krb5-1.6.1-17AXS3.1

エラータID: AXSA:2008-345:03

リリース日: 
2008/12/01 Monday - 13:49
題名: 
krb5-1.6.1-17AXS3.1
影響のあるチャネル: 
Asianux Server 3 for ia64
Asianux Server 3 for ppc
Severity: 
High
Description: 

Kerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords.
- add preliminary patch to fix use of uninitialized pointer / double-free in KDC (CVE-2008-0062,CVE-2008-0063)
- add backported patch to fix use-after-free in libgssapi_krb5 (CVE-2007-5901)
- add backported patch to fix double-free in libgssapi_krb5 (CVE-2007-5971)
- add preliminary patch to fix incorrect handling of high-numbered descriptors in the RPC library (CVE-2008-0947)
- fix storage of delegated krb5 credentials when they've been wrapped up in spnego
- return a delegated credential handle even if the application didn't pass a location to store the flags which would be used to indicate that credentials were delegated
- add patch to fall back to TCP kpasswd servers for kdc-unreachable, can't-resolve-server, and response-too-big errors
- use the right sequence numbers when generating password-set/change requests for kpasswd servers after the first one
- backport from 1.6.3 to initialize a library-allocated get_init_creds_opt structure the same way we would one which was allocated by the calling application, to restore kinit's traditional behavior of doing a password change right when it detects an expired password
- ftpd: also do PAM session and credential management when ftp clients use strong authentication
- update to revised patch for CVE-2007-3999
- fix omission of files created by the db2 plugin when labeling
- make krb5-workstation depend on the PAM configuration file used by login.krb5
- fix omission of kadmin log file when labeling
- add preliminary patch to fix buffer overflow in rpcsec_gss implementation in libgssrpc (CVE-2007-3999) and write through uninitialized pointer in kadmind (CVE-2007-4000)
- kdc: default to listening for TCP clients as well
- login: change to the user's home directory after dropping privileges, not before
- turn off the ldap features
- add a patch to allow applications to try to use a key with kvno=0, if found, in place of the right version for a request
- incorporate fixes for MITKRB5-SA-2007-004 (CVE-2007-2442,CVE-2007-2443) and MITKRB5-SA-2007-005 (CVE-2007-2798)
- reintroduce missing %postun for the non-split_workstation case
- add missing pam-devel build requirement, force selinux-or-fail build
- label all files at creation-time according to the SELinux policy
- perform PAM account / session management in krshd
- perform PAM authentication and account / session management in ftpd
- perform PAM authentication, account / session management, and password- changing in login.krb5
- preprocess kerberos.ldif into a format FDS will like better, and include that as a doc file as well
- switch man pages to being generated with the right paths in them
- drop old, incomplete SELinux patch
- add patch from Greg Hudson to make srvtab routines report missing-file errors at same point that keytab routines do
- pull patch from svn to undo unintentional chattiness in ftp
- pull patch from svn to handle NULL krb5_get_init_creds_opt structures better in a couple of places where they're expected
- update to 1.6.1
- drop no-longer-needed patches for CVE-2007-0956,CVE-2007-0957,CVE-2007-1216
- drop patch for sendto bug in 1.6, fixed in 1.6.1
- kadmind.init: don't fail outright if the default principal database isn't there if it looks like we might be using the kldap plugin
- kadmind.init: attempt to extract the key for the host-specific kadmin service when we try to create the keytab
- omit dependent libraries from the krb5-config --libs output, as using shared libraries (no more static libraries) makes them unnecessary and they're not part of the libkrb5 interface (strips out libkeyutils, libresolv, libdl)
- pull in keyutils as a build requirement to get the KEYRING: ccache type, because we've merged
- fix an uninitialized length value which could cause a crash when parsing key data coming from a directory server
- correct a typo in the krb5.conf man page (ldap_server->ldap_servers)
- move the default acl_file, dict_file, and admin_keytab settings to the part of the default/example kdc.conf where they'll actually have an effect
- add patch to correct unauthorized access via krb5-aware telnetdaemon (CVE-2007-0956)
- add patch to fix buffer overflow in krb5kdc and kadmind(CVE-2007-0957)
- add patch to fix double-free in kadmind (CVE-2007-1216)
- back out buildrequires: keyutils-libs-devel for now
- add buildrequires: on keyutils-libs-devel to enab

解決策: 

Update packages.

追加情報: 

From Asianux Server 3 SP1 updated packages.

ダウンロード: 

SRPMS
  1. krb5-1.6.1-17AXS3.1.src.rpm
    MD5: 8df04476663dffa32d12b3df9f6632a9
    SHA-256: 3e444cf2ed6259621b83016762a401cb5864b80f692a1170dcfaa95b7a7fdc4b
    Size: 14.95 MB

Asianux Server 3 for x86
  1. krb5-devel-1.6.1-17AXS3.1.i386.rpm
    MD5: 546eea513e7b5c997f8125edda59288f
    SHA-256: f5128ba5814069d634dd45ba2bcdc5f716bb6066280fb6819b491d5a53212c20
    Size: 1.86 MB
  2. krb5-libs-1.6.1-17AXS3.1.i386.rpm
    MD5: 9f2d9933b673bc685440ac563b16d548
    SHA-256: ae94d74a3231cea55f2876cbd210bb56594fab0997f0805b13f6d341a7674e2b
    Size: 653.56 kB
  3. krb5-server-1.6.1-17AXS3.1.i386.rpm
    MD5: 6e9c61c48df27586a695a23ba57fd05d
    SHA-256: bb242fce0d8ccb4a226f8d0886a5249580e0098845f7f8c08f17af2e9c0d779a
    Size: 901.44 kB
  4. krb5-workstation-1.6.1-17AXS3.1.i386.rpm
    MD5: a9f1a1458ab20b290d6ef3685037eb38
    SHA-256: 8dc0afaf22172ed4e4558f4014c6e1725f91ac0bd309d560955face4a8a3c92d
    Size: 818.38 kB

Asianux Server 3 for x86_64
  1. krb5-devel-1.6.1-17AXS3.1.x86_64.rpm
    MD5: 1789d595de976c7031a182bf1f5e61c1
    SHA-256: 211f14b7cbf178a4e87e69aca3f352f040941758ba16f7e9b9b010cc88988eea
    Size: 1.88 MB
  2. krb5-libs-1.6.1-17AXS3.1.x86_64.rpm
    MD5: a9f23f318b7dac5aa258ab108befd892
    SHA-256: 551306181a91fb0eee146612148cede52b8289532116725ad16ea5bb6c8073d2
    Size: 662.53 kB
  3. krb5-server-1.6.1-17AXS3.1.x86_64.rpm
    MD5: 11547fa561ae7882bffc8e99920fb219
    SHA-256: 80060b1ff16d7df0f4feb55d5c83990c28075c9c81e7342e998377dd7563e647
    Size: 909.28 kB
  4. krb5-workstation-1.6.1-17AXS3.1.x86_64.rpm
    MD5: c5e3002ea7df2df30e1f24210741bc4f
    SHA-256: d7a102b1650ea4c833ce953fb64a7e10eb712beb78e1a6012b7da55e49c7c869
    Size: 844.49 kB