<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for krb5</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:0290-2</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-01-21T10:07:55Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-01-21T10:07:55Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-01-21T10:07:55Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for krb5</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
MIT kerberos krb5 was updated to fix several security issues and bugs.

Security issues fixed:
CVE-2014-5351: The kadm5_randkey_principal_3 function in
lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5)
sent old keys in a response to a -randkey -keepold request, which allowed
remote authenticated users to forge tickets by leveraging administrative
access.

CVE-2014-5352: In the MIT krb5 libgssapi_krb5 library, after
gss_process_context_token() is used to process a valid context
deletion token, the caller was left with a security context handle
containing a dangling pointer.  Further uses of this handle would have
resulted in use-after-free and double-free memory access violations.
libgssrpc server applications such as kadmind were vulnerable as they
can be instructed to call gss_process_context_token().

CVE-2014-9421: If the MIT krb5 kadmind daemon receives invalid XDR
data from an authenticated user, it may have performed use-after-free and
double-free memory access violations while cleaning up the partial
deserialization results. Other libgssrpc server applications might also
been vulnerable if they contain insufficiently defensive XDR functions.

CVE-2014-9422: The MIT krb5 kadmind daemon incorrectly accepted
authentications to two-component server principals whose first
component is a left substring of 'kadmin' or whose realm is a left
prefix of the default realm.

CVE-2014-9423: libgssrpc applications including kadmind output four or
eight bytes of uninitialized memory to the network as part of an
unused 'handle' field in replies to clients.

