Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2010-1323
Vulnerability from cvelistv5
Published
2010-12-02 16:00
Modified
2024-08-07 01:21
Severity ?
EPSS score ?
Summary
MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:18.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2012:0042", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html" }, { "name": "ADV-2010-3094", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3094" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "MDVSA-2010:246", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:246" }, { "name": "FEDORA-2010-18425", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html" }, { "name": "45118", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45118" }, { "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.vmware.com/kb/1035108" }, { "name": "46397", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46397" }, { "name": "ADV-2010-3118", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3118" }, { "name": "SSRT100495", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497213107107\u0026w=2" }, { "name": "oval:org.mitre.oval:def:12121", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121" }, { "name": "ADV-2011-0187", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0187" }, { "name": "MDVSA-2010:245", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:245" }, { "name": "69610", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/69610" }, { "name": "20101130 MITKRB5-SA-2010-007 Multiple checksum handling vulnerabilities [CVE-2010-1324 CVE-2010-1323 CVE-2010-4020 CVE-2010-4021]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514953/100/0/threaded" }, { "name": "RHSA-2010:0926", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0926.html" }, { "name": "SUSE-SR:2010:023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0007.html" }, { "name": "APPLE-SA-2011-03-21-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "name": "42420", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42420" }, { "name": "HPSBUX02623", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=129562442714657\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt" }, { "name": "SSRT100355", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=129562442714657\u0026w=2" }, { "name": "ADV-2010-3095", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3095" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "name": "ADV-2010-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3101" }, { "name": "42399", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42399" }, { "name": "SUSE-SU-2012:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html" }, { "name": "[security-announce] 20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2011/000133.html" }, { "name": "1024803", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024803" }, { "name": "20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/517739/100/0/threaded" }, { "name": "FEDORA-2010-18409", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html" }, { "name": "SUSE-SR:2010:024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "name": "RHSA-2010:0925", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0925.html" }, { "name": "USN-1030-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1030-1" }, { "name": "HPSBOV02682", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497213107107\u0026w=2" }, { "name": "43015", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43015" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4581" }, { "name": "DSA-2129", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2129" }, { "name": "42436", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42436" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SU-2012:0042", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html" }, { "name": "ADV-2010-3094", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3094" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "MDVSA-2010:246", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:246" }, { "name": "FEDORA-2010-18425", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html" }, { "name": "45118", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45118" }, { "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.vmware.com/kb/1035108" }, { "name": "46397", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46397" }, { "name": "ADV-2010-3118", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3118" }, { "name": "SSRT100495", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497213107107\u0026w=2" }, { "name": "oval:org.mitre.oval:def:12121", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121" }, { "name": "ADV-2011-0187", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0187" }, { "name": "MDVSA-2010:245", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:245" }, { "name": "69610", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/69610" }, { "name": "20101130 MITKRB5-SA-2010-007 Multiple checksum handling vulnerabilities [CVE-2010-1324 CVE-2010-1323 CVE-2010-4020 CVE-2010-4021]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514953/100/0/threaded" }, { "name": "RHSA-2010:0926", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0926.html" }, { "name": "SUSE-SR:2010:023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0007.html" }, { "name": "APPLE-SA-2011-03-21-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "name": "42420", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42420" }, { "name": "HPSBUX02623", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=129562442714657\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt" }, { "name": "SSRT100355", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=129562442714657\u0026w=2" }, { "name": "ADV-2010-3095", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3095" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "name": "ADV-2010-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3101" }, { "name": "42399", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42399" }, { "name": "SUSE-SU-2012:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html" }, { "name": "[security-announce] 20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2011/000133.html" }, { "name": "1024803", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024803" }, { "name": "20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/517739/100/0/threaded" }, { "name": "FEDORA-2010-18409", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html" }, { "name": "SUSE-SR:2010:024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "name": "RHSA-2010:0925", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0925.html" }, { "name": "USN-1030-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1030-1" }, { "name": "HPSBOV02682", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497213107107\u0026w=2" }, { "name": "43015", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43015" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4581" }, { "name": "DSA-2129", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2129" }, { "name": "42436", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42436" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1323", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2012:0042", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html" }, { "name": "ADV-2010-3094", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3094" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "MDVSA-2010:246", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:246" }, { "name": "FEDORA-2010-18425", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html" }, { "name": "45118", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45118" }, { "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "name": "http://kb.vmware.com/kb/1035108", "refsource": "CONFIRM", "url": "http://kb.vmware.com/kb/1035108" }, { "name": "46397", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46397" }, { "name": "ADV-2010-3118", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3118" }, { "name": "SSRT100495", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130497213107107\u0026w=2" }, { "name": "oval:org.mitre.oval:def:12121", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121" }, { "name": "ADV-2011-0187", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0187" }, { "name": "MDVSA-2010:245", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:245" }, { "name": "69610", "refsource": "OSVDB", "url": "http://osvdb.org/69610" }, { "name": "20101130 MITKRB5-SA-2010-007 Multiple checksum handling vulnerabilities [CVE-2010-1324 CVE-2010-1323 CVE-2010-4020 CVE-2010-4021]", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514953/100/0/threaded" }, { "name": "RHSA-2010:0926", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0926.html" }, { "name": "SUSE-SR:2010:023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0007.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0007.html" }, { "name": "APPLE-SA-2011-03-21-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "name": "42420", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42420" }, { "name": "HPSBUX02623", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129562442714657\u0026w=2" }, { "name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt", "refsource": "CONFIRM", "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt" }, { "name": "SSRT100355", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129562442714657\u0026w=2" }, { "name": "ADV-2010-3095", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3095" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "name": "ADV-2010-3101", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3101" }, { "name": "42399", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42399" }, { "name": "SUSE-SU-2012:0010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html" }, { "name": "[security-announce] 20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2011/000133.html" }, { "name": "1024803", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024803" }, { "name": "20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/517739/100/0/threaded" }, { "name": "FEDORA-2010-18409", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html" }, { "name": "SUSE-SR:2010:024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "name": "RHSA-2010:0925", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0925.html" }, { "name": "USN-1030-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1030-1" }, { "name": "HPSBOV02682", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130497213107107\u0026w=2" }, { "name": "43015", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43015" }, { "name": "http://support.apple.com/kb/HT4581", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4581" }, { "name": "DSA-2129", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2129" }, { "name": "42436", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42436" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1323", "datePublished": "2010-12-02T16:00:00", "dateReserved": "2010-04-08T00:00:00", "dateUpdated": "2024-08-07T01:21:18.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-1323\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-12-02T16:22:20.847\",\"lastModified\":\"2024-11-21T01:14:08.670\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.\"},{\"lang\":\"es\",\"value\":\"MIT Kerberos 5 (tambi\u00e9n conocido como krb5) v1.3.x, v1.4.x, v1.5.x, v1.6.x, v1.7.x, y v1.8.x hasta v1.8.3 no determina correctamente la aceptabilidad de las sumas de comprobaci\u00f3n, lo que podr\u00eda permitir a un atacante remoto modificar el user-visible prompt text, modificar una respuesta para el KDC (Key Distribution Center) o falsificar un mensaje KRB-SAFE mediante ciertas sumas de comprobaci\u00f3n que (1) est\u00e1n sin clave o (2) usan claves RC4.