<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for krb5</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:0854-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-03-30T07:30:06Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-03-30T07:30:06Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-03-30T07:30:06Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for krb5</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for krb5 provides the following fixes:

Security issues fixed:

- CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927).
- CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926).

Non-security issues fixed:

- Make it possible for legacy applications (e.g. SAP Netweaver) to remain compatible with
  newer Kerberos. System administrators who are experiencing this kind of compatibility
  issues may set the environment variable GSSAPI_ASSUME_MECH_MATCH to a non-empty value,
  and make sure the environment variable is visible and effective to the application
  startup script. (bsc#1057662)
- Fix a GSS failure in legacy applications by not indicating deprecated GSS mechanisms in
  gss_indicate_mech() list. (bsc#1081725)

This update was imported from the SUSE:SLE-12-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00116.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:0854-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="krb5-1.12.5-16.1">
      <FullProductName ProductID="krb5-1.12.5-16.1">krb5-1.12.5-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-32bit-1.12.5-16.1">
      <FullProductName ProductID="krb5-32bit-1.12.5-16.1">krb5-32bit-1.12.5-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-client-1.12.5-16.1">
      <FullProductName ProductID="krb5-client-1.12.5-16.1">krb5-client-1.12.5-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-devel-1.12.5-16.1">
      <FullProductName ProductID="krb5-devel-1.12.5-16.1">krb5-devel-1.12.5-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-devel-32bit-1.12.5-16.1">
      <FullProductName ProductID="krb5-devel-32bit-1.12.5-16.1">krb5-devel-32bit-1.12.5-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-doc-1.12.5-16.1">
      <FullProductName ProductID="krb5-doc-1.12.5-16.1">krb5-doc-1.12.5-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-mini-1.12.5-16.1">
      <FullProductName ProductID="krb5-mini-1.12.5-16.1">krb5-mini-1.12.5-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-mini-devel-1.12.5-16.1">
      <FullProductName ProductID="krb5-mini-devel-1.12.5-16.1">krb5-mini-devel-1.12.5-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-plugin-kdb-ldap-1.12.5-16.1">
      <FullProductName ProductID="krb5-plugin-kdb-ldap-1.12.5-16.1">krb5-plugin-kdb-ldap-1.12.5-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-plugin-preauth-otp-1.12.5-16.1">
      <FullProductName ProductID="krb5-plugin-preauth-otp-1.12.5-16.1">krb5-plugin-preauth-otp-1.12.5-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-plugin-preauth-pkinit-1.12.5-16.1">
      <FullProductName ProductID="krb5-plugin-preauth-pkinit-1.12.5-16.1">krb5-plugin-preauth-pkinit-1.12.5-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-server-1.12.5-16.1">
      <FullProductName ProductID="krb5-server-1.12.5-16.1">krb5-server-1.12.5-16.1</FullProductName>
    </Branch>
    <Relationship ProductReference="krb5-1.12.5-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:krb5-1.12.5-16.1">krb5-1.12.5-16.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-32bit-1.12.5-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:krb5-32bit-1.12.5-16.1">krb5-32bit-1.12.5-16.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-client-1.12.5-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:krb5-client-1.12.5-16.1">krb5-client-1.12.5-16.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-devel-1.12.5-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:krb5-devel-1.12.5-16.1">krb5-devel-1.12.5-16.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-devel-32bit-1.12.5-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:krb5-devel-32bit-1.12.5-16.1">krb5-devel-32bit-1.12.5-16.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-doc-1.12.5-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:krb5-doc-1.12.5-16.1">krb5-doc-1.12.5-16.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-mini-1.12.5-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:krb5-mini-1.12.5-16.1">krb5-mini-1.12.5-16.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-mini-devel-1.12.5-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:krb5-mini-devel-1.12.5-16.1">krb5-mini-devel-1.12.5-16.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-kdb-ldap-1.12.5-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:krb5-plugin-kdb-ldap-1.12.5-16.1">krb5-plugin-kdb-ldap-1.12.5-16.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-preauth-otp-1.12.5-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:krb5-plugin-preauth-otp-1.12.5-16.1">krb5-plugin-preauth-otp-1.12.5-16.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-preauth-pkinit-1.12.5-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:krb5-plugin-preauth-pkinit-1.12.5-16.1">krb5-plugin-preauth-pkinit-1.12.5-16.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-server-1.12.5-16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:krb5-server-1.12.5-16.1">krb5-server-1.12.5-16.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.</Note>
    </Notes>
    <CVE>CVE-2018-5729</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:krb5-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-32bit-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-client-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-devel-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-devel-32bit-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-doc-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-mini-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-mini-devel-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-plugin-kdb-ldap-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-plugin-preauth-otp-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-plugin-preauth-pkinit-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-server-1.12.5-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00116.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5729.html</URL>
        <Description>CVE-2018-5729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076211</URL>
        <Description>SUSE Bug 1076211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083926</URL>
        <Description>SUSE Bug 1083926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122468</URL>
        <Description>SUSE Bug 1122468</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.</Note>
    </Notes>
    <CVE>CVE-2018-5730</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:krb5-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-32bit-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-client-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-devel-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-devel-32bit-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-doc-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-mini-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-mini-devel-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-plugin-kdb-ldap-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-plugin-preauth-otp-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-plugin-preauth-pkinit-1.12.5-16.1</ProductID>
        <ProductID>openSUSE Leap 42.3:krb5-server-1.12.5-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00116.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5730.html</URL>
        <Description>CVE-2018-5730</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076211</URL>
        <Description>SUSE Bug 1076211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083927</URL>
        <Description>SUSE Bug 1083927</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122468</URL>
        <Description>SUSE Bug 1122468</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
