SUSE-SU-2018:0859-1: moderate: Security update for krb5

sle-updates at lists.suse.com sle-updates at lists.suse.com
Tue Apr 3 07:10:45 MDT 2018


   SUSE Security Update: Security update for krb5
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:0859-1
Rating:             moderate
References:         #1056995 #1083926 #1083927 #970696 
Cross-References:   CVE-2017-11462 CVE-2018-5729 CVE-2018-5730
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that solves three vulnerabilities and has one
   errata is now available.

Description:


   This update for krb5 fixes several issues.

   This security issue was fixed:

   - CVE-2017-11462: Prevent automatic security context deletion to prevent
     double-free (bsc#1056995).
   - CVE-2018-5729: Null pointer dereference in kadmind or DN container check
     bypass by supplying special crafted data (bsc#1083926).
   - CVE-2018-5730: DN container check bypass by supplying special crafted
     data (bsc#1083927).


   This non-security issue was fixed:

   - Avoid indefinite polling in KDC communication. (bsc#970696)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-krb5-13541=1

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-krb5-13541=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-krb5-13541=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      krb5-devel-1.6.3-133.49.113.7.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):

      krb5-devel-32bit-1.6.3-133.49.113.7.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64):

      krb5-server-1.6.3-133.49.113.7.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      krb5-1.6.3-133.49.113.7.1
      krb5-apps-clients-1.6.3-133.49.113.7.1
      krb5-apps-servers-1.6.3-133.49.113.7.1
      krb5-client-1.6.3-133.49.113.7.1
      krb5-server-1.6.3-133.49.113.7.1

   - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

      krb5-32bit-1.6.3-133.49.113.7.1

   - SUSE Linux Enterprise Server 11-SP4 (ia64):

      krb5-x86-1.6.3-133.49.113.7.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      krb5-debuginfo-1.6.3-133.49.113.7.1
      krb5-debugsource-1.6.3-133.49.113.7.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64 s390x x86_64):

      krb5-debuginfo-32bit-1.6.3-133.49.113.7.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (ia64):

      krb5-debuginfo-x86-1.6.3-133.49.113.7.1


References:

   https://www.suse.com/security/cve/CVE-2017-11462.html
   https://www.suse.com/security/cve/CVE-2018-5729.html
   https://www.suse.com/security/cve/CVE-2018-5730.html
   https://bugzilla.suse.com/1056995
   https://bugzilla.suse.com/1083926
   https://bugzilla.suse.com/1083927
   https://bugzilla.suse.com/970696



More information about the sle-updates mailing list