
{
"name": "CVE-2008-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0996"
},
{
"name": "CVE-2007-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5268"
},
{
"name": "CVE-2007-6203",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6203"
},
{
"name": "CVE-2008-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0051"
},
{
"name": "CVE-2007-3799",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3799"
},
{
"name": "CVE-2008-0048",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0048"
},
{
"name": "CVE-2007-1662",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1662"
},
{
"name": "CVE-2006-3334",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3334"
},
{
"name": "CVE-2008-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0998"
},
{
"name": "CVE-2007-0897",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0897"
},
{
"name": "CVE-2008-0318",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0318"
},
{
"name": "CVE-2007-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6429"
},
{
"name": "CVE-2007-4510",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4510"
},
{
"name": "CVE-2007-5269",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5269"
},
{
"name": "CVE-2007-5795",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5795"
},
{
"name": "CVE-2008-0006",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0006"
},
{
"name": "CVE-2008-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0062"
},
{
"name": "CVE-2008-0728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0728"
},
{
"name": "CVE-2007-2445",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2445"
},
{
"name": "CVE-2008-0049",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0049"
},
{
"name": "CVE-2007-1745",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1745"
},
{
"name": "CVE-2007-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6427"
},
{
"name": "CVE-2008-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0987"
},
{
"name": "CVE-2008-0993",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0993"
},
{
"name": "CVE-2008-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0988"
},
{
"name": "CVE-2008-0056",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0056"
},
{
"name": "CVE-2008-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0992"
},
{
"name": "CVE-2006-5793",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5793"
},
{
"name": "CVE-2007-6428",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6428"
},
{
"name": "CVE-2008-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0989"
},
{
"name": "CVE-2005-3352",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3352"
},
{
"name": "CVE-2008-0053",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0053"
},
{
"name": "CVE-2007-4767",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4767"
},
{
"name": "CVE-2008-0050",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0050"
},
{
"name": "CVE-2007-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5958"
},
{
"name": "CVE-2006-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6481"
},
{
"name": "CVE-2008-0994",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0994"
},
{
"name": "CVE-2007-6421",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6421"
},
{
"name": "CVE-2008-0058",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0058"
},
{
"name": "CVE-2007-4752",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4752"
},
{
"name": "CVE-2008-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0999"
},
{
"name": "CVE-2007-4560",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4560"
},
{
"name": "CVE-2007-4990",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4990"
},
{
"name": "CVE-2007-4766",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4766"
},
{
"name": "CVE-2007-6388",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6388"
},
{
"name": "CVE-2008-0596",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0596"
},
{
"name": "CVE-2007-4887",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4887"
}
],
"initial_release_date": "2008-03-19T00:00:00",
"last_revision_date": "2008-03-19T00:00:00",
"links": [],
"reference": "CERTA-2008-AVI-148",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-03-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": null,
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple 307562 du 18 mars 2008",
"url": "http://docs.info.apple.com/article.html?artnum=307562"
}
]
}
CERTA-2008-AVI-154
Vulnerability from certfr_avis - Published: 2008-03-20 - Updated: 2008-03-25
De multiples vulnérabilités dans Kerberos 5 permettent de porter atteinte à la confidentialité des données, de réaliser un déni de service à distance et éventuellement, d'exécuter du code arbitraire à distance.
Description
Plusieurs vulnérabilités ont été découvertes dans Kerberos 5 :
- l'utilisation d'un pointeur non initialisé pour certains types de messages krb4 peut provoquer un déni de service ou l'exécution de code arbitraire à distance. L'exploitation de cette vulnérabilité nécessite l'activation du support Kerberos 4, ce qui n'est pas le cas par défaut (CVE-2008-0062) ;
- des messages krb4 peuvent contenir des informations stockées en mémoire, ce qui peut porter atteinte à la confidentialité des données. L'exploitation de cette vulnérabilité nécessite l'activation du support Kerberos 4 (CVE-2008-0063) ;
- un utilisateur malintentionné peut provoquer une corruption de la mémoire dans le processus kadmind, ce qui se traduit par un déni de service et, éventuellement, une exécution de code arbitraire à distance. L'exploitation de cette vulnérabilité nécessite des configurations qui permettent l'ouverture d'un grand nombre de descripteurs de fichier par processus (CVE-2008-0947 et CVE-2008-0948).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Kerberos 5 versions 1.6.3 et antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003e\u003cSPAN class=\"textit\"\u003eKerberos 5\u003c/SPAN\u003e versions 1.6.3 et ant\u00e9rieures.\u003c/P\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Kerberos 5 :\n\n- l\u0027utilisation d\u0027un pointeur non initialis\u00e9 pour certains types de\n messages krb4 peut provoquer un d\u00e9ni de service ou l\u0027ex\u00e9cution de\n code arbitraire \u00e0 distance. L\u0027exploitation de cette vuln\u00e9rabilit\u00e9\n n\u00e9cessite l\u0027activation du support Kerberos 4, ce qui n\u0027est pas le\n cas par d\u00e9faut (CVE-2008-0062) ;\n- des messages krb4 peuvent contenir des informations stock\u00e9es en\n m\u00e9moire, ce qui peut porter atteinte \u00e0 la confidentialit\u00e9 des\n donn\u00e9es. L\u0027exploitation de cette vuln\u00e9rabilit\u00e9 n\u00e9cessite\n l\u0027activation du support Kerberos 4 (CVE-2008-0063) ;\n- un utilisateur malintentionn\u00e9 peut provoquer une corruption de la\n m\u00e9moire dans le processus kadmind, ce qui se traduit par un d\u00e9ni de\n service et, \u00e9ventuellement, une ex\u00e9cution de code arbitraire \u00e0\n distance. L\u0027exploitation de cette vuln\u00e9rabilit\u00e9 n\u00e9cessite des\n configurations qui permettent l\u0027ouverture d\u0027un grand nombre de\n descripteurs de fichier par processus (CVE-2008-0947 et\n CVE-2008-0948).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0063"
},
{
"name": "CVE-2008-0948",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0948"
},
{
"name": "CVE-2008-0947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0947"
},
{
"name": "CVE-2008-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0062"
}
],
"initial_release_date": "2008-03-20T00:00:00",
"last_revision_date": "2008-03-25T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1524 du 18 mars 2008 :",
