Updated krb5 packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 6.Red Hat Product Security has rated this update as having Moderate securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section.

Kerberos is a networked authentication system which allows clients andservers to authenticate to each other with the help of a trusted thirdparty, the Kerberos KDC.The following security issues are fixed with this release:A use-after-free flaw was found in the way the MIT Kerberos libgssapi_krb5library processed valid context deletion tokens. An attacker able to makean application using the GSS-API library (libgssapi) could call thegss_process_context_token() function and use this flaw to crash thatapplication. (CVE-2014-5352)If kadmind were used with an LDAP back end for the KDC database, a remote,authenticated attacker who has the permissions to set the password policycould crash kadmind by attempting to use a named ticket policy object as apassword policy for a principal. (CVE-2014-5353)It was found that the krb5_read_message() function of MIT Kerberos did notcorrectly sanitize input, and could create invalid krb5_data objects.A remote, unauthenticated attacker could use this flaw to crash a Kerberoschild process via a specially crafted request. (CVE-2014-5355)A double-free flaw was found in the way MIT Kerberos handled invalidExternal Data Representation (XDR) data. An authenticated user could usethis flaw to crash the MIT Kerberos administration server (kadmind), orother applications using Kerberos libraries, via specially crafted XDRpackets. (CVE-2014-9421)It was found that the MIT Kerberos administration server (kadmind)incorrectly accepted certain authentication requests for two-componentserver principal names. A remote attacker able to acquire a key with aparticularly named principal (such as “kad/x”) could use this flaw toimpersonate any user to kadmind, and perform administrative actions as thatuser. (CVE-2014-9422)Red Hat would like to thank the MIT Kerberos project for reportingCVE-2014-5352, CVE-2014-9421, and CVE-2014-9422. The MIT Kerberos projectacknowledges Nico Williams for assisting with the analysis ofCVE-2014-5352.All krb5 users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues.
Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
krb5-1.10.3-37.el6_6.src.rpm
    MD5: 82fd1998cd283b35d7458398505ec74aSHA-256: 30b5e8045674bbcc3764a9e4e669e884f2d34e0ff2ebc7032424db5b7ed00858
 
IA-32:
krb5-debuginfo-1.10.3-37.el6_6.i686.rpm
    MD5: 5c2c26dde632f8bf841e1a32dd541136SHA-256: b7377c77bce5b1b0a11b8ce7ee64efd2bccf9c75acfef8e0aa7d3f0da118296a
krb5-devel-1.10.3-37.el6_6.i686.rpm
    MD5: be4722a245136d10927de8f9a80524d3SHA-256: 2957946d355612f4c9922590b280c27fdd116ff975b65054b49479a6de858f84
krb5-libs-1.10.3-37.el6_6.i686.rpm
    MD5: 20cca108e00d6f527374ea12165a6af0SHA-256: 8878ef351789dfd6bc32974a53e5b66684222e1b826b8a4e792dc3b6598eaeeb