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:P/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5029A563-699D-4D65-8E94-01E44FD8EF01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F01A83F-3BD1-4DED-979A-B4B6B23039FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B1422F8-CC87-46EA-8649-A12D6E47335D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACEB5A36-8F72-417A-AC92-149612EC7BCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B8704B5-F37B-4C61-A924-3774A29BFEB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F953CEBA-BAC0-48DF-A3D0-1FABCC9963E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED81A044-8A7B-4EEF-A4B3-EA49D76FAAED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30AA5727-BD83-45CF-B308-BA5F8A577B9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E088E64-6FBD-4148-8F78-506364B7BB1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52F0EECF-7787-442B-9888-D22F7D36C3DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF344AED-BE00-4A9B-A9DE-C6FB0BEE4617\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"567406CA-58D8-453E-B36E-6D1D2EFC8EB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7830E03F-A813-4E35-893E-BF27395CEFB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7764411E-C056-4696-822E-235F2620FAC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD315AE-868B-4061-BF01-CDBF59B02499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B639DD5F-71C7-4D9B-BA5C-51CAF64140B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B904DCE-D59F-45C7-A814-DE42CF02792D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9957FE9E-1E89-4C27-852C-44F866A1834E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C382DAA-68D2-4DD9-BE29-8EEB0BAF1A7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73BB258E-51CF-4D12-836B-BCEA587A3F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F81DE01C-BA3B-40B4-BD85-17692F0AF8A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB1190E-BE7A-4C6B-862D-D5747C64E980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B09C090-B842-43C7-B8A6-DBF63D80FEC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36823B2B-5C72-4FF3-9301-FB263EB8CE09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59AFA33E-FEBC-45F5-9EC6-8AA363163FB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04D83332-B2FD-4E86-A76C-C3F1CD3B3A31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758A0011-20ED-414A-9DF3-50A161DF8BC2\"}]}]}],\"references\":[{\"url\":\"http://kb.vmware.com/kb/1035108\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2011/000133.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129562442714657\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129562442714657\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497213107107\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497213107107\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/69610\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/42399\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/42420\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/42436\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/43015\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/46397\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/kb/HT4581\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2129\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:245\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:246\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0925.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0926.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/514953/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/517739/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/520102/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/45118\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1024803\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1030-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0007.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0012.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/3094\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/3095\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/3101\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/3118\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0187\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://kb.vmware.com/kb/1035108\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2011/000133.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129562442714657\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129562442714657\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497213107107\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497213107107\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/69610\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/42399\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/42420\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/42436\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43015\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/46397\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT4581\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2129\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:245\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0925.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0926.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/514953/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/517739/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/520102/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/45118\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1024803\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1030-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/3094\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/3095\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/3101\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/3118\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0187\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2010_0925
Vulnerability from csaf_redhat
Published
2010-11-30 22:40
Modified
2024-11-22 03:52
Summary
Red Hat Security Advisory: krb5 security and bug fix update
Notes
Topic
Updated krb5 packages that fix multiple security issues and one bug are now
available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Kerberos is a network authentication system which allows clients and
servers to authenticate to each other using symmetric encryption and a
trusted third party, the Key Distribution Center (KDC).
Multiple checksum validation flaws were discovered in the MIT Kerberos
implementation. A remote attacker could use these flaws to tamper with
certain Kerberos protocol packets and, possibly, bypass authentication or
authorization mechanisms and escalate their privileges. (CVE-2010-1323,
CVE-2010-1324, CVE-2010-4020)
Red Hat would like to thank the MIT Kerberos Team for reporting these
issues.
This update also fixes the following bug:
* When attempting to perform PKINIT pre-authentication, if the client had
more than one possible candidate certificate the client could fail to
select the certificate and key to use. This usually occurred if certificate
selection was configured to use the value of the keyUsage extension, or if
any of the candidate certificates did not contain a subjectAltName
extension. Consequently, the client attempted to perform pre-authentication
using a different (usually password-based) mechanism. (BZ#644825)
All krb5 users should upgrade to these updated packages, which contain
backported patches to correct these issues. After installing the updated
packages, the krb5kdc daemon will be restarted automatically.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated krb5 packages that fix multiple security issues and one bug are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Kerberos is a network authentication system which allows clients and\nservers to authenticate to each other using symmetric encryption and a\ntrusted third party, the Key Distribution Center (KDC).\n\nMultiple checksum validation flaws were discovered in the MIT Kerberos\nimplementation. A remote attacker could use these flaws to tamper with\ncertain Kerberos protocol packets and, possibly, bypass authentication or\nauthorization mechanisms and escalate their privileges. (CVE-2010-1323,\nCVE-2010-1324, CVE-2010-4020)\n\nRed Hat would like to thank the MIT Kerberos Team for reporting these\nissues.\n\nThis update also fixes the following bug:\n\n* When attempting to perform PKINIT pre-authentication, if the client had\nmore than one possible candidate certificate the client could fail to\nselect the certificate and key to use. This usually occurred if certificate\nselection was configured to use the value of the keyUsage extension, or if\nany of the candidate certificates did not contain a subjectAltName\nextension. Consequently, the client attempted to perform pre-authentication\nusing a different (usually password-based) mechanism. (BZ#644825)\n\nAll krb5 users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the krb5kdc daemon will be restarted automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0925", "url": "https://access.redhat.com/errata/RHSA-2010:0925" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2010-007.txt", "url": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2010-007.txt" }, { "category": "external", "summary": "644825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=644825" }, { "category": "external", "summary": "648674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648674" }, { "category": "external", "summary": "648734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648734" }, { "category": "external", "summary": "648735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648735" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0925.json" } ], "title": "Red Hat Security Advisory: krb5 security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:52:45+00:00", "generator": { "date": "2024-11-22T03:52:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0925", "initial_release_date": "2010-11-30T22:40:00+00:00", "revision_history": [ { "date": "2010-11-30T22:40:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-11-30T17:43:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:52:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "product": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "product_id": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.8.2-3.el6_0.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-0:1.8.2-3.el6_0.3.i686", "product": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.i686", "product_id": "krb5-libs-0:1.8.2-3.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.8.2-3.el6_0.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "product": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "product_id": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.8.2-3.el6_0.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-devel-0:1.8.2-3.el6_0.3.i686", "product": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.i686", "product_id": "krb5-devel-0:1.8.2-3.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.8.2-3.el6_0.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.8.2-3.el6_0.3.i686", "product": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.i686", "product_id": "krb5-workstation-0:1.8.2-3.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.8.2-3.el6_0.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-0:1.8.2-3.el6_0.3.i686", "product": { "name": "krb5-server-0:1.8.2-3.el6_0.3.i686", "product_id": "krb5-server-0:1.8.2-3.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.8.2-3.el6_0.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "product": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "product_id": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-openssl@1.8.2-3.el6_0.3?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "product": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "product_id": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.8.2-3.el6_0.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "product": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "product_id": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.8.2-3.el6_0.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "product": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "product_id": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.8.2-3.el6_0.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "product": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "product_id": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.8.2-3.el6_0.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "product": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "product_id": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.8.2-3.el6_0.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.8.2-3.el6_0.3.x86_64", "product": { "name": "krb5-server-0:1.8.2-3.el6_0.3.x86_64", "product_id": "krb5-server-0:1.8.2-3.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.8.2-3.el6_0.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "product": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "product_id": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-openssl@1.8.2-3.el6_0.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "krb5-0:1.8.2-3.el6_0.3.src", "product": { "name": "krb5-0:1.8.2-3.el6_0.3.src", "product_id": "krb5-0:1.8.2-3.el6_0.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.8.2-3.el6_0.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "product": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "product_id": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.8.2-3.el6_0.3?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "product": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "product_id": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.8.2-3.el6_0.3?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "product": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "product_id": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.8.2-3.el6_0.3?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "product": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "product_id": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.8.2-3.el6_0.3?