<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">krb5-1.15-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10004</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">krb5-1.15-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the krb5-1.15-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10004</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10004</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2002-2443/</URL>
      <Description>SUSE CVE CVE-2002-2443 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-0844/</URL>
      <Description>SUSE CVE CVE-2009-0844 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-0845/</URL>
      <Description>SUSE CVE CVE-2009-0845 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-0846/</URL>
      <Description>SUSE CVE CVE-2009-0846 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-0847/</URL>
      <Description>SUSE CVE CVE-2009-0847 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-3295/</URL>
      <Description>SUSE CVE CVE-2009-3295 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4212/</URL>
      <Description>SUSE CVE CVE-2009-4212 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-0283/</URL>
      <Description>SUSE CVE CVE-2010-0283 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-0628/</URL>
      <Description>SUSE CVE CVE-2010-0628 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1320/</URL>
      <Description>SUSE CVE CVE-2010-1320 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1321/</URL>
      <Description>SUSE CVE CVE-2010-1321 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1322/</URL>
      <Description>SUSE CVE CVE-2010-1322 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1323/</URL>
      <Description>SUSE CVE CVE-2010-1323 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1324/</URL>
      <Description>SUSE CVE CVE-2010-1324 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4020/</URL>
      <Description>SUSE CVE CVE-2010-4020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4021/</URL>
      <Description>SUSE CVE CVE-2010-4021 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4022/</URL>
      <Description>SUSE CVE CVE-2010-4022 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-0281/</URL>
      <Description>SUSE CVE CVE-2011-0281 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-0282/</URL>
      <Description>SUSE CVE CVE-2011-0282 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-0284/</URL>
      <Description>SUSE CVE CVE-2011-0284 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-0285/</URL>
      <Description>SUSE CVE CVE-2011-0285 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1527/</URL>
      <Description>SUSE CVE CVE-2011-1527 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1528/</URL>
      <Description>SUSE CVE CVE-2011-1528 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1529/</URL>
      <Description>SUSE CVE CVE-2011-1529 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1530/</URL>
      <Description>SUSE CVE CVE-2011-1530 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1012/</URL>
      <Description>SUSE CVE CVE-2012-1012 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1013/</URL>
      <Description>SUSE CVE CVE-2012-1013 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1016/</URL>
      <Description>SUSE CVE CVE-2012-1016 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1415/</URL>
      <Description>SUSE CVE CVE-2013-1415 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1417/</URL>
      <Description>SUSE CVE CVE-2013-1417 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1418/</URL>
      <Description>SUSE CVE CVE-2013-1418 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-4341/</URL>
      <Description>SUSE CVE CVE-2014-4341 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-4342/</URL>
      <Description>SUSE CVE CVE-2014-4342 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-4343/</URL>
      <Description>SUSE CVE CVE-2014-4343 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-4344/</URL>
      <Description>SUSE CVE CVE-2014-4344 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-4345/</URL>
      <Description>SUSE CVE CVE-2014-4345 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5351/</URL>
      <Description>SUSE CVE CVE-2014-5351 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5352/</URL>
      <Description>SUSE CVE CVE-2014-5352 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5353/</URL>
      <Description>SUSE CVE CVE-2014-5353 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5354/</URL>
      <Description>SUSE CVE CVE-2014-5354 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5355/</URL>
      <Description>SUSE CVE CVE-2014-5355 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9421/</URL>
      <Description>SUSE CVE CVE-2014-9421 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9422/</URL>
      <Description>SUSE CVE CVE-2014-9422 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9423/</URL>
      <Description>SUSE CVE CVE-2014-9423 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2694/</URL>
      <Description>SUSE CVE CVE-2015-2694 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2695/</URL>
      <Description>SUSE CVE CVE-2015-2695 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2696/</URL>
      <Description>SUSE CVE CVE-2015-2696 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2697/</URL>
      <Description>SUSE CVE CVE-2015-2697 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2698/</URL>
      <Description>SUSE CVE CVE-2015-2698 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8629/</URL>
      <Description>SUSE CVE CVE-2015-8629 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8630/</URL>
      <Description>SUSE CVE CVE-2015-8630 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8631/</URL>
      <Description>SUSE CVE CVE-2015-8631 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3119/</URL>
      <Description>SUSE CVE CVE-2016-3119 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3120/</URL>
      <Description>SUSE CVE CVE-2016-3120 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="krb5-1.15-1.1">
      <FullProductName ProductID="krb5-1.15-1.1">krb5-1.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-32bit-1.15-1.1">
      <FullProductName ProductID="krb5-32bit-1.15-1.1">krb5-32bit-1.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-client-1.15-1.1">
      <FullProductName ProductID="krb5-client-1.15-1.1">krb5-client-1.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-devel-1.15-1.1">
      <FullProductName ProductID="krb5-devel-1.15-1.1">krb5-devel-1.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-devel-32bit-1.15-1.1">
