[CLSA-2025:1756110212] krb5: Fix of 2 CVEs
Type:
security
Severity:
Moderate
Release date:
2025-08-25 08:23:36 UTC
Description:
- CVE-2025-3576: prevent spoofing vulnerability in GSSAPI-protected messages using RC4-HMAC-MD5 due to weaknesses in MD5 checksum design - CVE-2025-24528: prevent overflow when calculating ulog block size
Updated packages:
  • krb5-devel-1.20.1-9.el9_2.tuxcare.els8.i686.rpm
    sha:0c727ad5500eddb701fb21900e364ea7d842c305928dbfaf5437825c35f5c2e2
  • krb5-devel-1.20.1-9.el9_2.tuxcare.els8.x86_64.rpm
    sha:d20f1ecb2a59e2a28d69a48e14094bfce835b885bf2de81809b09543f1f72851
  • krb5-libs-1.20.1-9.el9_2.tuxcare.els8.i686.rpm
    sha:804a29f5b7dd5b83e08e6a674d20c476df8fffad08570ad10a5435a495de39a3
  • krb5-libs-1.20.1-9.el9_2.tuxcare.els8.x86_64.rpm
    sha:36ea82a344b5f14da325203e4eae3fc9c77eaecd4a69914862fb1dcb5545fa86
  • krb5-pkinit-1.20.1-9.el9_2.tuxcare.els8.i686.rpm
    sha:c95a1937edf7be6f86a138eaabb3ed20506d74e67e5cbc3594f103d561f0a292
  • krb5-pkinit-1.20.1-9.el9_2.tuxcare.els8.x86_64.rpm
    sha:18e1d7d1c3608b10f9cced248e8929b298ff7c36796a22ce5c59d160a6a72941
  • krb5-server-1.20.1-9.el9_2.tuxcare.els8.i686.rpm
    sha:344be7111b34d7f72ebccb835b9a73a6807bee963313f90ccd251ec1b0d2f9a4
  • krb5-server-1.20.1-9.el9_2.tuxcare.els8.x86_64.rpm
    sha:d40a0866c41fa387ad2f9bc32d5a5edad5594aa6af434d18c33f8fea0f384dac
  • krb5-server-ldap-1.20.1-9.el9_2.tuxcare.els8.i686.rpm
    sha:95c7b63005e078b1742f560fcf27aaa86db70c64ecc3284027e51f454ad72d4e
  • krb5-server-ldap-1.20.1-9.el9_2.tuxcare.els8.x86_64.rpm
    sha:718485020f4ef7299dd2c20d4600bca417e11689defc074258e12db6510f997e
  • krb5-workstation-1.20.1-9.el9_2.tuxcare.els8.x86_64.rpm
    sha:da1693b7e61dea876cdfa23fcc9782efec8d64a3ddae80ee99da15587c345519
  • libkadm5-1.20.1-9.el9_2.tuxcare.els8.i686.rpm
    sha:cc270a3fd9300f7b9c768963d15a4f80752dc0f833409c50c4e7d0f290198fa6
  • libkadm5-1.20.1-9.el9_2.tuxcare.els8.x86_64.rpm
    sha:85d2b2346ffb866a0cc222f1c0d139e8a30f91376131706fda1e75b25788d801
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.