krb5-pkinit-openssl-1.10.3-37.el6_6.i686.rpm
    MD5: 0572dbc1f05ba2e55f592c9a46875d8bSHA-256: 9278ad3e0d2ab18ce39d0a01c7000d586f414a29982bd27f51eb9b5bfb76dd2d
krb5-server-1.10.3-37.el6_6.i686.rpm
    MD5: 0042c8341c5f10c7367bf257c2d3bdc9SHA-256: 90f4d6afcc1093eebbd2ff0f0534f938861b0647230447915b0327df93b4895f
krb5-server-ldap-1.10.3-37.el6_6.i686.rpm
    MD5: ee978d67dace049babb777456507d5a1SHA-256: 87a3421254431569c2546c655e80a166097b93c0e93c5e623d9619feacb90a69
krb5-workstation-1.10.3-37.el6_6.i686.rpm
    MD5: e797e42ee52ba688ed4461f2ed0431bbSHA-256: c2561a0bdeb9ba6e6bad974eba6207d26f7b556a3eb679a3d92b9778d043d54a
 
x86_64:
krb5-debuginfo-1.10.3-37.el6_6.i686.rpm
    MD5: 5c2c26dde632f8bf841e1a32dd541136SHA-256: b7377c77bce5b1b0a11b8ce7ee64efd2bccf9c75acfef8e0aa7d3f0da118296a
krb5-debuginfo-1.10.3-37.el6_6.x86_64.rpm
    MD5: d088427eaed53ee8c217e62f89ee2f6fSHA-256: 526c25e765581ca4d376bf24b362d5ba52ebaaa7c3a44f77570db006f16f9f2d
krb5-devel-1.10.3-37.el6_6.i686.rpm
    MD5: be4722a245136d10927de8f9a80524d3SHA-256: 2957946d355612f4c9922590b280c27fdd116ff975b65054b49479a6de858f84
krb5-devel-1.10.3-37.el6_6.x86_64.rpm
    MD5: d2f6aa3cfeffb8eea195a8baabef7158SHA-256: e64e16b5cc5ef6c7a43595b6d2e1a1803519d91abfc65bc18032e38d4902a0b1
krb5-libs-1.10.3-37.el6_6.i686.rpm
    MD5: 20cca108e00d6f527374ea12165a6af0SHA-256: 8878ef351789dfd6bc32974a53e5b66684222e1b826b8a4e792dc3b6598eaeeb
krb5-libs-1.10.3-37.el6_6.x86_64.rpm
    MD5: b071a9a3d54dd5227b114163ede52ff1SHA-256: 617b8f6b9298263e104a080af7d018f9cf4305c8066ea3e955a97c2e91ce6444
krb5-pkinit-openssl-1.10.3-37.el6_6.x86_64.rpm
    MD5: 8fd5532d2f0bf9e6d55a3bd260ccdbe7SHA-256: 3a8a48162a01ccb48f86dd2d45b2c12431df4c5eaccb874b46db933cd89e41bb
krb5-server-1.10.3-37.el6_6.x86_64.rpm
    MD5: d36e7add701e0425ba8283d3f52814c7SHA-256: b497021150d4cb18006f069a31190c96cbad7e4d29cbb469fc3ba6c09e3d6c07
krb5-server-ldap-1.10.3-37.el6_6.i686.rpm
    MD5: ee978d67dace049babb777456507d5a1SHA-256: 87a3421254431569c2546c655e80a166097b93c0e93c5e623d9619feacb90a69
krb5-server-ldap-1.10.3-37.el6_6.x86_64.rpm
    MD5: e26491e67a8466ce67a653e3878928c4SHA-256: 3ccf6c34719e00aa314b1ea8ffd378e606dc8fb0c04bab0f3080f1f8777bf741
krb5-workstation-1.10.3-37.el6_6.x86_64.rpm
    MD5: 963669cef9f69706f89aa9bbc6bc1290SHA-256: e8895107720dd88699029d53d043cd0345bfa8e05bd2453f1e509d2ce7df7de7
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
krb5-1.10.3-37.el6_6.src.rpm
    MD5: 82fd1998cd283b35d7458398505ec74aSHA-256: 30b5e8045674bbcc3764a9e4e669e884f2d34e0ff2ebc7032424db5b7ed00858
 
x86_64:
krb5-debuginfo-1.10.3-37.el6_6.i686.rpm
    MD5: 5c2c26dde632f8bf841e1a32dd541136SHA-256: b7377c77bce5b1b0a11b8ce7ee64efd2bccf9c75acfef8e0aa7d3f0da118296a
krb5-debuginfo-1.10.3-37.el6_6.x86_64.rpm
    MD5: d088427eaed53ee8c217e62f89ee2f6fSHA-256: 526c25e765581ca4d376bf24b362d5ba52ebaaa7c3a44f77570db006f16f9f2d