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-server-0:1.8.2-3.el6_0.3.ppc64", "product": { "name": "krb5-server-0:1.8.2-3.el6_0.3.ppc64", "product_id": "krb5-server-0:1.8.2-3.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.8.2-3.el6_0.3?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "product": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "product_id": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-openssl@1.8.2-3.el6_0.3?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "product": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "product_id": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.8.2-3.el6_0.3?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "product": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "product_id": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.8.2-3.el6_0.3?arch=ppc" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "product": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "product_id": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.8.2-3.el6_0.3?arch=ppc" } } }, { "category": "product_version", "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc", "product": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc", "product_id": "krb5-devel-0:1.8.2-3.el6_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.8.2-3.el6_0.3?arch=ppc" } } }, { "category": "product_version", "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc", "product": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc", "product_id": "krb5-libs-0:1.8.2-3.el6_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.8.2-3.el6_0.3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "product": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "product_id": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.8.2-3.el6_0.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "product": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "product_id": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.8.2-3.el6_0.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "product": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "product_id": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.8.2-3.el6_0.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390x", "product": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390x", "product_id": "krb5-devel-0:1.8.2-3.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.8.2-3.el6_0.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-0:1.8.2-3.el6_0.3.s390x", "product": { "name": "krb5-server-0:1.8.2-3.el6_0.3.s390x", "product_id": "krb5-server-0:1.8.2-3.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.8.2-3.el6_0.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "product": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "product_id": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-openssl@1.8.2-3.el6_0.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390x", "product": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390x", "product_id": "krb5-libs-0:1.8.2-3.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.8.2-3.el6_0.3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "product": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "product_id": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.8.2-3.el6_0.3?arch=s390" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "product": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "product_id": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.8.2-3.el6_0.3?arch=s390" } } }, { "category": "product_version", "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390", "product": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390", "product_id": "krb5-devel-0:1.8.2-3.el6_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.8.2-3.el6_0.3?arch=s390" } } }, { "category": "product_version", "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390", "product": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390", "product_id": "krb5-libs-0:1.8.2-3.el6_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.8.2-3.el6_0.3?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.8.2-3.el6_0.3.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-0:1.8.2-3.el6_0.3.src" }, "product_reference": "krb5-0:1.8.2-3.el6_0.3.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.8.2-3.el6_0.3.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-0:1.8.2-3.el6_0.3.src" }, "product_reference": "krb5-0:1.8.2-3.el6_0.3.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-devel-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-devel-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-libs-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-libs-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-server-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-server-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-server-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-server-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.8.2-3.el6_0.3.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-0:1.8.2-3.el6_0.3.src" }, "product_reference": "krb5-0:1.8.2-3.el6_0.3.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.8.2-3.el6_0.3.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-0:1.8.2-3.el6_0.3.src" }, "product_reference": "krb5-0:1.8.2-3.el6_0.3.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.8.2-3.el6_0.3.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-0:1.8.2-3.el6_0.3.src" }, "product_reference": "krb5-0:1.8.2-3.el6_0.3.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-devel-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-devel-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-libs-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-libs-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-server-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-server-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-server-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-server-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.8.2-3.el6_0.3.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-0:1.8.2-3.el6_0.3.src" }, "product_reference": "krb5-0:1.8.2-3.el6_0.3.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-server-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.i686" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.s390x" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" }, "product_reference": "krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "MIT Kerberos Team" ] } ], "cve": "CVE-2010-1323", "discovery_date": "2010-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648734" } ], "notes": [ { "category": "description", "text": "MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.", "title": "Vulnerability description" }, { "category": "summary", "text": "krb5: incorrect acceptance of certain checksums (MITKRB5-SA-2010-007)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:krb5-0:1.8.2-3.el6_0.3.src", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-0:1.8.2-3.el6_0.3.src", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-0:1.8.2-3.el6_0.3.src", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-0:1.8.2-3.el6_0.3.src", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1323" }, { "category": "external", "summary": "RHBZ#648734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1323", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1323" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1323", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1323" } ], "release_date": "2010-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-30T22:40:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-optional:krb5-0:1.8.2-3.el6_0.3.src", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-0:1.8.2-3.el6_0.3.src", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-0:1.8.2-3.el6_0.3.src", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-0:1.8.2-3.el6_0.3.src", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0925" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:krb5-0:1.8.2-3.el6_0.3.src", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-0:1.8.2-3.el6_0.3.src", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-0:1.8.2-3.el6_0.3.src", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-0:1.8.2-3.el6_0.3.src", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "krb5: incorrect acceptance of certain checksums (MITKRB5-SA-2010-007)" }, { "acknowledgments": [ { "names": [ "MIT Kerberos Team" ] } ], "cve": "CVE-2010-1324", "discovery_date": "2010-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648674" } ], "notes": [ { "category": "description", "text": "MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key.", "title": "Vulnerability description" }, { "category": "summary", "text": "krb5: multiple checksum handling vulnerabilities (MITKRB5-SA-2010-007)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of krb5 as shipped with Red Hat Enterprise Linux 3, 4 and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:krb5-0:1.8.2-3.el6_0.3.src", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-0:1.8.2-3.el6_0.3.src", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-0:1.8.2-3.el6_0.3.src", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-0:1.8.2-3.el6_0.3.src", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1324" }, { "category": "external", "summary": "RHBZ#648674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1324", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1324" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1324", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1324" } ], "release_date": "2010-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-30T22:40:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-optional:krb5-0:1.8.2-3.el6_0.3.src", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-0:1.8.2-3.el6_0.3.src", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-0:1.8.2-3.el6_0.3.src", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-0:1.8.2-3.el6_0.3.src", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0925" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:krb5-0:1.8.2-3.el6_0.3.src", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-0:1.8.2-3.el6_0.3.src", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-0:1.8.2-3.el6_0.3.src", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-0:1.8.2-3.el6_0.3.src", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "krb5: multiple checksum handling vulnerabilities (MITKRB5-SA-2010-007)" }, { "acknowledgments": [ { "names": [ "MIT Kerberos Team" ] } ], "cve": "CVE-2010-4020", "discovery_date": "2010-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648735" } ], "notes": [ { "category": "description", "text": "MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.", "title": "Vulnerability description" }, { "category": "summary", "text": "krb5: krb5 may accept authdata checksums with low-entropy derived keys (MITKRB5-SA-2010-007)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of krb5 as shipped with Red Hat Enterprise Linux 3, 4 and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:krb5-0:1.8.2-3.el6_0.3.src", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-0:1.8.2-3.el6_0.3.src", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-0:1.8.2-3.el6_0.3.src", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-0:1.8.2-3.el6_0.3.src", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4020" }, { "category": "external", "summary": "RHBZ#648735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4020", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4020" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4020", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4020" } ], "release_date": "2010-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-30T22:40:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-optional:krb5-0:1.8.2-3.el6_0.3.src", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-0:1.8.2-3.el6_0.3.src", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-0:1.8.2-3.el6_0.3.src", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-0:1.8.2-3.el6_0.3.src", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0925" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:krb5-0:1.8.2-3.el6_0.3.src", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-0:1.8.2-3.el6_0.3.src", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Client:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode-optional:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-0:1.8.2-3.el6_0.3.src", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6ComputeNode:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-0:1.8.2-3.el6_0.3.src", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Server:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-0:1.8.2-3.el6_0.3.src", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-debuginfo-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-devel-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-libs-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-pkinit-openssl-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-server-ldap-0:1.8.2-3.el6_0.3.x86_64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.i686", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.ppc64", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.s390x", "6Workstation:krb5-workstation-0:1.8.2-3.el6_0.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "krb5: krb5 may accept authdata checksums with low-entropy derived keys (MITKRB5-SA-2010-007)" } ] }