      <FullProductName ProductID="krb5-devel-32bit-1.15-1.1">krb5-devel-32bit-1.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-doc-1.15-1.1">
      <FullProductName ProductID="krb5-doc-1.15-1.1">krb5-doc-1.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-mini-1.15-1.1">
      <FullProductName ProductID="krb5-mini-1.15-1.1">krb5-mini-1.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-mini-devel-1.15-1.1">
      <FullProductName ProductID="krb5-mini-devel-1.15-1.1">krb5-mini-devel-1.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-plugin-kdb-ldap-1.15-1.1">
      <FullProductName ProductID="krb5-plugin-kdb-ldap-1.15-1.1">krb5-plugin-kdb-ldap-1.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-plugin-preauth-otp-1.15-1.1">
      <FullProductName ProductID="krb5-plugin-preauth-otp-1.15-1.1">krb5-plugin-preauth-otp-1.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-plugin-preauth-pkinit-1.15-1.1">
      <FullProductName ProductID="krb5-plugin-preauth-pkinit-1.15-1.1">krb5-plugin-preauth-pkinit-1.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-server-1.15-1.1">
      <FullProductName ProductID="krb5-server-1.15-1.1">krb5-server-1.15-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="krb5-1.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-1.15-1.1">krb5-1.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-32bit-1.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-32bit-1.15-1.1">krb5-32bit-1.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-client-1.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-client-1.15-1.1">krb5-client-1.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-devel-1.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-devel-1.15-1.1">krb5-devel-1.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-devel-32bit-1.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1">krb5-devel-32bit-1.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-doc-1.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-doc-1.15-1.1">krb5-doc-1.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-mini-1.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-mini-1.15-1.1">krb5-mini-1.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-mini-devel-1.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1">krb5-mini-devel-1.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-kdb-ldap-1.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1">krb5-plugin-kdb-ldap-1.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-preauth-otp-1.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1">krb5-plugin-preauth-otp-1.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-preauth-pkinit-1.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1">krb5-plugin-preauth-pkinit-1.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-server-1.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-server-1.15-1.1">krb5-server-1.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.</Note>
    </Notes>
    <CVE>CVE-2002-2443</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2002-2443.html</URL>
        <Description>CVE-2002-2443</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/825985</URL>
        <Description>SUSE Bug 825985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871411</URL>
        <Description>SUSE Bug 871411</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/887734</URL>
        <Description>SUSE Bug 887734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2009-0844</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-0844.html</URL>
        <Description>CVE-2009-0844</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/486722</URL>
        <Description>SUSE Bug 486722</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3, when SPNEGO is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via invalid ContextFlags data in the reqFlags field in a negTokenInit token.</Note>
    </Notes>
    <CVE>CVE-2009-0845</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-0845.html</URL>
        <Description>CVE-2009-0845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/485894</URL>
        <Description>SUSE Bug 485894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/486722</URL>
        <Description>SUSE Bug 486722</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before 1.6.4 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors involving an invalid DER encoding that triggers a free of an uninitialized pointer.</Note>
    </Notes>
    <CVE>CVE-2009-0846</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-0846.html</URL>
        <Description>CVE-2009-0846</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/486723</URL>
        <Description>SUSE Bug 486723</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic.</Note>
    </Notes>
    <CVE>CVE-2009-0847</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-0847.html</URL>
        <Description>CVE-2009-0847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/486722</URL>
        <Description>SUSE Bug 486722</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The prep_reprocess_req function in kdc/do_tgs_req.c in the cross-realm referral implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a ticket request.</Note>
    </Notes>
    <CVE>CVE-2009-3295</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-3295.html</URL>
        <Description>CVE-2009-3295</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/561347</URL>
        <Description>SUSE Bug 561347</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.</Note>
    </Notes>
    <CVE>CVE-2009-4212</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4212.html</URL>
        <Description>CVE-2009-4212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/561351</URL>
        <Description>SUSE Bug 561351</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2, and 1.8 alpha, allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid (1) AS-REQ or (2) TGS-REQ request.</Note>
    </Notes>
    <CVE>CVE-2010-0283</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-0283.html</URL>
        <Description>CVE-2010-0283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/571781</URL>
        <Description>SUSE Bug 571781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/576524</URL>
        <Description>SUSE Bug 576524</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in the SPNEGO GSS-API functionality in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2 and 1.8 before 1.8.1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid packet that triggers incorrect preparation of an error token.</Note>
    </Notes>
    <CVE>CVE-2010-0628</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-0628.html</URL>