krb5-devel-1.10.3-37.el6_6.i686.rpm
    MD5: be4722a245136d10927de8f9a80524d3SHA-256: 2957946d355612f4c9922590b280c27fdd116ff975b65054b49479a6de858f84
krb5-devel-1.10.3-37.el6_6.x86_64.rpm
    MD5: d2f6aa3cfeffb8eea195a8baabef7158SHA-256: e64e16b5cc5ef6c7a43595b6d2e1a1803519d91abfc65bc18032e38d4902a0b1
krb5-libs-1.10.3-37.el6_6.i686.rpm
    MD5: 20cca108e00d6f527374ea12165a6af0SHA-256: 8878ef351789dfd6bc32974a53e5b66684222e1b826b8a4e792dc3b6598eaeeb
krb5-libs-1.10.3-37.el6_6.x86_64.rpm
    MD5: b071a9a3d54dd5227b114163ede52ff1SHA-256: 617b8f6b9298263e104a080af7d018f9cf4305c8066ea3e955a97c2e91ce6444
krb5-pkinit-openssl-1.10.3-37.el6_6.x86_64.rpm
    MD5: 8fd5532d2f0bf9e6d55a3bd260ccdbe7SHA-256: 3a8a48162a01ccb48f86dd2d45b2c12431df4c5eaccb874b46db933cd89e41bb
krb5-server-1.10.3-37.el6_6.x86_64.rpm
    MD5: d36e7add701e0425ba8283d3f52814c7SHA-256: b497021150d4cb18006f069a31190c96cbad7e4d29cbb469fc3ba6c09e3d6c07
krb5-server-ldap-1.10.3-37.el6_6.i686.rpm
    MD5: ee978d67dace049babb777456507d5a1SHA-256: 87a3421254431569c2546c655e80a166097b93c0e93c5e623d9619feacb90a69
krb5-server-ldap-1.10.3-37.el6_6.x86_64.rpm
    MD5: e26491e67a8466ce67a653e3878928c4SHA-256: 3ccf6c34719e00aa314b1ea8ffd378e606dc8fb0c04bab0f3080f1f8777bf741
krb5-workstation-1.10.3-37.el6_6.x86_64.rpm
    MD5: 963669cef9f69706f89aa9bbc6bc1290SHA-256: e8895107720dd88699029d53d043cd0345bfa8e05bd2453f1e509d2ce7df7de7
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
krb5-1.10.3-37.el6_6.src.rpm
    MD5: 82fd1998cd283b35d7458398505ec74aSHA-256: 30b5e8045674bbcc3764a9e4e669e884f2d34e0ff2ebc7032424db5b7ed00858
 
IA-32:
krb5-debuginfo-1.10.3-37.el6_6.i686.rpm
    MD5: 5c2c26dde632f8bf841e1a32dd541136SHA-256: b7377c77bce5b1b0a11b8ce7ee64efd2bccf9c75acfef8e0aa7d3f0da118296a
krb5-devel-1.10.3-37.el6_6.i686.rpm
    MD5: be4722a245136d10927de8f9a80524d3SHA-256: 2957946d355612f4c9922590b280c27fdd116ff975b65054b49479a6de858f84
krb5-libs-1.10.3-37.el6_6.i686.rpm
    MD5: 20cca108e00d6f527374ea12165a6af0SHA-256: 8878ef351789dfd6bc32974a53e5b66684222e1b826b8a4e792dc3b6598eaeeb
krb5-pkinit-openssl-1.10.3-37.el6_6.i686.rpm
    MD5: 0572dbc1f05ba2e55f592c9a46875d8bSHA-256: 9278ad3e0d2ab18ce39d0a01c7000d586f414a29982bd27f51eb9b5bfb76dd2d
krb5-server-1.10.3-37.el6_6.i686.rpm
    MD5: 0042c8341c5f10c7367bf257c2d3bdc9SHA-256: 90f4d6afcc1093eebbd2ff0f0534f938861b0647230447915b0327df93b4895f
krb5-server-ldap-1.10.3-37.el6_6.i686.rpm
    MD5: ee978d67dace049babb777456507d5a1SHA-256: 87a3421254431569c2546c655e80a166097b93c0e93c5e623d9619feacb90a69
krb5-workstation-1.10.3-37.el6_6.i686.rpm
    MD5: e797e42ee52ba688ed4461f2ed0431bbSHA-256: c2561a0bdeb9ba6e6bad974eba6207d26f7b556a3eb679a3d92b9778d043d54a
 
PPC:
krb5-debuginfo-1.10.3-37.el6_6.ppc.rpm
    MD5: 514d6c1477625e7e4accbc2e820942b7SHA-256: 5f009c62cfbaf432adca0a070451d36689ab5b23e79f8453d6d980698b824373
krb5-debuginfo-1.10.3-37.el6_6.ppc64.rpm