rhsa-2010_0926
Vulnerability from csaf_redhat
Published
2010-11-30 22:57
Modified
2024-11-22 03:52
Summary
Red Hat Security Advisory: krb5 security update
Notes
Topic
Updated krb5 packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 4 and 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Kerberos is a network authentication system which allows clients and
servers to authenticate to each other using symmetric encryption and a
trusted third party, the Key Distribution Center (KDC).
Multiple checksum validation flaws were discovered in the MIT Kerberos
implementation. A remote attacker could use these flaws to tamper with
certain Kerberos protocol packets and, possibly, bypass authentication
mechanisms in certain configurations using Single-use Authentication
Mechanisms. (CVE-2010-1323)
Red Hat would like to thank the MIT Kerberos Team for reporting these
issues.
All krb5 users should upgrade to these updated packages, which contain a
backported patch to correct these issues. After installing the updated
packages, the krb5kdc daemon will be restarted automatically.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated krb5 packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Kerberos is a network authentication system which allows clients and\nservers to authenticate to each other using symmetric encryption and a\ntrusted third party, the Key Distribution Center (KDC).\n\nMultiple checksum validation flaws were discovered in the MIT Kerberos\nimplementation. A remote attacker could use these flaws to tamper with\ncertain Kerberos protocol packets and, possibly, bypass authentication\nmechanisms in certain configurations using Single-use Authentication\nMechanisms. (CVE-2010-1323)\n\nRed Hat would like to thank the MIT Kerberos Team for reporting these\nissues.\n\nAll krb5 users should upgrade to these updated packages, which contain a\nbackported patch to correct these issues. After installing the updated\npackages, the krb5kdc daemon will be restarted automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0926", "url": "https://access.redhat.com/errata/RHSA-2010:0926" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2010-007.txt", "url": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2010-007.txt" }, { "category": "external", "summary": "648734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648734" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0926.json" } ], "title": "Red Hat Security Advisory: krb5 security update", "tracking": { "current_release_date": "2024-11-22T03:52:50+00:00", "generator": { "date": "2024-11-22T03:52:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0926", "initial_release_date": "2010-11-30T22:57:00+00:00", "revision_history": [ { "date": "2010-11-30T22:57:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-11-30T17:59:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:52:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.3.4-62.el4_8.3.ia64", "product": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ia64", "product_id": "krb5-libs-0:1.3.4-62.el4_8.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.3.4-62.el4_8.3?arch=ia64" } } }, { "category": "product_version", "name": "krb5-server-0:1.3.4-62.el4_8.3.ia64", "product": { "name": "krb5-server-0:1.3.4-62.el4_8.3.ia64", "product_id": "krb5-server-0:1.3.4-62.el4_8.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.3.4-62.el4_8.3?arch=ia64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "product": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "product_id": "krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-62.el4_8.3?arch=ia64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.3.4-62.el4_8.3.ia64", "product": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.ia64", "product_id": "krb5-devel-0:1.3.4-62.el4_8.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.3.4-62.el4_8.3?arch=ia64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "product": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "product_id": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-62.el4_8.3?arch=ia64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.6.1-36.el5_5.6.ia64", "product": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.ia64", "product_id": "krb5-devel-0:1.6.1-36.el5_5.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.6.1-36.el5_5.6?arch=ia64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.6.1-36.el5_5.6.ia64", "product": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.ia64", "product_id": "krb5-libs-0:1.6.1-36.el5_5.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.6.1-36.el5_5.6?arch=ia64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "product": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "product_id": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.6.1-36.el5_5.6?arch=ia64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "product": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "product_id": "krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.6.1-36.el5_5.6?arch=ia64" } } }, { "category": "product_version", "name": "krb5-server-0:1.6.1-36.el5_5.6.ia64", "product": { "name": "krb5-server-0:1.6.1-36.el5_5.6.ia64", "product_id": "krb5-server-0:1.6.1-36.el5_5.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.6.1-36.el5_5.6?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.3.4-62.el4_8.3.i386", "product": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.i386", "product_id": "krb5-libs-0:1.3.4-62.el4_8.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.3.4-62.el4_8.3?arch=i386" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "product": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "product_id": "krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-62.el4_8.3?arch=i386" } } }, { "category": "product_version", "name": "krb5-server-0:1.3.4-62.el4_8.3.i386", "product": { "name": "krb5-server-0:1.3.4-62.el4_8.3.i386", "product_id": "krb5-server-0:1.3.4-62.el4_8.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.3.4-62.el4_8.3?arch=i386" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.3.4-62.el4_8.3.i386", "product": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.i386", "product_id": "krb5-workstation-0:1.3.4-62.el4_8.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-62.el4_8.3?arch=i386" } } }, { "category": "product_version", "name": "krb5-devel-0:1.3.4-62.el4_8.3.i386", "product": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.i386", "product_id": "krb5-devel-0:1.3.4-62.el4_8.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.3.4-62.el4_8.3?arch=i386" } } }, { "category": "product_version", "name": "krb5-devel-0:1.6.1-36.el5_5.6.i386", "product": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.i386", "product_id": "krb5-devel-0:1.6.1-36.el5_5.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.6.1-36.el5_5.6?arch=i386" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "product": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "product_id": "krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.6.1-36.el5_5.6?arch=i386" } } }, { "category": "product_version", "name": "krb5-server-0:1.6.1-36.el5_5.6.i386", "product": { "name": "krb5-server-0:1.6.1-36.el5_5.6.i386", "product_id": "krb5-server-0:1.6.1-36.el5_5.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.6.1-36.el5_5.6?arch=i386" } } }, { "category": "product_version", "name": "krb5-libs-0:1.6.1-36.el5_5.6.i386", "product": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.i386", "product_id": "krb5-libs-0:1.6.1-36.el5_5.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.6.1-36.el5_5.6?arch=i386" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.6.1-36.el5_5.6.i386", "product": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.i386", "product_id": "krb5-workstation-0:1.6.1-36.el5_5.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.6.1-36.el5_5.6?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "product": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "product_id": "krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.3.4-62.el4_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.3.4-62.el4_8.3.x86_64", "product": { "name": "krb5-server-0:1.3.4-62.el4_8.3.x86_64", "product_id": "krb5-server-0:1.3.4-62.el4_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.3.4-62.el4_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "product": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "product_id": "krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-62.el4_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "product": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "product_id": "krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.3.4-62.el4_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "product": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "product_id": "krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-62.el4_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "product": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "product_id": "krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.6.1-36.el5_5.6?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "product": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "product_id": "krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.6.1-36.el5_5.6?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.6.1-36.el5_5.6.x86_64", "product": { "name": "krb5-server-0:1.6.1-36.el5_5.6.x86_64", "product_id": "krb5-server-0:1.6.1-36.el5_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.6.1-36.el5_5.6?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "product": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "product_id": "krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.6.1-36.el5_5.6?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.6.1-36.el5_5.6.x86_64", "product": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.x86_64", "product_id": "krb5-workstation-0:1.6.1-36.el5_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.6.1-36.el5_5.6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "krb5-0:1.3.4-62.el4_8.3.src", "product": { "name": "krb5-0:1.3.4-62.el4_8.3.src", "product_id": "krb5-0:1.3.4-62.el4_8.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.3.4-62.el4_8.3?arch=src" } } }, { "category": "product_version", "name": "krb5-0:1.6.1-36.el5_5.6.src", "product": { "name": "krb5-0:1.6.1-36.el5_5.6.src", "product_id": "krb5-0:1.6.1-36.el5_5.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.6.1-36.el5_5.6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "product": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "product_id": "krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.3.4-62.el4_8.3?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "product": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "product_id": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-62.el4_8.3?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "product": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "product_id": "krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.6.1-36.el5_5.6?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "product": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "product_id": "krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.6.1-36.el5_5.6?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "product": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "product_id": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.6.1-36.el5_5.6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.3.4-62.el4_8.3.ppc", "product": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ppc", "product_id": "krb5-libs-0:1.3.4-62.el4_8.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.3.4-62.el4_8.3?arch=ppc" } } }, { "category": "product_version", "name": "krb5-server-0:1.3.4-62.el4_8.3.ppc", "product": { "name": "krb5-server-0:1.3.4-62.el4_8.3.ppc", "product_id": "krb5-server-0:1.3.4-62.el4_8.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.3.4-62.el4_8.3?arch=ppc" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "product": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "product_id": "krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-62.el4_8.3?arch=ppc" } } }, { "category": "product_version", "name": "krb5-devel-0:1.3.4-62.el4_8.3.ppc", "product": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.ppc", "product_id": "krb5-devel-0:1.3.4-62.el4_8.