"url": "http://www.debian.org/security/2008/dsa-1524"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-587-1 du 19 mars 2008 :",
"url": "http://www.ubuntulinux.org/usn/usn-587-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2008:0180 du 18 mars 2008 :",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0180.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDVSA-2008:069 du 19 mars 2008 :",
"url": "http://www.mandriva.com/en/security/advisroies?name=MDVSA-2008:069"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200803-31 du 24 mars 2008 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml"
}
],
"reference": "CERTA-2008-AVI-154",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-03-20T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Gentoo, Debian et Mandriva.",
"revision_date": "2008-03-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s dans \u003cspan class=\"textit\"\u003eKerberos 5\u003c/span\u003e\npermettent de porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, de\nr\u00e9aliser un d\u00e9ni de service \u00e0 distance et \u00e9ventuellement, d\u0027ex\u00e9cuter du\ncode arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Kerberos",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 MITKRB5-SA-2008-001 du 18 mars 2008",
"url": "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2008-001.txt"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 MITKRB5-SA-2008-002 du 18 mars 2008",
"url": "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2008-002.txt"
}
]
}
FKIE_CVE-2008-0063
Vulnerability from fkie_nvd - Published: 2008-03-19 10:44 - Updated: 2025-04-09 00:30| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://docs.info.apple.com/article.html?artnum=307562 | Broken Link | |
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html | Mailing List | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html | Mailing List | |
| cve@mitre.org | http://secunia.com/advisories/29420 | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/29423 | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/29424 | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/29428 | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/29435 | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/29438 | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/29450 | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/29451 | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/29457 | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/29462 | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/29464 | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/29516 | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/29663 | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/30535 | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html | Broken Link | |
| cve@mitre.org | http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html | Broken Link | |
| cve@mitre.org | http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt | Third Party Advisory | |
| cve@mitre.org | http://wiki.rpath.com/Advisories:rPSA-2008-0112 | Broken Link | |
| cve@mitre.org | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112 | Broken Link | |
| cve@mitre.org | http://www.debian.org/security/2008/dsa-1524 | Third Party Advisory | |
| cve@mitre.org | http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml | Third Party Advisory | |
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2008:069 | Patch, Third Party Advisory | |
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2008:070 | Patch, Third Party Advisory | |
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2008:071 | Patch, Third Party Advisory | |
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0164.html | Broken Link | |
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0180.html | Broken Link | |
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0181.html | Broken Link | |
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0182.html | Broken Link | |
| cve@mitre.org | http://www.securityfocus.com/archive/1/489761 | Broken Link, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securityfocus.com/archive/1/489883/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securityfocus.com/archive/1/493080/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securityfocus.com/bid/28303 | Broken Link, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securitytracker.com/id?1019627 | Broken Link, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.ubuntu.com/usn/usn-587-1 | Third Party Advisory | |
| cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2008-0009.html | Third Party Advisory | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2008/0922/references | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2008/0924/references | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2008/1102/references | Broken Link, Vendor Advisory | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2008/1744 | Broken Link, Vendor Advisory | |
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/41277 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916 | Broken Link | |
| cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html | Mailing List | |
| cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://docs.info.apple.com/article.html?artnum=307562 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29420 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29423 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29424 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29428 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29435 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29438 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29450 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29451 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29457 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29462 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29464 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29516 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29663 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30535 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/Advisories:rPSA-2008-0112 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1524 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:069 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:070 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:071 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0164.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0180.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0181.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0182.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/489761 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/489883/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/493080/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/28303 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1019627 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-587-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2008-0009.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/0922/references | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/0924/references | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1102/references | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1744 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/41277 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html | Mailing List |
| Vendor | Product | Version | |
|---|---|---|---|
| mit | kerberos_5 | * | |
| apple | mac_os_x | * | |
| apple | mac_os_x | * | |
| apple | mac_os_x_server | * | |
| apple | mac_os_x_server | * | |
| opensuse | opensuse | 10.2 | |