    MD5: c20f18fd320a6caad69ac53746183e7fSHA-256: db86d48bf36a57352b38a0551c2b8791a8b80f5ae57e39cffc5c49635346c82b
krb5-devel-1.10.3-37.el6_6.ppc.rpm
    MD5: c81e89749f0b44c83f7edc85050cb6fdSHA-256: e17f83a9d19e21d541722feec98cd77798aa37a60905d44b9e8ddf7592249364
krb5-devel-1.10.3-37.el6_6.ppc64.rpm
    MD5: 0158e5cbab66f5db15dbad594161e6bcSHA-256: 4dcd2bd572ee1c65f65b82757c65425436fb42b10c8292bd51e96c4fe9974b9f
krb5-libs-1.10.3-37.el6_6.ppc.rpm
    MD5: 3d15f20f62908009b8fe45d880d9c5c4SHA-256: 66ad42118f9286734f3a652895c366d963e3a11b7b956ed00e7f89fcf95ffbc5
krb5-libs-1.10.3-37.el6_6.ppc64.rpm
    MD5: 0b6549aa659404da9a56fc307fa3601aSHA-256: 9518ab9f5ebb4521670f8b28f63c555ef4ea734f66976309a313b54b322b40ef
krb5-pkinit-openssl-1.10.3-37.el6_6.ppc64.rpm
    MD5: 5d5c4efafb493d27a4bc6a81d5c63bdeSHA-256: f06655d0084cd07e3079e54cd2cfac581ae8a772f0a0f96cdfab595e4a040363
krb5-server-1.10.3-37.el6_6.ppc64.rpm
    MD5: 9925737c4b4b2b476cf90b92c604412dSHA-256: aac21e6200c6a1333b35d00143acd9032c14c4b590e8f1cea5cb6a20525d3a5c
krb5-server-ldap-1.10.3-37.el6_6.ppc.rpm
    MD5: 475ec6e9e6ba1bf6400c774daa00a73eSHA-256: d69aabd26405f9b90d8514c9cc65fed8091687775e0d9dac7f58eb2e7795ef46
krb5-server-ldap-1.10.3-37.el6_6.ppc64.rpm
    MD5: 23bbc84bb58ec0713c4a93ecd6d0335fSHA-256: 4857749e048a6c404dd2011768d5262fc286ad1cebb5d834ca3f10ebe3dda6fd
krb5-workstation-1.10.3-37.el6_6.ppc64.rpm
    MD5: d99e0798e3ff576f7226f7ae698e0ed5SHA-256: cd8c3fccde655ce628c60b029fcc19883353c81774c9ad67dd7915ce809cbff9
 
s390x:
krb5-debuginfo-1.10.3-37.el6_6.s390.rpm
    MD5: e21937ec138ef1284c7f504272255605SHA-256: 03f1eb670b31457720970fab551a1d5178380f7035583e7c0e164490424ebd5f
krb5-debuginfo-1.10.3-37.el6_6.s390x.rpm
    MD5: 5a9f8bb529b9a413ffc287a73cfb6923SHA-256: ee95961aecdc883907c64dcbcdad26bfe664072cb0447747993df134c09c2110
krb5-devel-1.10.3-37.el6_6.s390.rpm
    MD5: 393c582f8d75ae2caa5de15c73e40ddeSHA-256: 59b2523a8596eba3eb47b87d1839ce0a3fc984d1e5b20bf8465158810fcc7359
krb5-devel-1.10.3-37.el6_6.s390x.rpm
    MD5: 7bcf143f962b28ee4d16b76b857ba491SHA-256: 861b2d37b66a9eb284080bdf7159d8322ac90ca751f195dd6a3e544d6f7a685d
krb5-libs-1.10.3-37.el6_6.s390.rpm
    MD5: 6418defd06342eba1b2efde9c80c9664SHA-256: c17da90ddb66ab3194d3563a2fe32d6bcb051878dad1999ae82092733ddb21d8
krb5-libs-1.10.3-37.el6_6.s390x.rpm
    MD5: 634b702131bdad634e32b6b8d6fb739dSHA-256: 53dac1313981817e46a95aabcd70747b398f91c2c53704238fb81c3307284ca0
krb5-pkinit-openssl-1.10.3-37.el6_6.s390x.rpm
    MD5: 12e07c3fa96dc01d95b93342014edaa1SHA-256: eb9962e57989950c77c6d6e7645f899f4961839095b28a1ff952e66bfe73b92a
krb5-server-1.10.3-37.el6_6.s390x.rpm
    MD5: 7a1994a7dfff3af18419f76be65d5ff0SHA-256: 5bb964b58b1462a756540b7e477bc73e482bb599a609af7cbd024dd39a48f917
krb5-server-ldap-1.10.3-37.el6_6.s390.rpm
    MD5: 68077e9d655a25b494ae8d82ae2122dfSHA-256: 4b708d1e022603c80e1ceecdea64e38162bc93ea150845589aa6d9cdeef71470