        <Description>CVE-2010-0628</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/582557</URL>
        <Description>SUSE Bug 582557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/586981</URL>
        <Description>SUSE Bug 586981</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x before 1.8.2 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a request associated with (1) renewal or (2) validation.</Note>
    </Notes>
    <CVE>CVE-2010-1320</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1320.html</URL>
        <Description>CVE-2010-1320</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/596002</URL>
        <Description>SUSE Bug 596002</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.</Note>
    </Notes>
    <CVE>CVE-2010-1321</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1321.html</URL>
        <Description>CVE-2010-1321</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/596826</URL>
        <Description>SUSE Bug 596826</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/611090</URL>
        <Description>SUSE Bug 611090</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/646073</URL>
        <Description>SUSE Bug 646073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/648950</URL>
        <Description>SUSE Bug 648950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/658525</URL>
        <Description>SUSE Bug 658525</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/659926</URL>
        <Description>SUSE Bug 659926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/663953</URL>
        <Description>SUSE Bug 663953</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/679560</URL>
        <Description>SUSE Bug 679560</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x before 1.8.4 does not properly manage an index into an authorization-data list, which allows remote attackers to cause a denial of service (daemon crash), or possibly obtain sensitive information, spoof authorization, or execute arbitrary code, via a TGS request that triggers an uninitialized pointer dereference, as demonstrated by a request from a Windows Active Directory client.</Note>
    </Notes>
    <CVE>CVE-2010-1322</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1322.html</URL>
        <Description>CVE-2010-1322</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/640990</URL>
        <Description>SUSE Bug 640990</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.</Note>
    </Notes>
    <CVE>CVE-2010-1323</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1323.html</URL>
        <Description>CVE-2010-1323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/650650</URL>
        <Description>SUSE Bug 650650</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key.</Note>
    </Notes>
    <CVE>CVE-2010-1324</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1324.html</URL>
        <Description>CVE-2010-1324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/650650</URL>
        <Description>SUSE Bug 650650</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.</Note>
    </Notes>
    <CVE>CVE-2010-4020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4020.html</URL>
        <Description>CVE-2010-4020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/650650</URL>
        <Description>SUSE Bug 650650</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 does not properly restrict the use of TGT credentials for armoring TGS requests, which might allow remote authenticated users to impersonate a client by rewriting an inner request, aka a "KrbFastReq forgery issue."</Note>
    </Notes>
    <CVE>CVE-2010-4021</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4021.html</URL>
        <Description>CVE-2010-4021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/650650</URL>
        <Description>SUSE Bug 650650</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2010-4022</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4022.html</URL>
        <Description>CVE-2010-4022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/662665</URL>
        <Description>SUSE Bug 662665</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence.</Note>
    </Notes>
    <CVE>CVE-2011-0281</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-0281.html</URL>
        <Description>CVE-2011-0281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/663619</URL>
        <Description>SUSE Bug 663619</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name.</Note>
    </Notes>
    <CVE>CVE-2011-0282</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-0282.html</URL>
        <Description>CVE-2011-0282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/663619</URL>
        <Description>SUSE Bug 663619</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.</Note>
    </Notes>
    <CVE>CVE-2011-0284</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-0284.html</URL>
        <Description>CVE-2011-0284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/671717</URL>
        <Description>SUSE Bug 671717</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.</Note>
    </Notes>
    <CVE>CVE-2011-0285</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-0285.html</URL>
        <Description>CVE-2011-0285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/687469</URL>
        <Description>SUSE Bug 687469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The kdb_ldap plugin in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a kinit operation with incorrect string case for the realm, related to the is_principal_in_realm, krb5_set_error_message, krb5_ldap_get_principal, and process_as_req functions.</Note>
    </Notes>
    <CVE>CVE-2011-1527</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1527.html</URL>
        <Description>CVE-2011-1527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/719393</URL>
        <Description>SUSE Bug 719393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/743742</URL>
        <Description>SUSE Bug 743742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The krb5_ldap_lockout_audit function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors, related to the locked_check_p function.  NOTE: the Berkeley DB vector is covered by CVE-2011-4151.</Note>
    </Notes>
    <CVE>CVE-2011-1528</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1528.html</URL>
        <Description>CVE-2011-1528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/719393</URL>
        <Description>SUSE Bug 719393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/743742</URL>
        <Description>SUSE Bug 743742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors.</Note>
    </Notes>
    <CVE>CVE-2011-1529</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1529.html</URL>