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.3.4-62.el4_8.3?arch=ppc" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "product": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "product_id": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-62.el4_8.3?arch=ppc" } } }, { "category": "product_version", "name": "krb5-devel-0:1.6.1-36.el5_5.6.ppc", "product": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.ppc", "product_id": "krb5-devel-0:1.6.1-36.el5_5.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.6.1-36.el5_5.6?arch=ppc" } } }, { "category": "product_version", "name": "krb5-libs-0:1.6.1-36.el5_5.6.ppc", "product": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.ppc", "product_id": "krb5-libs-0:1.6.1-36.el5_5.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.6.1-36.el5_5.6?arch=ppc" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "product": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "product_id": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.6.1-36.el5_5.6?arch=ppc" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "product": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "product_id": "krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.6.1-36.el5_5.6?arch=ppc" } } }, { "category": "product_version", "name": "krb5-server-0:1.6.1-36.el5_5.6.ppc", "product": { "name": "krb5-server-0:1.6.1-36.el5_5.6.ppc", "product_id": "krb5-server-0:1.6.1-36.el5_5.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.6.1-36.el5_5.6?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.3.4-62.el4_8.3.s390x", "product": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.s390x", "product_id": "krb5-libs-0:1.3.4-62.el4_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.3.4-62.el4_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-0:1.3.4-62.el4_8.3.s390x", "product": { "name": "krb5-server-0:1.3.4-62.el4_8.3.s390x", "product_id": "krb5-server-0:1.3.4-62.el4_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.3.4-62.el4_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "product": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "product_id": "krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-62.el4_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-devel-0:1.3.4-62.el4_8.3.s390x", "product": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.s390x", "product_id": "krb5-devel-0:1.3.4-62.el4_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.3.4-62.el4_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "product": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "product_id": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-62.el4_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-devel-0:1.6.1-36.el5_5.6.s390x", "product": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.s390x", "product_id": "krb5-devel-0:1.6.1-36.el5_5.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.6.1-36.el5_5.6?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-0:1.6.1-36.el5_5.6.s390x", "product": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.s390x", "product_id": "krb5-libs-0:1.6.1-36.el5_5.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.6.1-36.el5_5.6?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "product": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "product_id": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.6.1-36.el5_5.6?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "product": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "product_id": "krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.6.1-36.el5_5.6?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-0:1.6.1-36.el5_5.6.s390x", "product": { "name": "krb5-server-0:1.6.1-36.el5_5.6.s390x", "product_id": "krb5-server-0:1.6.1-36.el5_5.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.6.1-36.el5_5.6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.3.4-62.el4_8.3.s390", "product": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.s390", "product_id": "krb5-libs-0:1.3.4-62.el4_8.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.3.4-62.el4_8.3?arch=s390" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "product": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "product_id": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-62.el4_8.3?arch=s390" } } }, { "category": "product_version", "name": "krb5-server-0:1.3.4-62.el4_8.3.s390", "product": { "name": "krb5-server-0:1.3.4-62.el4_8.3.s390", "product_id": "krb5-server-0:1.3.4-62.el4_8.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.3.4-62.el4_8.3?arch=s390" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.3.4-62.el4_8.3.s390", "product": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.s390", "product_id": "krb5-workstation-0:1.3.4-62.el4_8.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-62.el4_8.3?arch=s390" } } }, { "category": "product_version", "name": "krb5-devel-0:1.3.4-62.el4_8.3.s390", "product": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.s390", "product_id": "krb5-devel-0:1.3.4-62.el4_8.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.3.4-62.el4_8.3?arch=s390" } } }, { "category": "product_version", "name": "krb5-devel-0:1.6.1-36.el5_5.6.s390", "product": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.s390", "product_id": "krb5-devel-0:1.6.1-36.el5_5.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.6.1-36.el5_5.6?arch=s390" } } }, { "category": "product_version", "name": "krb5-libs-0:1.6.1-36.el5_5.6.s390", "product": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.s390", "product_id": "krb5-libs-0:1.6.1-36.el5_5.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.6.1-36.el5_5.6?arch=s390" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "product": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "product_id": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.6.1-36.el5_5.6?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.3.4-62.el4_8.3.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-0:1.3.4-62.el4_8.3.src" }, "product_reference": "krb5-0:1.3.4-62.el4_8.3.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-devel-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-devel-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-devel-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-devel-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-devel-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-devel-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-libs-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-libs-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-libs-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-libs-0:1.3.4-62.el4_8.3.ppc64" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-libs-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-libs-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-libs-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-server-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-server-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-server-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-server-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-server-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-server-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.3.4-62.el4_8.3.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-0:1.3.4-62.el4_8.3.src" }, "product_reference": "krb5-0:1.3.4-62.el4_8.3.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.ppc64" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.3.4-62.el4_8.3.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-0:1.3.4-62.el4_8.3.src" }, "product_reference": "krb5-0:1.3.4-62.el4_8.3.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-devel-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-devel-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-devel-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-devel-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-devel-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-devel-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-libs-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-libs-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-libs-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-libs-0:1.3.4-62.el4_8.3.ppc64" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-libs-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-libs-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-libs-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-server-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-server-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-server-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-server-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-server-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-server-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.3.4-62.el4_8.3.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-0:1.3.4-62.el4_8.3.src" }, "product_reference": "krb5-0:1.3.4-62.el4_8.3.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-devel-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-devel-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-devel-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-devel-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-devel-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-devel-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-libs-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-libs-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-libs-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-libs-0:1.3.4-62.el4_8.3.ppc64" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-libs-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-libs-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-libs-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-server-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-server-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-server-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-server-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-server-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-server-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-server-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.i386" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.ia64" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.ppc" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.s390" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.s390x" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-62.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64" }, "product_reference": "krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.6.1-36.el5_5.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-0:1.6.1-36.el5_5.6.src" }, "product_reference": "krb5-0:1.6.1-36.el5_5.6.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.ppc64" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.s390" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.ppc64" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.s390" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.6.1-36.el5_5.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-0:1.6.1-36.el5_5.6.src" }, "product_reference": "krb5-0:1.6.1-36.el5_5.6.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-devel-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-devel-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-devel-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-devel-0:1.6.1-36.el5_5.6.ppc64" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-devel-0:1.6.1-36.el5_5.6.s390" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-devel-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-devel-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-libs-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-libs-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-libs-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-libs-0:1.6.1-36.el5_5.6.ppc64" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-libs-0:1.6.1-36.el5_5.6.s390" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-libs-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-libs-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-server-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-server-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-server-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-server-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-server-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.6.1-36.el5_5.6.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-0:1.6.1-36.el5_5.6.src" }, "product_reference": "krb5-0:1.6.1-36.el5_5.6.