[CLSA-2024:1733141074] krb5: Fix of 2 CVEs
Type:
security
Severity:
Moderate
Release date:
2024-12-02 12:04:40 UTC
Description:
- CVE-2024-26458: Fix memory leak vulnerability in src/lib/rpc/pmap_rmt.c - CVE-2024-26461: Fix memory leak vulnerability in src/lib/gssapi/krb5/k5sealv3.c
Updated packages:
  • krb5-devel-1.20.1-9.el9_2.tuxcare.els6.i686.rpm
    sha:4a02e929f854f86eb3a4b624de21135db3b682d7d11eee1613eff8ac74e92b44
  • krb5-devel-1.20.1-9.el9_2.tuxcare.els6.x86_64.rpm
    sha:597afc649928bdaf2a5974e1463fc98622f03df3d502d07ed0603620c02da111
  • krb5-libs-1.20.1-9.el9_2.tuxcare.els6.i686.rpm
    sha:114375abbc694778405dc60279ed470531200662a2655721c449237b9a8b1278
  • krb5-libs-1.20.1-9.el9_2.tuxcare.els6.x86_64.rpm
    sha:5ab2de95f82fac513fc3f8cbbeab21740b8083756f97a9999e5157edd3b1db89
  • krb5-pkinit-1.20.1-9.el9_2.tuxcare.els6.i686.rpm
    sha:622bd7ad55dce605bf5687b8a481c575bd3b0d7b3f252effd8bc5c77c7f451f2
  • krb5-pkinit-1.20.1-9.el9_2.tuxcare.els6.x86_64.rpm
    sha:01281194a9f51c4ba2212a2355ea5453122aa71b34d3e6d2e9cb9dec353feb38
  • krb5-server-1.20.1-9.el9_2.tuxcare.els6.i686.rpm
    sha:e6af18186f239e72d6e224f31e91be13935c888fac5dd2f1f7c12a2db0e0d376
  • krb5-server-1.20.1-9.el9_2.tuxcare.els6.x86_64.rpm
    sha:2c3d3f1f6540702acada9655ec8979e05d7a7669b64642839d5ab8d0d9fd7770
  • krb5-server-ldap-1.20.1-9.el9_2.tuxcare.els6.i686.rpm
    sha:be0d7d285c0c5b9bc94abf03a56ad857aa59d7f049c863184aa22acd7fa9a594
  • krb5-server-ldap-1.20.1-9.el9_2.tuxcare.els6.x86_64.rpm
    sha:90aaccfb03f3307b11e88f742122bbf7e5d8289a586dc548695b34337979211b
  • krb5-workstation-1.20.1-9.el9_2.tuxcare.els6.x86_64.rpm
    sha:439c22eff419224d374ca72264da38b3f02dc9c990b4d0bc1fbd927a47bbc5ea
  • libkadm5-1.20.1-9.el9_2.tuxcare.els6.i686.rpm
    sha:2a0bc4f341658bd98c72165330a534641c67122d2eeb2d77c31d16656eb51fc2
  • libkadm5-1.20.1-9.el9_2.tuxcare.els6.x86_64.rpm
    sha:c3b90cc9ba1bec72ff7619b1634cc44cb42125ee6433caeb0de6b95e411f4ea3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.