        <Description>CVE-2011-1529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/719393</URL>
        <Description>SUSE Bug 719393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/743742</URL>
        <Description>SUSE Bug 743742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The process_tgs_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS request that triggers an error other than the KRB5_KDB_NOENTRY error.</Note>
    </Notes>
    <CVE>CVE-2011-1530</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1530.html</URL>
        <Description>CVE-2011-1530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/730393</URL>
        <Description>SUSE Bug 730393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">server/server_stubs.c in the kadmin protocol implementation in MIT Kerberos 5 (aka krb5) 1.10 before 1.10.1 does not properly restrict access to (1) SET_STRING and (2) GET_STRINGS operations, which might allow remote authenticated administrators to modify or read string attributes by leveraging the global list privilege.</Note>
    </Notes>
    <CVE>CVE-2012-1012</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1012.html</URL>
        <Description>CVE-2012-1012</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/766109</URL>
        <Description>SUSE Bug 766109</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a password.</Note>
    </Notes>
    <CVE>CVE-2012-1013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1013.html</URL>
        <Description>CVE-2012-1013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/765485</URL>
        <Description>SUSE Bug 765485</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pkinit_server_return_padata function in plugins/preauth/pkinit/pkinit_srv.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 attempts to find an agility KDF identifier in inappropriate circumstances, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted Draft 9 request.</Note>
    </Notes>
    <CVE>CVE-2012-1016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1016.html</URL>
        <Description>CVE-2012-1016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807556</URL>
        <Description>SUSE Bug 807556</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.</Note>
    </Notes>
    <CVE>CVE-2013-1415</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1415.html</URL>
        <Description>CVE-2013-1415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/806715</URL>
        <Description>SUSE Bug 806715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.11 before 1.11.4, when a single-component realm name is used, allows remote authenticated users to cause a denial of service (daemon crash) via a TGS-REQ request that triggers an attempted cross-realm referral for a host-based service principal.</Note>
    </Notes>
    <CVE>CVE-2013-1417</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1417.html</URL>
        <Description>CVE-2013-1417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/850660</URL>
        <Description>SUSE Bug 850660</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/879587</URL>
        <Description>SUSE Bug 879587</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.</Note>
    </Notes>
    <CVE>CVE-2013-1418</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1418.html</URL>
        <Description>CVE-2013-1418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/849240</URL>
        <Description>SUSE Bug 849240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/866059</URL>
        <Description>SUSE Bug 866059</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/879587</URL>
        <Description>SUSE Bug 879587</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) by injecting invalid tokens into a GSSAPI application session.</Note>
    </Notes>
    <CVE>CVE-2014-4341</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-4341.html</URL>
        <Description>CVE-2014-4341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/886016</URL>
        <Description>SUSE Bug 886016</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MIT Kerberos 5 (aka krb5) 1.7.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read or NULL pointer dereference, and application crash) by injecting invalid tokens into a GSSAPI application session.</Note>
    </Notes>
    <CVE>CVE-2014-4342</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-4342.html</URL>
        <Description>CVE-2014-4342</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/886016</URL>
        <Description>SUSE Bug 886016</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via network traffic that appears to come from an intended acceptor, but specifies a security mechanism different from the one proposed by the initiator.</Note>
    </Notes>
    <CVE>CVE-2014-4343</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-4343.html</URL>
        <Description>CVE-2014-4343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/888697</URL>
        <Description>SUSE Bug 888697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty continuation token at a certain point during a SPNEGO negotiation.</Note>
    </Notes>
    <CVE>CVE-2014-4344</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-4344.html</URL>
        <Description>CVE-2014-4344</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/888697</URL>
        <Description>SUSE Bug 888697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the krb5_encode_krbsecretkey function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) 1.6.x through 1.11.x before 1.11.6 and 1.12.x before 1.12.2 allows remote authenticated users to cause a denial of service (buffer overflow) or possibly execute arbitrary code via a series of "cpw -keepold" commands.</Note>
    </Notes>
    <CVE>CVE-2014-4345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-4345.html</URL>
        <Description>CVE-2014-4345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/891082</URL>
        <Description>SUSE Bug 891082</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.</Note>
    </Notes>
    <CVE>CVE-2014-5351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5351.html</URL>
        <Description>CVE-2014-5351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897874</URL>
        <Description>SUSE Bug 897874</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.</Note>
    </Notes>
    <CVE>CVE-2014-5352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5352.html</URL>
        <Description>CVE-2014-5352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005509</URL>
        <Description>SUSE Bug 1005509</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912002</URL>
        <Description>SUSE Bug 912002</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.</Note>
