Release date:
2024-09-19 18:08:53 UTC
Description:
- CVE-2024-37370: prevent modification of Extra Count field in GSS krb5 wrap
token to avoid appearing truncated to application
- CVE-2024-37371: fix invalid memory reads during GSS message token handling
Updated packages:
-
krb5-devel-1.20.1-9.el9_2.tuxcare.els3.i686.rpm
sha:bed9337a92f88f5ff59b6b1e485e6af72dcf6042db54931deb81acd043e81952
-
krb5-devel-1.20.1-9.el9_2.tuxcare.els3.x86_64.rpm
sha:a5e45dd6b425cb87efc3c7284e76c3178a1aa361094dc831e18b26c7675aa132
-
krb5-libs-1.20.1-9.el9_2.tuxcare.els3.i686.rpm
sha:c3aebbaadaa222f34bd02b352f52d2bcb83c8632a1eebc11a19db84586dddea5
-
krb5-libs-1.20.1-9.el9_2.tuxcare.els3.x86_64.rpm
sha:ce7aaaf5348ccec2584d07db751c1e4dce88d908bb337d70ff2b1008df5191c5
-
krb5-pkinit-1.20.1-9.el9_2.tuxcare.els3.i686.rpm
sha:601085b2f0498786567a8b3277415047a0bd89ab28bb0dbb22a1f5bc1298ba68
-
krb5-pkinit-1.20.1-9.el9_2.tuxcare.els3.x86_64.rpm
sha:80cd5a55fd7723cdc11274d8298cc094358b04c37731c61ac43625ccc5898546
-
krb5-server-1.20.1-9.el9_2.tuxcare.els3.i686.rpm
sha:6455174eb2a7911b54b6a1d74f5f9ae3335e03f7ec56b7dd487304287f6cc978
-
krb5-server-1.20.1-9.el9_2.tuxcare.els3.x86_64.rpm
sha:51a11b92c0acc4448f023dac6da97af5c731a7ebd9e7f9971e84262c8649eeb2
-
krb5-server-ldap-1.20.1-9.el9_2.tuxcare.els3.i686.rpm
sha:135149008041f430fcafbe64cf4878b7c44211b82235c0aabd24cab272f38fcb
-
krb5-server-ldap-1.20.1-9.el9_2.tuxcare.els3.x86_64.rpm
sha:157ebca2629a493abd6dabeb31b167dc54654baa031467c919e730939664b998
-
krb5-workstation-1.20.1-9.el9_2.tuxcare.els3.x86_64.rpm
sha:75b890646aa7ca0718ae9c82a74284b1660e9d38ee58dd7c3249db2fe291b424
-
libkadm5-1.20.1-9.el9_2.tuxcare.els3.i686.rpm
sha:efb4d0234639d3eef656fd5c34ab494a2d1d81d3f3faa0ebfe091b41d00ae3cc
-
libkadm5-1.20.1-9.el9_2.tuxcare.els3.x86_64.rpm
sha:9153a0fad19106f683321da76a206f97a3e48f7353d7b5cfbd13d82053ec6ee3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.