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-devel-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-devel-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-devel-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-devel-0:1.6.1-36.el5_5.6.ppc64" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-devel-0:1.6.1-36.el5_5.6.s390" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-devel-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-devel-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-libs-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-libs-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-libs-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-libs-0:1.6.1-36.el5_5.6.ppc64" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-libs-0:1.6.1-36.el5_5.6.s390" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-libs-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-libs-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-server-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-server-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-server-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-server-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-server-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-server-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.i386" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.ia64" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.ppc" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.s390x" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.6.1-36.el5_5.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.x86_64" }, "product_reference": "krb5-workstation-0:1.6.1-36.el5_5.6.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "MIT Kerberos Team" ] } ], "cve": "CVE-2010-1323", "discovery_date": "2010-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648734" } ], "notes": [ { "category": "description", "text": "MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.", "title": "Vulnerability description" }, { "category": "summary", "text": "krb5: incorrect acceptance of certain checksums (MITKRB5-SA-2010-007)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:krb5-0:1.3.4-62.el4_8.3.src", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "4AS:krb5-server-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-server-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-server-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-server-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-server-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-server-0:1.3.4-62.el4_8.3.x86_64", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-0:1.3.4-62.el4_8.3.src", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-0:1.3.4-62.el4_8.3.src", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-server-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-server-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-server-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-server-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-server-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-server-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-0:1.3.4-62.el4_8.3.src", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-server-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-server-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-server-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-server-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-server-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-server-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "5Client-Workstation:krb5-0:1.6.1-36.el5_5.6.src", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.s390", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.s390", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.x86_64", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-0:1.6.1-36.el5_5.6.src", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.s390", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.s390", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-server-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-server-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-server-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-server-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-server-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-0:1.6.1-36.el5_5.6.src", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.s390", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.s390", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-server-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-server-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-server-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-server-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-server-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1323" }, { "category": "external", "summary": "RHBZ#648734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1323", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1323" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1323", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1323" } ], "release_date": "2010-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-30T22:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:krb5-0:1.3.4-62.el4_8.3.src", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "4AS:krb5-server-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-server-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-server-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-server-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-server-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-server-0:1.3.4-62.el4_8.3.x86_64", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-0:1.3.4-62.el4_8.3.src", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-0:1.3.4-62.el4_8.3.src", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-server-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-server-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-server-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-server-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-server-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-server-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-0:1.3.4-62.el4_8.3.src", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-server-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-server-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-server-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-server-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-server-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-server-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "5Client-Workstation:krb5-0:1.6.1-36.el5_5.6.src", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.s390", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.s390", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.x86_64", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-0:1.6.1-36.el5_5.6.src", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.s390", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.s390", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-server-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-server-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-server-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-server-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-server-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-0:1.6.1-36.el5_5.6.src", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.s390", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.s390", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-server-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-server-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-server-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-server-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-server-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0926" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS:krb5-0:1.3.4-62.el4_8.3.src", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "4AS:krb5-server-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-server-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-server-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-server-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-server-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-server-0:1.3.4-62.el4_8.3.x86_64", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.i386", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.s390", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "4AS:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-0:1.3.4-62.el4_8.3.src", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-server-0:1.3.4-62.el4_8.3.x86_64", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.i386", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.s390", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "4Desktop:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-0:1.3.4-62.el4_8.3.src", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-server-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-server-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-server-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-server-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-server-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-server-0:1.3.4-62.el4_8.3.x86_64", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.i386", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.s390", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "4ES:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-0:1.3.4-62.el4_8.3.src", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.ppc64", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-debuginfo-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-devel-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.ppc64", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-libs-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-server-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-server-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-server-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-server-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-server-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-server-0:1.3.4-62.el4_8.3.x86_64", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.i386", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.ia64", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.ppc", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.s390", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.s390x", "4WS:krb5-workstation-0:1.3.4-62.el4_8.3.x86_64", "5Client-Workstation:krb5-0:1.6.1-36.el5_5.6.src", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.s390", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.s390", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-server-0:1.6.1-36.el5_5.6.x86_64", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.i386", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "5Client-Workstation:krb5-workstation-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-0:1.6.1-36.el5_5.6.src", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.s390", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.s390", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-server-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-server-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-server-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-server-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-server-0:1.6.1-36.el5_5.6.x86_64", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.i386", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "5Client:krb5-workstation-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-0:1.6.1-36.el5_5.6.src", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.ppc64", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-debuginfo-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.ppc64", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.s390", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-devel-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.ppc64", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.s390", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-libs-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-server-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-server-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-server-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-server-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-server-0:1.6.1-36.el5_5.6.x86_64", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.i386", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.ia64", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.ppc", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.s390x", "5Server:krb5-workstation-0:1.6.1-36.el5_5.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "krb5: incorrect acceptance of certain checksums (MITKRB5-SA-2010-007)" } ] }
wid-sec-w-2022-0602
Vulnerability from csaf_certbund
Published
2022-07-06 22:00
Modified
2024-01-17 23:00
Summary
IBM Security Verify Access: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Security Verify Access, ehemals IBM Security Access Manager (ISAM), ist eine Zugriffsverwaltungslösung.