    </Notes>
    <CVE>CVE-2014-5353</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5353.html</URL>
        <Description>CVE-2014-5353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910457</URL>
        <Description>SUSE Bug 910457</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.</Note>
    </Notes>
    <CVE>CVE-2014-5354</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5354.html</URL>
        <Description>CVE-2014-5354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910458</URL>
        <Description>SUSE Bug 910458</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2) cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c.</Note>
    </Notes>
    <CVE>CVE-2014-5355</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5355.html</URL>
        <Description>CVE-2014-5355</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918595</URL>
        <Description>SUSE Bug 918595</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind.</Note>
    </Notes>
    <CVE>CVE-2014-9421</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9421.html</URL>
        <Description>CVE-2014-9421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005509</URL>
        <Description>SUSE Bug 1005509</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912002</URL>
        <Description>SUSE Bug 912002</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.</Note>
    </Notes>
    <CVE>CVE-2014-9422</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9422.html</URL>
        <Description>CVE-2014-9422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005509</URL>
        <Description>SUSE Bug 1005509</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912002</URL>
        <Description>SUSE Bug 912002</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.</Note>
    </Notes>
    <CVE>CVE-2014-9423</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9423.html</URL>
        <Description>CVE-2014-9423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005509</URL>
        <Description>SUSE Bug 1005509</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912002</URL>
        <Description>SUSE Bug 912002</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an arbitrary realm name, related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c.</Note>
    </Notes>
    <CVE>CVE-2015-2694</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2694.html</URL>
        <Description>CVE-2015-2694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928978</URL>
        <Description>SUSE Bug 928978</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_inquire_context call.</Note>
    </Notes>
    <CVE>CVE-2015-2695</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2695.html</URL>
        <Description>CVE-2015-2695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952188</URL>
        <Description>SUSE Bug 952188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969771</URL>
        <Description>SUSE Bug 969771</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mishandled during a gss_inquire_context call.</Note>
    </Notes>
    <CVE>CVE-2015-2696</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2696.html</URL>
        <Description>CVE-2015-2696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952189</URL>
        <Description>SUSE Bug 952189</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954204</URL>
        <Description>SUSE Bug 954204</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.</Note>
    </Notes>
    <CVE>CVE-2015-2697</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2697.html</URL>
        <Description>CVE-2015-2697</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952190</URL>
        <Description>SUSE Bug 952190</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The iakerb_gss_export_sec_context function in lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) 1.14 pre-release 2015-09-14 improperly accesses a certain pointer, which allows remote authenticated users to cause a denial of service (memory corruption) or possibly have unspecified other impact by interacting with an application that calls the gss_export_sec_context function.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-2696.</Note>
    </Notes>
    <CVE>CVE-2015-2698</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2698.html</URL>
        <Description>CVE-2015-2698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954204</URL>
        <Description>SUSE Bug 954204</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not verify whether '\0' characters exist as expected, which allows remote authenticated users to obtain sensitive information or cause a denial of service (out-of-bounds read) via a crafted string.</Note>
    </Notes>
    <CVE>CVE-2015-8629</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8629.html</URL>
        <Description>CVE-2015-8629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963968</URL>
        <Description>SUSE Bug 963968</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) kadm5_create_principal_3 and (2) kadm5_modify_principal functions in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by specifying KADM5_POLICY with a NULL policy name.</Note>
    </Notes>
    <CVE>CVE-2015-8630</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8630.html</URL>
        <Description>CVE-2015-8630</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963964</URL>
        <Description>SUSE Bug 963964</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.</Note>
    </Notes>
    <CVE>CVE-2015-8631</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.3</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8631.html</URL>
        <Description>CVE-2015-8631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963975</URL>
        <Description>SUSE Bug 963975</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.</Note>
    </Notes>
    <CVE>CVE-2016-3119</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3119.html</URL>
        <Description>CVE-2016-3119</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971942</URL>
        <Description>SUSE Bug 971942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The validate_as_request function in kdc_util.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.</Note>
    </Notes>
    <CVE>CVE-2016-3120</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-doc-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-mini-devel-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3120.html</URL>
        <Description>CVE-2016-3120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991088</URL>
        <Description>SUSE Bug 991088</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
