Bug 234643 (CVE-2006-5052) - CVE-2006-5052 Kerberos information leak
Summary: CVE-2006-5052 Kerberos information leak
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2006-5052
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Tomas Mraz
QA Contact: Brian Brock
URL:
Whiteboard:
: 208349 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-03-30 19:09 UTC by Miloslav Trmač
Modified: 2021-11-12 19:34 UTC (History)
1 user (show)

Fixed In Version: RHSA-2007-0703
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2007-11-15 14:58:07 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0703 0 normal SHIPPED_LIVE Moderate: openssh security and bug fix update 2007-11-15 14:57:55 UTC

Description Miloslav Trmač 2007-03-30 19:09:15 UTC
From the openssh-4.3 changelog:
* Fix timing variance for valid vs. invalid accounts when attempting
  Kerberos authentication (Bugzilla #975)

Comment 1 Josh Bressers 2007-03-30 19:52:21 UTC
*** Bug 208349 has been marked as a duplicate of this bug. ***

Comment 2 RHEL Program Management 2007-05-09 05:06:29 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
release.

Comment 7 errata-xmlrpc 2007-11-15 14:58:07 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2007-0703.html



Note You need to log in before you can comment on or make changes to this bug.