krb5-server-ldap-1.10.3-37.el6_6.s390x.rpm
    MD5: 2db5fdaf358d6c2a0428e56dd7602378SHA-256: 15e590566b2957296714db2375e6263cd740e65a19b0c562b7214cedf2de5701
krb5-workstation-1.10.3-37.el6_6.s390x.rpm
    MD5: 163e9c54ab718ccc2d2a4c32593920e4SHA-256: c340389c0ad3ddf705badbbc49e3285088e06b94f33e21629c15436b8cb94150
 
x86_64:
krb5-debuginfo-1.10.3-37.el6_6.i686.rpm
    MD5: 5c2c26dde632f8bf841e1a32dd541136SHA-256: b7377c77bce5b1b0a11b8ce7ee64efd2bccf9c75acfef8e0aa7d3f0da118296a
krb5-debuginfo-1.10.3-37.el6_6.x86_64.rpm
    MD5: d088427eaed53ee8c217e62f89ee2f6fSHA-256: 526c25e765581ca4d376bf24b362d5ba52ebaaa7c3a44f77570db006f16f9f2d
krb5-devel-1.10.3-37.el6_6.i686.rpm
    MD5: be4722a245136d10927de8f9a80524d3SHA-256: 2957946d355612f4c9922590b280c27fdd116ff975b65054b49479a6de858f84
krb5-devel-1.10.3-37.el6_6.x86_64.rpm
    MD5: d2f6aa3cfeffb8eea195a8baabef7158SHA-256: e64e16b5cc5ef6c7a43595b6d2e1a1803519d91abfc65bc18032e38d4902a0b1
krb5-libs-1.10.3-37.el6_6.i686.rpm
    MD5: 20cca108e00d6f527374ea12165a6af0SHA-256: 8878ef351789dfd6bc32974a53e5b66684222e1b826b8a4e792dc3b6598eaeeb
krb5-libs-1.10.3-37.el6_6.x86_64.rpm
    MD5: b071a9a3d54dd5227b114163ede52ff1SHA-256: 617b8f6b9298263e104a080af7d018f9cf4305c8066ea3e955a97c2e91ce6444
krb5-pkinit-openssl-1.10.3-37.el6_6.x86_64.rpm
    MD5: 8fd5532d2f0bf9e6d55a3bd260ccdbe7SHA-256: 3a8a48162a01ccb48f86dd2d45b2c12431df4c5eaccb874b46db933cd89e41bb
krb5-server-1.10.3-37.el6_6.x86_64.rpm
    MD5: d36e7add701e0425ba8283d3f52814c7SHA-256: b497021150d4cb18006f069a31190c96cbad7e4d29cbb469fc3ba6c09e3d6c07
krb5-server-ldap-1.10.3-37.el6_6.i686.rpm
    MD5: ee978d67dace049babb777456507d5a1SHA-256: 87a3421254431569c2546c655e80a166097b93c0e93c5e623d9619feacb90a69
krb5-server-ldap-1.10.3-37.el6_6.x86_64.rpm
    MD5: e26491e67a8466ce67a653e3878928c4SHA-256: 3ccf6c34719e00aa314b1ea8ffd378e606dc8fb0c04bab0f3080f1f8777bf741
krb5-workstation-1.10.3-37.el6_6.x86_64.rpm
    MD5: 963669cef9f69706f89aa9bbc6bc1290SHA-256: e8895107720dd88699029d53d043cd0345bfa8e05bd2453f1e509d2ce7df7de7
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
krb5-1.10.3-37.el6_6.src.rpm
    MD5: 82fd1998cd283b35d7458398505ec74aSHA-256: 30b5e8045674bbcc3764a9e4e669e884f2d34e0ff2ebc7032424db5b7ed00858
 
IA-32:
krb5-debuginfo-1.10.3-37.el6_6.i686.rpm
    MD5: 5c2c26dde632f8bf841e1a32dd541136SHA-256: b7377c77bce5b1b0a11b8ce7ee64efd2bccf9c75acfef8e0aa7d3f0da118296a
krb5-devel-1.10.3-37.el6_6.i686.rpm
    MD5: be4722a245136d10927de8f9a80524d3SHA-256: 2957946d355612f4c9922590b280c27fdd116ff975b65054b49479a6de858f84
krb5-libs-1.10.3-37.el6_6.i686.rpm
    MD5: 20cca108e00d6f527374ea12165a6af0SHA-256: 8878ef351789dfd6bc32974a53e5b66684222e1b826b8a4e792dc3b6598eaeeb
krb5-pkinit-openssl-1.10.3-37.el6_6.i686.rpm
    MD5: 0572dbc1f05ba2e55f592c9a46875d8bSHA-256: 9278ad3e0d2ab18ce39d0a01c7000d586f414a29982bd27f51eb9b5bfb76dd2d