Angriff
Ein entfernter anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann mehrere Schwachstellen in IBM Security Verify Access ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuführen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsmaßnahmen zu umgehen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Security Verify Access, ehemals IBM Security Access Manager (ISAM), ist eine Zugriffsverwaltungsl\u00f6sung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann mehrere Schwachstellen in IBM Security Verify Access ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0602 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0602.json" }, { "category": "self", "summary": "WID-SEC-2022-0602 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0602" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-07-06", "url": "https://www.ibm.com/support/pages/node/6601725" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-07-06", "url": "https://www.ibm.com/support/pages/node/6601729" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-07-06", "url": "https://www.ibm.com/support/pages/node/6601731" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-07-06", "url": "https://www.ibm.com/support/pages/node/6601733" }, { "category": "external", "summary": "IBM Security Bulletin 7108821 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108821" } ], "source_lang": "en-US", "title": "IBM Security Verify Access: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-17T23:00:00.000+00:00", "generator": { "date": "2024-02-15T16:52:22.007+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0602", "initial_release_date": "2022-07-06T22:00:00.000+00:00", "revision_history": [ { "date": "2022-07-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Security Verify Access 10.0.0", "product": { "name": "IBM Security Verify Access 10.0.0", "product_id": "822913", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0" } } }, { "category": "product_name", "name": "IBM Security Verify Access Docker 10.0.0", "product": { "name": "IBM Security Verify Access Docker 10.0.0", "product_id": "T019827", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:docker_container__10.0.2.0" } } }, { "category": "product_name", "name": "IBM Security Verify Access 10.0.0.0 - 10.0.6.1", "product": { "name": "IBM Security Verify Access 10.0.0.0 - 10.0.6.1", "product_id": "T031895", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0.0_-_10.0.6.1" } } } ], "category": "product_name", "name": "Security Verify Access" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-1323", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2010-1323" }, { "cve": "CVE-2010-1324", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2010-1324" }, { "cve": "CVE-2010-4020", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2010-4020" }, { "cve": "CVE-2010-4021", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2010-4021" }, { "cve": "CVE-2017-11692", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2017-11692" }, { "cve": "CVE-2018-20217", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2018-20217" }, { "cve": "CVE-2018-20573", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2018-20573" }, { "cve": "CVE-2018-20574", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2018-20574" }, { "cve": "CVE-2018-5730", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2018-5730" }, { "cve": "CVE-2019-6285", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2019-6285" }, { "cve": "CVE-2020-28196", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2020-28196" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2022-22370", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-22370" }, { "cve": "CVE-2022-22463", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-22463" }, { "cve": "CVE-2022-22464", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-22464" }, { "cve": "CVE-2022-22465", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-22465" }, { "cve": "CVE-2022-23308", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-23308" } ] }
WID-SEC-W-2022-0602
Vulnerability from csaf_certbund
Published
2022-07-06 22:00
Modified
2024-01-17 23:00
Summary
IBM Security Verify Access: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Security Verify Access, ehemals IBM Security Access Manager (ISAM), ist eine Zugriffsverwaltungslösung.
Angriff
Ein entfernter anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann mehrere Schwachstellen in IBM Security Verify Access ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuführen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsmaßnahmen zu umgehen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Security Verify Access, ehemals IBM Security Access Manager (ISAM), ist eine Zugriffsverwaltungsl\u00f6sung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann mehrere Schwachstellen in IBM Security Verify Access ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0602 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0602.json" }, { "category": "self", "summary": "WID-SEC-2022-0602 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0602" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-07-06", "url": "https://www.ibm.com/support/pages/node/6601725" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-07-06", "url": "https://www.ibm.com/support/pages/node/6601729" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-07-06", "url": "https://www.ibm.com/support/pages/node/6601731" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-07-06", "url": "https://www.ibm.com/support/pages/node/6601733" }, { "category": "external", "summary": "IBM Security Bulletin 7108821 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108821" } ], "source_lang": "en-US", "title": "IBM Security Verify Access: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-17T23:00:00.000+00:00", "generator": { "date": "2024-02-15T16:52:22.007+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0602", "initial_release_date": "2022-07-06T22:00:00.000+00:00", "revision_history": [ { "date": "2022-07-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Security Verify Access 10.0.0", "product": { "name": "IBM Security Verify Access 10.0.0", "product_id": "822913", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0" } } }, { "category": "product_name", "name": "IBM Security Verify Access Docker 10.0.0", "product": { "name": "IBM Security Verify Access Docker 10.0.0", "product_id": "T019827", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:docker_container__10.0.2.0" } } }, { "category": "product_name", "name": "IBM Security Verify Access 10.0.0.0 - 10.0.6.1", "product": { "name": "IBM Security Verify Access 10.0.0.0 - 10.0.6.1", "product_id": "T031895", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0.0_-_10.0.6.1" } } } ], "category": "product_name", "name": "Security Verify Access" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-1323", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2010-1323" }, { "cve": "CVE-2010-1324", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2010-1324" }, { "cve": "CVE-2010-4020", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2010-4020" }, { "cve": "CVE-2010-4021", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2010-4021" }, { "cve": "CVE-2017-11692", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2017-11692" }, { "cve": "CVE-2018-20217", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2018-20217" }, { "cve": "CVE-2018-20573", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2018-20573" }, { "cve": "CVE-2018-20574", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2018-20574" }, { "cve": "CVE-2018-5730", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2018-5730" }, { "cve": "CVE-2019-6285", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2019-6285" }, { "cve": "CVE-2020-28196", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2020-28196" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2022-22370", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-22370" }, { "cve": "CVE-2022-22463", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-22463" }, { "cve": "CVE-2022-22464", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-22464" }, { "cve": "CVE-2022-22465", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-22465" }, { "cve": "CVE-2022-23308", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-23308" } ] }
ghsa-j54m-cwfx-hj5g
Vulnerability from github
Published
2022-05-02 06:21
Modified
2022-05-02 06:21
Severity ?
