Security update for krb5
SUSE Security Update: Security update for krb5
Announcement ID: | SUSE-SU-2015:1276-1 |
Rating: | moderate |
References: | #910457 #910458 #918595 #928978 |
Affected Products: |
An update that fixes four vulnerabilities is now available.
Description:
krb5 was updated to fix four security issues.
These security issues were fixed:
- CVE-2014-5353: NULL pointer dereference when using a ticket policy name
as password name (bsc#910457).
- CVE-2014-5354: NULL pointer dereference when using keyless entries
(bsc#910458).
- CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
- CVE-2015-2694: OTP and PKINIT kdcpreauth modules leading to
requires_preauth bypass (bsc#928978).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-335=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-335=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
- krb5-debuginfo-1.12.1-16.1
- krb5-debugsource-1.12.1-16.1
- krb5-devel-1.12.1-16.1
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
- krb5-1.12.1-16.1
- krb5-client-1.12.1-16.1
- krb5-client-debuginfo-1.12.1-16.1
- krb5-debuginfo-1.12.1-16.1
- krb5-debugsource-1.12.1-16.1
- krb5-doc-1.12.1-16.1
- krb5-plugin-kdb-ldap-1.12.1-16.1
- krb5-plugin-kdb-ldap-debuginfo-1.12.1-16.1
- krb5-plugin-preauth-otp-1.12.1-16.1
- krb5-plugin-preauth-otp-debuginfo-1.12.1-16.1
- krb5-plugin-preauth-pkinit-1.12.1-16.1
- krb5-plugin-preauth-pkinit-debuginfo-1.12.1-16.1
- krb5-server-1.12.1-16.1
- krb5-server-debuginfo-1.12.1-16.1
- SUSE Linux Enterprise Server 12 (s390x x86_64):
- krb5-32bit-1.12.1-16.1
- krb5-debuginfo-32bit-1.12.1-16.1
References:
- https://www.suse.com/security/cve/CVE-2014-5353.html
- https://www.suse.com/security/cve/CVE-2014-5354.html
- https://www.suse.com/security/cve/CVE-2014-5355.html
- https://www.suse.com/security/cve/CVE-2015-2694.html
- https://bugzilla.suse.com/910457
- https://bugzilla.suse.com/910458
- https://bugzilla.suse.com/918595
- https://bugzilla.suse.com/928978