Security update for krb5
SUSE Patch
security@suse.de
SUSE Security Team
SUSE-SU-2015:1276-1
Final
1
1
2015-07-14T12:55:16Z
current
2015-07-14T12:55:16Z
2015-07-14T12:55:16Z
cve-database/bin/generate-cvrf.pl
2017-02-24T01:00:00Z
Security update for krb5
krb5 was updated to fix four security issues.
These security issues were fixed:
- CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457).
- CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458).
- CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
- CVE-2015-2694: OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass (bsc#928978).
The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
SUSE-SLE-SDK-12-2015-335,SUSE-SLE-SERVER-12-2015-335
Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
https://www.suse.com/support/update/announcement/2015/suse-su-20151276-1/
Link for SUSE-SU-2015:1276-1
https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html
E-Mail link for SUSE-SU-2015:1276-1
https://www.suse.com/support/security/rating/
SUSE Security Ratings
https://bugzilla.suse.com/910457
SUSE Bug 910457
https://bugzilla.suse.com/910458
SUSE Bug 910458
https://bugzilla.suse.com/918595
SUSE Bug 918595
https://bugzilla.suse.com/928978
SUSE Bug 928978
https://www.suse.com/security/cve/CVE-2014-5353/
SUSE CVE CVE-2014-5353 page
https://www.suse.com/security/cve/CVE-2014-5354/
SUSE CVE CVE-2014-5354 page
https://www.suse.com/security/cve/CVE-2014-5355/
SUSE CVE CVE-2014-5355 page
https://www.suse.com/security/cve/CVE-2015-2694/
SUSE CVE CVE-2015-2694 page
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server for SAP Applications 12
SUSE Linux Enterprise Software Development Kit 12
krb5-devel-1.12.1-16.1
krb5-1.12.1-16.1
krb5-32bit-1.12.1-16.1
krb5-client-1.12.1-16.1
krb5-doc-1.12.1-16.1
krb5-plugin-kdb-ldap-1.12.1-16.1
krb5-plugin-preauth-otp-1.12.1-16.1
krb5-plugin-preauth-pkinit-1.12.1-16.1
krb5-server-1.12.1-16.1
krb5-1.12.1-16.1 as a component of SUSE Linux Enterprise Server 12
krb5-32bit-1.12.1-16.1 as a component of SUSE Linux Enterprise Server 12
krb5-client-1.12.1-16.1 as a component of SUSE Linux Enterprise Server 12
krb5-doc-1.12.1-16.1 as a component of SUSE Linux Enterprise Server 12
krb5-plugin-kdb-ldap-1.12.1-16.1 as a component of SUSE Linux Enterprise Server 12
krb5-plugin-preauth-otp-1.12.1-16.1 as a component of SUSE Linux Enterprise Server 12
krb5-plugin-preauth-pkinit-1.12.1-16.1 as a component of SUSE Linux Enterprise Server 12
krb5-server-1.12.1-16.1 as a component of SUSE Linux Enterprise Server 12
krb5-1.12.1-16.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12
krb5-32bit-1.12.1-16.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12
krb5-client-1.12.1-16.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12
krb5-doc-1.12.1-16.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12
krb5-plugin-kdb-ldap-1.12.1-16.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12
krb5-plugin-preauth-otp-1.12.1-16.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12
krb5-plugin-preauth-pkinit-1.12.1-16.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12
krb5-server-1.12.1-16.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12
krb5-devel-1.12.1-16.1 as a component of SUSE Linux Enterprise Software Development Kit 12
The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
CVE-2014-5353
SUSE Linux Enterprise Server 12:krb5-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-client-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-plugin-kdb-ldap-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-plugin-preauth-otp-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-plugin-preauth-pkinit-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-server-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-32bit-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-client-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-doc-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-kdb-ldap-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-otp-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-pkinit-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-server-1.12.1-16.1
SUSE Linux Enterprise Software Development Kit 12:krb5-devel-1.12.1-16.1
moderate
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/support/update/announcement/2015/suse-su-20151276-1/
https://www.suse.com/security/cve/CVE-2014-5353.html
CVE-2014-5353
https://bugzilla.suse.com/910457
SUSE Bug 910457
plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.
CVE-2014-5354
SUSE Linux Enterprise Server 12:krb5-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-client-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-plugin-kdb-ldap-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-plugin-preauth-otp-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-plugin-preauth-pkinit-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-server-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-32bit-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-client-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-doc-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-kdb-ldap-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-otp-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-pkinit-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-server-1.12.1-16.1
SUSE Linux Enterprise Software Development Kit 12:krb5-devel-1.12.1-16.1
moderate
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/support/update/announcement/2015/suse-su-20151276-1/
https://www.suse.com/security/cve/CVE-2014-5354.html
CVE-2014-5354
https://bugzilla.suse.com/910458
SUSE Bug 910458
MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2) cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c.
CVE-2014-5355
SUSE Linux Enterprise Server 12:krb5-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-client-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-plugin-kdb-ldap-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-plugin-preauth-otp-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-plugin-preauth-pkinit-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-server-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-32bit-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-client-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-doc-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-kdb-ldap-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-otp-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-pkinit-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-server-1.12.1-16.1
SUSE Linux Enterprise Software Development Kit 12:krb5-devel-1.12.1-16.1
moderate
5
AV:N/AC:L/Au:N/C:N/I:N/A:P
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/support/update/announcement/2015/suse-su-20151276-1/
https://www.suse.com/security/cve/CVE-2014-5355.html
CVE-2014-5355
https://bugzilla.suse.com/770172
SUSE Bug 770172
https://bugzilla.suse.com/918595
SUSE Bug 918595
The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an arbitrary realm name, related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c.
CVE-2015-2694
SUSE Linux Enterprise Server 12:krb5-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-client-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-plugin-kdb-ldap-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-plugin-preauth-otp-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-plugin-preauth-pkinit-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-server-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-32bit-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-client-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-doc-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-kdb-ldap-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-otp-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-pkinit-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12:krb5-server-1.12.1-16.1
SUSE Linux Enterprise Software Development Kit 12:krb5-devel-1.12.1-16.1
moderate
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/support/update/announcement/2015/suse-su-20151276-1/
https://www.suse.com/security/cve/CVE-2015-2694.html
CVE-2015-2694
https://bugzilla.suse.com/928978
SUSE Bug 928978