Details
MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
{ "affected": [], "aliases": [ "CVE-2010-1323" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-12-02T16:22:00Z", "severity": "LOW" }, "details": "MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.", "id": "GHSA-j54m-cwfx-hj5g", "modified": "2022-05-02T06:21:36Z", "published": "2022-05-02T06:21:36Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1323" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121" }, { "type": "WEB", "url": "http://kb.vmware.com/kb/1035108" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html" }, { "type": "WEB", "url": "http://lists.vmware.com/pipermail/security-announce/2011/000133.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=129562442714657\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=130497213107107\u0026w=2" }, { "type": "WEB", "url": "http://osvdb.org/69610" }, { "type": "WEB", "url": "http://secunia.com/advisories/42399" }, { "type": "WEB", "url": "http://secunia.com/advisories/42420" }, { "type": "WEB", "url": "http://secunia.com/advisories/42436" }, { "type": "WEB", "url": "http://secunia.com/advisories/43015" }, { "type": "WEB", "url": "http://secunia.com/advisories/46397" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT4581" }, { "type": "WEB", "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt" }, { "type": "WEB", "url": "http://www.debian.org/security/2010/dsa-2129" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:245" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:246" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0925.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0926.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/514953/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/517739/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/45118" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1024803" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1030-1" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0007.html" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3094" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3095" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3101" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3118" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0187" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ] }
gsd-2010-1323
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2010-1323", "description": "MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.", "id": "GSD-2010-1323", "references": [ "https://www.suse.com/security/cve/CVE-2010-1323.html", "https://www.debian.org/security/2010/dsa-2129", "https://access.redhat.com/errata/RHSA-2010:0926", "https://access.redhat.com/errata/RHSA-2010:0925", "https://linux.oracle.com/cve/CVE-2010-1323.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-1323" ], "details": "MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.", "id": "GSD-2010-1323", "modified": "2023-12-13T01:21:32.107403Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1323", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2012:0042", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html" }, { "name": "ADV-2010-3094", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3094" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "MDVSA-2010:246", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:246" }, { "name": "FEDORA-2010-18425", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html" }, { "name": "45118", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45118" }, { "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "name": "http://kb.vmware.com/kb/1035108", "refsource": "CONFIRM", "url": "http://kb.vmware.com/kb/1035108" }, { "name": "46397", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46397" }, { "name": "ADV-2010-3118", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3118" }, { "name": "SSRT100495", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130497213107107\u0026w=2" }, { "name": "oval:org.mitre.oval:def:12121", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121" }, { "name": "ADV-2011-0187", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0187" }, { "name": "MDVSA-2010:245", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:245" }, { "name": "69610", "refsource": "OSVDB", "url": "http://osvdb.org/69610" }, { "name": "20101130 MITKRB5-SA-2010-007 Multiple checksum handling vulnerabilities [CVE-2010-1324 CVE-2010-1323 CVE-2010-4020 CVE-2010-4021]", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514953/100/0/threaded" }, { "name": "RHSA-2010:0926", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0926.html" }, { "name": "SUSE-SR:2010:023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0007.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0007.html" }, { "name": "APPLE-SA-2011-03-21-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "name": "42420", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42420" }, { "name": "HPSBUX02623", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129562442714657\u0026w=2" }, { "name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt", "refsource": "CONFIRM", "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt" }, { "name": "SSRT100355", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129562442714657\u0026w=2" }, { "name": "ADV-2010-3095", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3095" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "name": "ADV-2010-3101", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3101" }, { "name": "42399", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42399" }, { "name": "SUSE-SU-2012:0010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html" }, { "name": "[security-announce] 20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2011/000133.html" }, { "name": "1024803", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024803" }, { "name": "20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/517739/100/0/threaded" }, { "name": "FEDORA-2010-18409", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html" }, { "name": "SUSE-SR:2010:024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "name": "RHSA-2010:0925", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0925.html" }, { "name": "USN-1030-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1030-1" }, { "name": "HPSBOV02682", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130497213107107\u0026w=2" }, { "name": "43015", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43015" }, { "name": "http://support.apple.com/kb/HT4581", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4581" }, { "name": "DSA-2129", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2129" }, { "name": "42436", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42436" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1323" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-310" } ] } ] }, "references": { "reference_data": [ { "name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt" }, { "name": "MDVSA-2010:245", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:245" }, { "name": "45118", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/45118" }, { "name": "DSA-2129", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2010/dsa-2129" }, { "name": "MDVSA-2010:246", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:246" }, { "name": "RHSA-2010:0925", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0925.html" }, { "name": "69610", "refsource": "OSVDB", "tags": [], "url": "http://osvdb.org/69610" }, { "name": "RHSA-2010:0926", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0926.html" }, { "name": "42399", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42399" }, { "name": "ADV-2010-3118", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/3118" }, { "name": "1024803", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1024803" }, { "name": "ADV-2010-3095", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/3095" }, { "name": "42436", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/42436" }, { "name": "42420", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/42420" }, { "name": "ADV-2010-3094", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/3094" }, { "name": "ADV-2010-3101", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/3101" }, { "name": "FEDORA-2010-18409", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html" }, { "name": "USN-1030-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-1030-1" }, { "name": "FEDORA-2010-18425", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html" }, { "name": "SUSE-SR:2010:023", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "name": "SUSE-SR:2010:024", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "name": "HPSBUX02623", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=129562442714657\u0026w=2" }, { "name": "ADV-2011-0187", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/0187" }, { "name": "43015", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/43015" }, { "name": "http://support.apple.com/kb/HT4581", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT4581" }, { "name": "APPLE-SA-2011-03-21-1", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0007.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0007.html" }, { "name": "http://kb.vmware.com/kb/1035108", "refsource": "CONFIRM", "tags": [], "url": "http://kb.vmware.com/kb/1035108" }, { "name": "[security-announce] 20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console", "refsource": "MLIST", "tags": [], "url": "http://lists.vmware.com/pipermail/security-announce/2011/000133.html" }, { "name": "SSRT100495", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=130497213107107\u0026w=2" }, { "name": "46397", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/46397" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "name": "SUSE-SU-2012:0010", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html" }, { "name": "SUSE-SU-2012:0042", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "oval:org.mitre.oval:def:12121", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121" }, { "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "name": "20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/517739/100/0/threaded" }, { "name": "20101130 MITKRB5-SA-2010-007 Multiple checksum handling vulnerabilities [CVE-2010-1324 CVE-2010-1323 CVE-2010-4020 CVE-2010-4021]", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/514953/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 1.4 } }, "lastModifiedDate": "2020-01-21T15:46Z", "publishedDate": "2010-12-02T16:22Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.