krb5-server-1.10.3-37.el6_6.i686.rpm
    MD5: 0042c8341c5f10c7367bf257c2d3bdc9SHA-256: 90f4d6afcc1093eebbd2ff0f0534f938861b0647230447915b0327df93b4895f
krb5-server-ldap-1.10.3-37.el6_6.i686.rpm
    MD5: ee978d67dace049babb777456507d5a1SHA-256: 87a3421254431569c2546c655e80a166097b93c0e93c5e623d9619feacb90a69
krb5-workstation-1.10.3-37.el6_6.i686.rpm
    MD5: e797e42ee52ba688ed4461f2ed0431bbSHA-256: c2561a0bdeb9ba6e6bad974eba6207d26f7b556a3eb679a3d92b9778d043d54a
 
PPC:
krb5-debuginfo-1.10.3-37.el6_6.ppc.rpm
    MD5: 514d6c1477625e7e4accbc2e820942b7SHA-256: 5f009c62cfbaf432adca0a070451d36689ab5b23e79f8453d6d980698b824373
krb5-debuginfo-1.10.3-37.el6_6.ppc64.rpm
    MD5: c20f18fd320a6caad69ac53746183e7fSHA-256: db86d48bf36a57352b38a0551c2b8791a8b80f5ae57e39cffc5c49635346c82b
krb5-devel-1.10.3-37.el6_6.ppc.rpm
    MD5: c81e89749f0b44c83f7edc85050cb6fdSHA-256: e17f83a9d19e21d541722feec98cd77798aa37a60905d44b9e8ddf7592249364
krb5-devel-1.10.3-37.el6_6.ppc64.rpm
    MD5: 0158e5cbab66f5db15dbad594161e6bcSHA-256: 4dcd2bd572ee1c65f65b82757c65425436fb42b10c8292bd51e96c4fe9974b9f
krb5-libs-1.10.3-37.el6_6.ppc.rpm
    MD5: 3d15f20f62908009b8fe45d880d9c5c4SHA-256: 66ad42118f9286734f3a652895c366d963e3a11b7b956ed00e7f89fcf95ffbc5
krb5-libs-1.10.3-37.el6_6.ppc64.rpm
    MD5: 0b6549aa659404da9a56fc307fa3601aSHA-256: 9518ab9f5ebb4521670f8b28f63c555ef4ea734f66976309a313b54b322b40ef
krb5-pkinit-openssl-1.10.3-37.el6_6.ppc64.rpm
    MD5: 5d5c4efafb493d27a4bc6a81d5c63bdeSHA-256: f06655d0084cd07e3079e54cd2cfac581ae8a772f0a0f96cdfab595e4a040363
krb5-server-1.10.3-37.el6_6.ppc64.rpm
    MD5: 9925737c4b4b2b476cf90b92c604412dSHA-256: aac21e6200c6a1333b35d00143acd9032c14c4b590e8f1cea5cb6a20525d3a5c
krb5-server-ldap-1.10.3-37.el6_6.ppc.rpm
    MD5: 475ec6e9e6ba1bf6400c774daa00a73eSHA-256: d69aabd26405f9b90d8514c9cc65fed8091687775e0d9dac7f58eb2e7795ef46
krb5-server-ldap-1.10.3-37.el6_6.ppc64.rpm
    MD5: 23bbc84bb58ec0713c4a93ecd6d0335fSHA-256: 4857749e048a6c404dd2011768d5262fc286ad1cebb5d834ca3f10ebe3dda6fd
krb5-workstation-1.10.3-37.el6_6.ppc64.rpm
    MD5: d99e0798e3ff576f7226f7ae698e0ed5SHA-256: cd8c3fccde655ce628c60b029fcc19883353c81774c9ad67dd7915ce809cbff9
 
s390x:
krb5-debuginfo-1.10.3-37.el6_6.s390.rpm
    MD5: e21937ec138ef1284c7f504272255605SHA-256: 03f1eb670b31457720970fab551a1d5178380f7035583e7c0e164490424ebd5f
krb5-debuginfo-1.10.3-37.el6_6.s390x.rpm
    MD5: 5a9f8bb529b9a413ffc287a73cfb6923SHA-256: ee95961aecdc883907c64dcbcdad26bfe664072cb0447747993df134c09c2110
krb5-devel-1.10.3-37.el6_6.s390.rpm
    MD5: 393c582f8d75ae2caa5de15c73e40ddeSHA-256: 59b2523a8596eba3eb47b87d1839ce0a3fc984d1e5b20bf8465158810fcc7359
krb5-devel-1.10.3-37.el6_6.s390x.rpm
    MD5: 7bcf143f962b28ee4d16b76b857ba491SHA-256: 861b2d37b66a9eb284080bdf7159d8322ac90ca751f195dd6a3e544d6f7a685d
krb5-libs-1.10.3-37.el6_6.s390.rpm
    MD5: 6418defd06342eba1b2efde9c80c9664SHA-256: c17da90ddb66ab3194d3563a2fe32d6bcb051878dad1999ae82092733ddb21d8