Bugs fixed:
- Work around replay cache creation race; (bnc#898439).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-BSK-12-2015-74,SUSE-SLE-DESKTOP-12-2015-74,SUSE-SLE-SDK-12-2015-74,SUSE-SLE-SERVER-12-2015-74</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150290-2/</URL>
      <Description>Link for SUSE-SU-2015:0290-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:0290-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/897874</URL>
      <Description>SUSE Bug 897874</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/898439</URL>
      <Description>SUSE Bug 898439</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/912002</URL>
      <Description>SUSE Bug 912002</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5351/</URL>
      <Description>SUSE CVE CVE-2014-5351 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5352/</URL>
      <Description>SUSE CVE CVE-2014-5352 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9421/</URL>
      <Description>SUSE CVE CVE-2014-9421 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9422/</URL>
      <Description>SUSE CVE CVE-2014-9422 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9423/</URL>
      <Description>SUSE CVE CVE-2014-9423 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12" CPE="cpe:/o:suse:sled:12">SUSE Linux Enterprise Desktop 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12" CPE="cpe:/o:suse:sles:12">SUSE Linux Enterprise Server 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12" CPE="cpe:/o:suse:sles_sap:12">SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12" CPE="cpe:/o:suse:sle-sdk:12">SUSE Linux Enterprise Software Development Kit 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="krb5-1.12.1-9.1">
      <FullProductName ProductID="krb5-1.12.1-9.1">krb5-1.12.1-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-32bit-1.12.1-9.1">
      <FullProductName ProductID="krb5-32bit-1.12.1-9.1">krb5-32bit-1.12.1-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-client-1.12.1-9.1">
      <FullProductName ProductID="krb5-client-1.12.1-9.1">krb5-client-1.12.1-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-devel-1.12.1-9.1">
      <FullProductName ProductID="krb5-devel-1.12.1-9.1">krb5-devel-1.12.1-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-doc-1.12.1-9.1">
      <FullProductName ProductID="krb5-doc-1.12.1-9.1">krb5-doc-1.12.1-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-plugin-kdb-ldap-1.12.1-9.1">
      <FullProductName ProductID="krb5-plugin-kdb-ldap-1.12.1-9.1">krb5-plugin-kdb-ldap-1.12.1-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-plugin-preauth-otp-1.12.1-9.1">
      <FullProductName ProductID="krb5-plugin-preauth-otp-1.12.1-9.1">krb5-plugin-preauth-otp-1.12.1-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-plugin-preauth-pkinit-1.12.1-9.1">
      <FullProductName ProductID="krb5-plugin-preauth-pkinit-1.12.1-9.1">krb5-plugin-preauth-pkinit-1.12.1-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-server-1.12.1-9.1">
      <FullProductName ProductID="krb5-server-1.12.1-9.1">krb5-server-1.12.1-9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="krb5-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12:krb5-1.12.1-9.1">krb5-1.12.1-9.1 as a component of SUSE Linux Enterprise Desktop 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-32bit-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12:krb5-32bit-1.12.1-9.1">krb5-32bit-1.12.1-9.1 as a component of SUSE Linux Enterprise Desktop 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-client-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12:krb5-client-1.12.1-9.1">krb5-client-1.12.1-9.1 as a component of SUSE Linux Enterprise Desktop 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:krb5-1.12.1-9.1">krb5-1.12.1-9.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-32bit-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-9.1">krb5-32bit-1.12.1-9.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-client-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:krb5-client-1.12.1-9.1">krb5-client-1.12.1-9.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-doc-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-9.1">krb5-doc-1.12.1-9.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-kdb-ldap-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:krb5-plugin-kdb-ldap-1.12.1-9.1">krb5-plugin-kdb-ldap-1.12.1-9.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-preauth-otp-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:krb5-plugin-preauth-otp-1.12.1-9.1">krb5-plugin-preauth-otp-1.12.1-9.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-preauth-pkinit-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:krb5-plugin-preauth-pkinit-1.12.1-9.1">krb5-plugin-preauth-pkinit-1.12.1-9.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-server-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:krb5-server-1.12.1-9.1">krb5-server-1.12.1-9.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:krb5-1.12.1-9.1">krb5-1.12.1-9.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-32bit-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:krb5-32bit-1.12.1-9.1">krb5-32bit-1.12.1-9.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-client-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:krb5-client-1.12.1-9.1">krb5-client-1.12.1-9.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-doc-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:krb5-doc-1.12.1-9.1">krb5-doc-1.12.1-9.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-kdb-ldap-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-kdb-ldap-1.12.1-9.1">krb5-plugin-kdb-ldap-1.12.1-9.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-preauth-otp-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-otp-1.12.1-9.1">krb5-plugin-preauth-otp-1.12.1-9.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-preauth-pkinit-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-pkinit-1.12.1-9.1">krb5-plugin-preauth-pkinit-1.12.1-9.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-server-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:krb5-server-1.12.1-9.1">krb5-server-1.12.1-9.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-devel-1.12.1-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12:krb5-devel-1.12.1-9.1">krb5-devel-1.12.1-9.1 as a component of SUSE Linux Enterprise Software Development Kit 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.</Note>
    </Notes>
    <CVE>CVE-2014-5351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-kdb-ldap-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-preauth-otp-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-preauth-pkinit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-server-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-doc-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-kdb-ldap-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-otp-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-pkinit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-server-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:krb5-devel-1.12.1-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150290-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5351.html</URL>
        <Description>CVE-2014-5351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897874</URL>
        <Description>SUSE Bug 897874</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.</Note>
    </Notes>
    <CVE>CVE-2014-5352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-kdb-ldap-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-preauth-otp-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-preauth-pkinit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-server-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-doc-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-kdb-ldap-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-otp-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-pkinit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-server-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:krb5-devel-1.12.1-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150290-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5352.html</URL>
        <Description>CVE-2014-5352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005509</URL>
        <Description>SUSE Bug 1005509</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912002</URL>
        <Description>SUSE Bug 912002</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind.</Note>
    </Notes>
    <CVE>CVE-2014-9421</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-kdb-ldap-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-preauth-otp-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-preauth-pkinit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-server-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-doc-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-kdb-ldap-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-otp-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-pkinit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-server-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:krb5-devel-1.12.1-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150290-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9421.html</URL>
        <Description>CVE-2014-9421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005509</URL>
        <Description>SUSE Bug 1005509</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912002</URL>
        <Description>SUSE Bug 912002</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.</Note>
    </Notes>
    <CVE>CVE-2014-9422</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-kdb-ldap-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-preauth-otp-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-preauth-pkinit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-server-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-doc-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-kdb-ldap-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-otp-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-pkinit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-server-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:krb5-devel-1.12.1-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150290-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9422.html</URL>
        <Description>CVE-2014-9422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005509</URL>
        <Description>SUSE Bug 1005509</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770172</URL>
        <Description>SUSE Bug 770172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912002</URL>
        <Description>SUSE Bug 912002</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.</Note>
    </Notes>
    <CVE>CVE-2014-9423</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-kdb-ldap-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-preauth-otp-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-plugin-preauth-pkinit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:krb5-server-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-32bit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-client-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-doc-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-kdb-ldap-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-otp-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-plugin-preauth-pkinit-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:krb5-server-1.12.1-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:krb5-devel-1.12.1-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150290-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9423.html</URL>
        <Description>CVE-2014-9423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005509</URL>
        <Description>SUSE Bug 1005509</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912002</URL>
        <Description>SUSE Bug 912002</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
