SUSE-SU-2018:0859-1: moderate: Security update for krb5
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Apr 3 07:10:45 MDT 2018
SUSE Security Update: Security update for krb5
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0859-1
Rating: moderate
References: #1056995 #1083926 #1083927 #970696
Cross-References: CVE-2017-11462 CVE-2018-5729 CVE-2018-5730
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
An update that solves three vulnerabilities and has one
errata is now available.
Description:
This update for krb5 fixes several issues.
This security issue was fixed:
- CVE-2017-11462: Prevent automatic security context deletion to prevent
double-free (bsc#1056995).
- CVE-2018-5729: Null pointer dereference in kadmind or DN container check
bypass by supplying special crafted data (bsc#1083926).
- CVE-2018-5730: DN container check bypass by supplying special crafted
data (bsc#1083927).
This non-security issue was fixed:
- Avoid indefinite polling in KDC communication. (bsc#970696)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-krb5-13541=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-krb5-13541=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-krb5-13541=1
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
krb5-devel-1.6.3-133.49.113.7.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):
krb5-devel-32bit-1.6.3-133.49.113.7.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64):
krb5-server-1.6.3-133.49.113.7.1
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
krb5-1.6.3-133.49.113.7.1
krb5-apps-clients-1.6.3-133.49.113.7.1
krb5-apps-servers-1.6.3-133.49.113.7.1
krb5-client-1.6.3-133.49.113.7.1
krb5-server-1.6.3-133.49.113.7.1
- SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):
krb5-32bit-1.6.3-133.49.113.7.1
- SUSE Linux Enterprise Server 11-SP4 (ia64):
krb5-x86-1.6.3-133.49.113.7.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
krb5-debuginfo-1.6.3-133.49.113.7.1
krb5-debugsource-1.6.3-133.49.113.7.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64 s390x x86_64):
krb5-debuginfo-32bit-1.6.3-133.49.113.7.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (ia64):
krb5-debuginfo-x86-1.6.3-133.49.113.7.1
References:
https://www.suse.com/security/cve/CVE-2017-11462.html
https://www.suse.com/security/cve/CVE-2018-5729.html
https://www.suse.com/security/cve/CVE-2018-5730.html
https://bugzilla.suse.com/1056995
https://bugzilla.suse.com/1083926
https://bugzilla.suse.com/1083927
https://bugzilla.suse.com/970696
More information about the sle-security-updates
mailing list