---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Fedora update for krb5 SECUNIA ADVISORY ID: SA26680 VERIFY ADVISORY: http://secunia.com/advisories/26680/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Fedora 7 http://secunia.com/product/15552/ DESCRIPTION: Fedora has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system. For more information: SA26676 SOLUTION: Apply updated packages. f3fedb67d3b6c9fd457c651e9f4e5f4a73773639 krb5-workstation-servers-1.6.1-3.fc7.ppc64.rpm 0aadee600d61baf3355bc734bb97749c9a024428 krb5-server-1.6.1-3.fc7.ppc64.rpm 3c40e2912621468ffb3de5937c1c0768037ca974 krb5-workstation-1.6.1-3.fc7.ppc64.rpm 901250263c007d6dc6b048131b0e49b2710e66dc krb5-server-ldap-1.6.1-3.fc7.ppc64.rpm 1a3f97283cf3015c4aa38e0ab0dd8c5f7f105ce4 krb5-debuginfo-1.6.1-3.fc7.ppc64.rpm aa133ff05a4f5b756ca433773c35294f7aadfc04 krb5-devel-1.6.1-3.fc7.ppc64.rpm b637cf65c6f98663552baa44e03834cf6ba65220 krb5-libs-1.6.1-3.fc7.ppc64.rpm d29b74591a1d505f9ea71acd1dec2e91bced5ee3 krb5-workstation-clients-1.6.1-3.fc7.ppc64.rpm 9421449a348c4326ec58080d7bdbbe29d34cb3a6 krb5-devel-1.6.1-3.fc7.i386.rpm eeab8f838addd9b8d51e58b4db1405c917c956bf krb5-server-ldap-1.6.1-3.fc7.i386.rpm 55495f2eb30718d712dc47daba2dc9c7384eaa35 krb5-libs-1.6.1-3.fc7.i386.rpm fb703be3d2cadd7aeadffa839b30cfb32655f9f2 krb5-workstation-1.6.1-3.fc7.i386.rpm d54417a38164981057e49936bb621f827039f0fc krb5-server-1.6.1-3.fc7.i386.rpm 3dae8bb80257da806306883b122cc87f2ea37987 krb5-workstation-servers-1.6.1-3.fc7.i386.rpm 0dcced57d06e76a8f1d65f8cba7c85b69bdd6896 krb5-debuginfo-1.6.1-3.fc7.i386.rpm 3df2c957366f086cc64a7650e586fc405410a368 krb5-workstation-clients-1.6.1-3.fc7.i386.rpm 9f5611a40de5bfaab6efdcde8848dcbaaabceec4 krb5-workstation-1.6.1-3.fc7.x86_64.rpm 49a90fe133c70274f737ce4682a0c8d843f3f9b8 krb5-workstation-servers-1.6.1-3.fc7.x86_64.rpm 7e3c579a63b48903ec23b1e92ce06f683e023b35 krb5-workstation-clients-1.6.1-3.fc7.x86_64.rpm 19be0287aa03e9bab8e22ad4297c6b93af0e8e5a krb5-server-ldap-1.6.1-3.fc7.x86_64.rpm 0783c552daa26891af206f33d8f97ef244bd3efa krb5-devel-1.6.1-3.fc7.x86_64.rpm 56f7467d3fad16bc0a1f6063daea9862e0f20fc1 krb5-debuginfo-1.6.1-3.fc7.x86_64.rpm 28c79b4a0bdbcb01f675a096c4d91cd1290e66a4 krb5-server-1.6.1-3.fc7.x86_64.rpm d50cecc84a105aacf8c72f0f3d1a7a11014ae98d krb5-libs-1.6.1-3.fc7.x86_64.rpm b97a05f62b7bde6896fb25a1af28c49295e173d3 krb5-workstation-1.6.1-3.fc7.ppc.rpm 27c19180b1eeeb051b1a530b5419fbcace3d518c krb5-libs-1.6.1-3.fc7.ppc.rpm 0c13666c7764d09a929fc94f7fc45e7926b6fbf9 krb5-debuginfo-1.6.1-3.fc7.ppc.rpm a03d2fa017bc682d43fda501041350cfb86bd1e5 krb5-server-ldap-1.6.1-3.fc7.ppc.rpm bedffb6bf8331f251ed64f4cbd9c7697beea7303 krb5-devel-1.6.1-3.fc7.ppc.rpm 37def8f99aa529a0cee17d1e3270d5e115c28dd5 krb5-workstation-servers-1.6.1-3.fc7.ppc.rpm c72e1db5fbcba2eba6989464b7a695de706e9bc2 krb5-server-1.6.1-3.fc7.ppc.rpm d67ba95e679887932af3ba184ad873ad96e388ed krb5-workstation-clients-1.6.1-3.fc7.ppc.rpm 2ebbd6473880cd09332676a5f36d645e42419eb7 krb5-1.6.1-3.fc7.src.rpm ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00087.html OTHER REFERENCES: SA26676: http://secunia.com/advisories/26676/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------