Changelog for
kerberos5-1.3.6-8tr.i586.rpm :
Fri Jun 29 03:00:00 2007 Nived Gopalan
1.3.6-8tr
- SECURITY Fix: Some vulnerabilities have been reported in Kerberos,
which can be exploited by malicious users to compromise a vulnerable
system.
- An error exists within the \"gssrpc__svcauth_gssapi\" function in the
RPC library, which can cause kadmind and possibly other third-party
products to free an uninitialised pointer when receiving an RPC
credential with a length of zero.
- A signedness error exists within the \"gssrpc__svcauth_unix()\" function
in the RPC library, which is used by kadmind and possibly other
third-party products. This can be exploited to cause a stack-based
buffer overflow.
- Fixes stack-based buffer overflow error in kadmind within the
rename_principal_2_svc function which could allow remote authenticated
users to execute arbitrary code via a crafted request to rename a
principal.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2007-2442, CVE-2007-2443 and CVE-2007-2798
to these issues.
Thu Apr 5 03:00:00 2007 Nived Gopalan 1.3.6-7tr
- SECURITY Fix: Some vulnerabilities have been reported in Kerberos,
which can be exploited by malicious users to cause a DoS or
compromise a vulnerable system.
- An error exists in the MIT krb5 telnet daemon when processing the
username. This can be exploited to log in as an arbitrary user by
providing a specially crafted username beginning with \"-e\".
- A boundary error exists in the \"krb5_klog_syslog()\" function within
the kadm5 library, which is used by KDC, kadmind and probably other
third party products. This can be exploited to cause a stack-based
buffer overflow via an overly long string.
- A double-free error exists in the \"kg_unseal_v1()\" function within
the MIT krb5 GSS-API library, which can potentially be exploited to
execute arbitrary code, but requires valid credentials.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2007-0956, CVE-2007-0957 and CVE-2007-1216
to these issues.
Mon Jan 30 02:00:00 2006 Nived Gopalan 1.3.6-6tr
- Added Requires libcom_err-devel for devel package, Bug #1590.
Wed Jul 13 03:00:00 2005 Thushara Gopalakrishnan 1.3.6-5tr
- Security Fix: Fix for CAN-2005-1689. The krb5_recvauth() function can
free previously freed memory under some error conditions. This vulnerability
may allow an unauthenticated remote attacker to execute arbitrary code.
- Fix for CAN-2005-1175,In KDC implementation results in single-byte overflow
of a heap buffer
- Fix for CAN-2005-1174,that affects the KDC implementation in all MIT krb5
releases supporting TCP client connections to the KDC.
Thu Jun 30 03:00:00 2005 Hasher Jamaludeen 1.3.6-4tr
- Security Fix: Fix for CAN-2004-0175 to krb5 rcp based on Markus Friedl\'s
fix for OpenSSH scp.
Wed Jun 8 03:00:00 2005 Syed Shabir Zakiullah 1.3.6-3tr
- Security Fix: Buffer overflows in telnet client
- The telnet client program supplied with MIT Kerberos 5 has buffer
overflows in the functions slc_add_reply() and env_opt_add(), which
may lead to remote code execution.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2005-0469 and CAN-2005-0468 to this issue.
Tue Dec 21 02:00:00 2004 Erlend Midttun 1.3.6-2tr
- New upstream.
Mon Nov 1 02:00:00 2004 Oystein Viggen 1.3.5-2tr
- Patch tempfile issue
Fri Sep 24 03:00:00 2004 Syed Shabir 1.3.5-1tr
- New upstream with updated security bugs
Wed Sep 1 03:00:00 2004 Oystein Viggen 1.3.4-2tr
- Patch security bugs
Thu Jun 17 03:00:00 2004 Chr. Toldnes 1.3.4-1tr
- New upstream version: 1.3.4
Wed Jun 2 03:00:00 2004 Chr. Toldnes 1.3.3-1tr
- New upstream version: 1.3.3
- Added patch to fix buffer overflow.
Wed Feb 11 02:00:00 2004 Tor Hveem 1.3.1-4th
- Fixed stupid error with file wildcards.
Tue Feb 10 02:00:00 2004 Tor Hveem 1.3.1-3th
- New package libs.
Mon Feb 9 02:00:00 2004 Chr. Toldnes 1.3.1-2tr
- Use system et (libcom_err)
Mon Feb 9 02:00:00 2004 Chr. Toldnes 1.3.1-1tr
- Initial release for Trustix
- built shared :) with no stack protection :(