krb5-libs-1.10.3-37.el6_6.s390x.rpm
    MD5: 634b702131bdad634e32b6b8d6fb739dSHA-256: 53dac1313981817e46a95aabcd70747b398f91c2c53704238fb81c3307284ca0
krb5-pkinit-openssl-1.10.3-37.el6_6.s390x.rpm
    MD5: 12e07c3fa96dc01d95b93342014edaa1SHA-256: eb9962e57989950c77c6d6e7645f899f4961839095b28a1ff952e66bfe73b92a
krb5-server-1.10.3-37.el6_6.s390x.rpm
    MD5: 7a1994a7dfff3af18419f76be65d5ff0SHA-256: 5bb964b58b1462a756540b7e477bc73e482bb599a609af7cbd024dd39a48f917
krb5-server-ldap-1.10.3-37.el6_6.s390.rpm
    MD5: 68077e9d655a25b494ae8d82ae2122dfSHA-256: 4b708d1e022603c80e1ceecdea64e38162bc93ea150845589aa6d9cdeef71470
krb5-server-ldap-1.10.3-37.el6_6.s390x.rpm
    MD5: 2db5fdaf358d6c2a0428e56dd7602378SHA-256: 15e590566b2957296714db2375e6263cd740e65a19b0c562b7214cedf2de5701
krb5-workstation-1.10.3-37.el6_6.s390x.rpm
    MD5: 163e9c54ab718ccc2d2a4c32593920e4SHA-256: c340389c0ad3ddf705badbbc49e3285088e06b94f33e21629c15436b8cb94150
 
x86_64:
krb5-debuginfo-1.10.3-37.el6_6.i686.rpm
    MD5: 5c2c26dde632f8bf841e1a32dd541136SHA-256: b7377c77bce5b1b0a11b8ce7ee64efd2bccf9c75acfef8e0aa7d3f0da118296a
krb5-debuginfo-1.10.3-37.el6_6.x86_64.rpm
    MD5: d088427eaed53ee8c217e62f89ee2f6fSHA-256: 526c25e765581ca4d376bf24b362d5ba52ebaaa7c3a44f77570db006f16f9f2d
krb5-devel-1.10.3-37.el6_6.i686.rpm
    MD5: be4722a245136d10927de8f9a80524d3SHA-256: 2957946d355612f4c9922590b280c27fdd116ff975b65054b49479a6de858f84
krb5-devel-1.10.3-37.el6_6.x86_64.rpm
    MD5: d2f6aa3cfeffb8eea195a8baabef7158SHA-256: e64e16b5cc5ef6c7a43595b6d2e1a1803519d91abfc65bc18032e38d4902a0b1
krb5-libs-1.10.3-37.el6_6.i686.rpm
    MD5: 20cca108e00d6f527374ea12165a6af0SHA-256: 8878ef351789dfd6bc32974a53e5b66684222e1b826b8a4e792dc3b6598eaeeb
krb5-libs-1.10.3-37.el6_6.x86_64.rpm
    MD5: b071a9a3d54dd5227b114163ede52ff1SHA-256: 617b8f6b9298263e104a080af7d018f9cf4305c8066ea3e955a97c2e91ce6444
krb5-pkinit-openssl-1.10.3-37.el6_6.x86_64.rpm
    MD5: 8fd5532d2f0bf9e6d55a3bd260ccdbe7SHA-256: 3a8a48162a01ccb48f86dd2d45b2c12431df4c5eaccb874b46db933cd89e41bb
krb5-server-1.10.3-37.el6_6.x86_64.rpm
    MD5: d36e7add701e0425ba8283d3f52814c7SHA-256: b497021150d4cb18006f069a31190c96cbad7e4d29cbb469fc3ba6c09e3d6c07
krb5-server-ldap-1.10.3-37.el6_6.i686.rpm
    MD5: ee978d67dace049babb777456507d5a1SHA-256: 87a3421254431569c2546c655e80a166097b93c0e93c5e623d9619feacb90a69
krb5-server-ldap-1.10.3-37.el6_6.x86_64.rpm
    MD5: e26491e67a8466ce67a653e3878928c4SHA-256: 3ccf6c34719e00aa314b1ea8ffd378e606dc8fb0c04bab0f3080f1f8777bf741
krb5-workstation-1.10.3-37.el6_6.x86_64.rpm
    MD5: 963669cef9f69706f89aa9bbc6bc1290SHA-256: e8895107720dd88699029d53d043cd0345bfa8e05bd2453f1e509d2ce7df7de7
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
krb5-1.10.3-37.el6_6.src.rpm
    MD5: 82fd1998cd283b35d7458398505ec74aSHA-256: 30b5e8045674bbcc3764a9e4e669e884f2d34e0ff2ebc7032424db5b7ed00858
 