| opensuse | opensuse | 10.3 | |
| suse | linux | 10.1 | |
| suse | linux_enterprise_desktop | 10 | |
| suse | linux_enterprise_server | 10 | |
| suse | linux_enterprise_software_development_kit | 10 | |
| debian | debian_linux | 3.1 | |
| debian | debian_linux | 4.0 | |
| canonical | ubuntu_linux | 6.06 | |
| canonical | ubuntu_linux | 6.10 | |
| canonical | ubuntu_linux | 7.04 | |
| canonical | ubuntu_linux | 7.10 | |
| fedoraproject | fedora | 7 | |
| fedoraproject | fedora | 8 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
"matchCriteriaId": "904FBF9F-9269-4088-BD5A-3C773E6F841E",
"versionEndIncluding": "1.6.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1E0F574-6859-45A6-B160-7DDE92C07CC7",
"versionEndExcluding": "10.4.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D139BCA7-8B43-4BDE-9AE9-5F41F4B6BD0D",
"versionEndExcluding": "10.5.2",
"versionStartIncluding": "10.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D0444E-6B76-46EE-95EF-617F8967F6B6",
"versionEndExcluding": "10.4.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E4317913-336B-40CD-AF63-9F11C374419D",
"versionEndExcluding": "10.5.2",
"versionStartIncluding": "10.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "24818450-FDA1-429A-AC17-68F44F584217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux:10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A9BD0E68-2DC1-47EA-882A-6F5921A0F1BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C8FC5E32-C9E3-49F6-9481-1DB60DEE8A07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*",
"matchCriteriaId": "29184B59-5756-48DB-930C-69D5CD628548",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*",
"matchCriteriaId": "33EB57D5-DE8D-417C-8C00-AD331D61181C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*",
"matchCriteriaId": "E3EFD171-01F7-450B-B6F3-0F7E443A2337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*",
"matchCriteriaId": "72E4DB7F-07C3-46BB-AAA2-05CD0312C57F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka \"Uninitialized stack values.\""
},
{
"lang": "es",
"value": "El soporte Kerberos 4 en KDC en MIT Kerberos 5 (krb5kdc) no borra apropiadamente la parte no utilizada de un b\u00fafer cuando se genera un mensaje de error, lo que podr\u00eda permitir a los atacantes remotos obtener informaci\u00f3n confidencial, tambi\u00e9n se conoce como \"Uninitialized stack values.\""
}
],
"id": "CVE-2008-0063",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2008-03-19T10:44:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29420"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29423"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29424"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29428"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29435"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29438"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29450"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29451"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29457"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29462"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29464"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29516"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29663"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30535"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0112"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1524"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:069"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:070"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:071"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0164.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0180.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0181.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0182.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/489761"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/489883/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/28303"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1019627"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-587-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/0922/references"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/1102/references"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/1744"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41277"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29420"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29423"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29424"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29428"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29435"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29438"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29450"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29451"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29457"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29462"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29464"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29516"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29663"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30535"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1524"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:069"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:070"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:071"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0164.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0180.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0181.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0182.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/489761"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/489883/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/28303"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1019627"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-587-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/0922/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/1102/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/1744"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41277"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-908"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2008-0063
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2008-0063",
"description": "The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka \"Uninitialized stack values.\"",
"id": "GSD-2008-0063",
"references": [
"https://www.suse.com/security/cve/CVE-2008-0063.html",
"https://www.debian.org/security/2008/dsa-1524",
"https://access.redhat.com/errata/RHSA-2008:0182",
"https://access.redhat.com/errata/RHSA-2008:0181",
"https://access.redhat.com/errata/RHSA-2008:0180",
"https://access.redhat.com/errata/RHSA-2008:0164",
"https://linux.oracle.com/cve/CVE-2008-0063.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2008-0063"
],
"details": "The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka \"Uninitialized stack values.\"",
"id": "GSD-2008-0063",
"modified": "2023-12-13T01:22:58.787822Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-0063",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka \"Uninitialized stack values.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1744",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1744"
},
{
"name": "29457",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29457"
},
{
"name": "MDVSA-2008:069",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:069"
},
{
"name": "29464",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29464"
},
{
"name": "GLSA-200803-31",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml"
},
{
"name": "krb5-kdc-kerberos4-info-disclosure(41277)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41277"
},
{
"name": "FEDORA-2008-2637",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html"
},
{
"name": "MDVSA-2008:071",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:071"
},
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0112",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0112"
},
{
"name": "1019627",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019627"
},
{
"name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html"
},
{
"name": "29451",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29451"
},
{
"name": "29663",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29663"
},
{
"name": "FEDORA-2008-2647",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112"
},
{
"name": "29438",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29438"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html"
},
{
"name": "ADV-2008-0924",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
},
{
"name": "RHSA-2008:0164",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0164.html"
},
{
"name": "MDVSA-2008:070",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:070"
},
{
"name": "ADV-2008-0922",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0922/references"
},
{
"name": "29450",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29450"
},
{
"name": "29435",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29435"
},
{
"name": "20080319 rPSA-2008-0112-1 krb5 krb5-server krb5-services krb5-test krb5-workstation",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489883/100/0/threaded"
},
{
"name": "29428",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29428"
},
{
"name": "29420",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29420"
},
{
"name": "DSA-1524",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1524"
},
{
"name": "30535",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30535"
},
{
"name": "APPLE-SA-2008-03-18",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name": "RHSA-2008:0182",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0182.html"
},
{
"name": "oval:org.mitre.oval:def:8916",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916"
},
{
"name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html"
},
{
"name": "20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded"
},
{
"name": "RHSA-2008:0180",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0180.html"
},
{
"name": "SUSE-SA:2008:016",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html"
},
{
"name": "29516",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29516"
},
{
"name": "29462",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29462"
},
{
"name": "29424",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29424"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307562",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"name": "RHSA-2008:0181",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0181.html"
},
{
"name": "29423",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29423"
},
{
"name": "USN-587-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-587-1"
},
{
"name": "ADV-2008-1102",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1102/references"
},
{
"name": "28303",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28303"
},
{
"name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt",
"refsource": "CONFIRM",
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt"
},
{
"name": "20080318 MITKRB5-SA-2008-001: double-free, uninitialized data vulnerabilities in krb5kdc",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489761"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
"matchCriteriaId": "904FBF9F-9269-4088-BD5A-3C773E6F841E",
"versionEndIncluding": "1.6.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1E0F574-6859-45A6-B160-7DDE92C07CC7",
"versionEndExcluding": "10.4.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D139BCA7-8B43-4BDE-9AE9-5F41F4B6BD0D",
"versionEndExcluding": "10.5.2",
"versionStartIncluding": "10.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D0444E-6B76-46EE-95EF-617F8967F6B6",
"versionEndExcluding": "10.4.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E4317913-336B-40CD-AF63-9F11C374419D",
"versionEndExcluding": "10.5.2",
"versionStartIncluding": "10.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "24818450-FDA1-429A-AC17-68F44F584217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux:10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A9BD0E68-2DC1-47EA-882A-6F5921A0F1BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C8FC5E32-C9E3-49F6-9481-1DB60DEE8A07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*",
"matchCriteriaId": "29184B59-5756-48DB-930C-69D5CD628548",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*",
"matchCriteriaId": "33EB57D5-DE8D-417C-8C00-AD331D61181C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*",
"matchCriteriaId": "E3EFD171-01F7-450B-B6F3-0F7E443A2337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*",
"matchCriteriaId": "72E4DB7F-07C3-46BB-AAA2-05CD0312C57F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka \"Uninitialized stack values.\""
},
{
"lang": "es",
"value": "El soporte Kerberos 4 en KDC en MIT Kerberos 5 (krb5kdc) no borra apropiadamente la parte no utilizada de un b\u00fafer cuando se genera un mensaje de error, lo que podr\u00eda permitir a los atacantes remotos obtener informaci\u00f3n confidencial, tambi\u00e9n se conoce como \"Uninitialized stack values.\""
}
],
"id": "CVE-2008-0063",
"lastModified": "2024-02-09T00:35:55.777",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2008-03-19T10:44:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29420"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29423"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29424"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29428"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29435"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29438"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29450"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29451"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29457"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29462"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29464"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29516"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29663"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30535"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0112"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1524"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:069"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:070"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:071"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0164.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0180.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0181.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0182.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/489761"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/489883/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/28303"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1019627"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-587-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/0922/references"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/1102/references"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/1744"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41277"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-908"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.