SuSE: 2015:0290-2: important: krb5
Summary
MIT kerberos krb5 was updated to fix several security issues and bugs. Security issues fixed: CVE-2014-5351: The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) sent old keys in a response to a -randkey -keepold request, which allowed remote authenticated users to forge tickets by leveraging administrative access. CVE-2014-5352: In the MIT krb5 libgssapi_krb5 library, after gss_process_context_token() is used to process a valid context deletion token, the caller was left with a security context handle containing a dangling pointer. Further uses of this handle would have resulted in use-after-free and double-free memory access violations. libgssrpc server applications such as kadmind were vulnerable as they can be instructed to call gss_process_context_token(). CVE-2014-9421: If the MIT krb5 kadmind daemon receives invalid XDR data from an authenticated user, it may have pe...
Read the Full AdvisoryReferences
#897874 #898439 #912002
Cross- CVE-2014-5351 CVE-2014-5352 CVE-2014-9421
CVE-2014-9422 CVE-2014-9423
Affected Products:
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
SUSE Linux Enterprise Build System Kit 12
https://www.suse.com/security/cve/CVE-2014-5351.html
https://www.suse.com/security/cve/CVE-2014-5352.html
https://www.suse.com/security/cve/CVE-2014-9421.html
https://www.suse.com/security/cve/CVE-2014-9422.html
https://www.suse.com/security/cve/CVE-2014-9423.html
https://bugzilla.suse.com/897874
https://bugzilla.suse.com/898439
https://bugzilla.suse.com/912002