IA-32:
krb5-debuginfo-1.10.3-37.el6_6.i686.rpm
    MD5: 5c2c26dde632f8bf841e1a32dd541136SHA-256: b7377c77bce5b1b0a11b8ce7ee64efd2bccf9c75acfef8e0aa7d3f0da118296a
krb5-devel-1.10.3-37.el6_6.i686.rpm
    MD5: be4722a245136d10927de8f9a80524d3SHA-256: 2957946d355612f4c9922590b280c27fdd116ff975b65054b49479a6de858f84
krb5-libs-1.10.3-37.el6_6.i686.rpm
    MD5: 20cca108e00d6f527374ea12165a6af0SHA-256: 8878ef351789dfd6bc32974a53e5b66684222e1b826b8a4e792dc3b6598eaeeb
krb5-pkinit-openssl-1.10.3-37.el6_6.i686.rpm
    MD5: 0572dbc1f05ba2e55f592c9a46875d8bSHA-256: 9278ad3e0d2ab18ce39d0a01c7000d586f414a29982bd27f51eb9b5bfb76dd2d
krb5-server-1.10.3-37.el6_6.i686.rpm
    MD5: 0042c8341c5f10c7367bf257c2d3bdc9SHA-256: 90f4d6afcc1093eebbd2ff0f0534f938861b0647230447915b0327df93b4895f
krb5-server-ldap-1.10.3-37.el6_6.i686.rpm
    MD5: ee978d67dace049babb777456507d5a1SHA-256: 87a3421254431569c2546c655e80a166097b93c0e93c5e623d9619feacb90a69
krb5-workstation-1.10.3-37.el6_6.i686.rpm
    MD5: e797e42ee52ba688ed4461f2ed0431bbSHA-256: c2561a0bdeb9ba6e6bad974eba6207d26f7b556a3eb679a3d92b9778d043d54a
 
x86_64:
krb5-debuginfo-1.10.3-37.el6_6.i686.rpm
    MD5: 5c2c26dde632f8bf841e1a32dd541136SHA-256: b7377c77bce5b1b0a11b8ce7ee64efd2bccf9c75acfef8e0aa7d3f0da118296a
krb5-debuginfo-1.10.3-37.el6_6.x86_64.rpm
    MD5: d088427eaed53ee8c217e62f89ee2f6fSHA-256: 526c25e765581ca4d376bf24b362d5ba52ebaaa7c3a44f77570db006f16f9f2d
krb5-devel-1.10.3-37.el6_6.i686.rpm
    MD5: be4722a245136d10927de8f9a80524d3SHA-256: 2957946d355612f4c9922590b280c27fdd116ff975b65054b49479a6de858f84
krb5-devel-1.10.3-37.el6_6.x86_64.rpm
    MD5: d2f6aa3cfeffb8eea195a8baabef7158SHA-256: e64e16b5cc5ef6c7a43595b6d2e1a1803519d91abfc65bc18032e38d4902a0b1
krb5-libs-1.10.3-37.el6_6.i686.rpm
    MD5: 20cca108e00d6f527374ea12165a6af0SHA-256: 8878ef351789dfd6bc32974a53e5b66684222e1b826b8a4e792dc3b6598eaeeb
krb5-libs-1.10.3-37.el6_6.x86_64.rpm
    MD5: b071a9a3d54dd5227b114163ede52ff1SHA-256: 617b8f6b9298263e104a080af7d018f9cf4305c8066ea3e955a97c2e91ce6444
krb5-pkinit-openssl-1.10.3-37.el6_6.x86_64.rpm
    MD5: 8fd5532d2f0bf9e6d55a3bd260ccdbe7SHA-256: 3a8a48162a01ccb48f86dd2d45b2c12431df4c5eaccb874b46db933cd89e41bb
krb5-server-1.10.3-37.el6_6.x86_64.rpm
    MD5: d36e7add701e0425ba8283d3f52814c7SHA-256: b497021150d4cb18006f069a31190c96cbad7e4d29cbb469fc3ba6c09e3d6c07
krb5-server-ldap-1.10.3-37.el6_6.i686.rpm
    MD5: ee978d67dace049babb777456507d5a1SHA-256: 87a3421254431569c2546c655e80a166097b93c0e93c5e623d9619feacb90a69
krb5-server-ldap-1.10.3-37.el6_6.x86_64.rpm
    MD5: e26491e67a8466ce67a653e3878928c4SHA-256: 3ccf6c34719e00aa314b1ea8ffd378e606dc8fb0c04bab0f3080f1f8777bf741
krb5-workstation-1.10.3-37.el6_6.x86_64.rpm
    MD5: 963669cef9f69706f89aa9bbc6bc1290SHA-256: e8895107720dd88699029d53d043cd0345bfa8e05bd2453f1e509d2ce7df7de7
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply