|
|
Subscribe / Log in / New account

SUSE alert SUSE-SU-2025:03270-1 (krb5)

From:  OPENSUSE-SECURITY-UPDATES <null@suse.de>
To:  security-announce@lists.opensuse.org
Subject:  SUSE-SU-2025:03270-1: moderate: Security update for krb5
Date:  Thu, 18 Sep 2025 12:30:07 -0000
Message-ID:  <175819860725.9345.9376267041190631248@smelt2.prg2.suse.org>
Archive-link:  Article

# Security update for krb5 Announcement ID: SUSE-SU-2025:03270-1 Release Date: 2025-09-18T11:18:09Z Rating: moderate References: * bsc#1241219 Cross-References: * CVE-2025-3576 CVSS scores: * CVE-2025-3576 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-3576 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-3576 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Micro 5.5 An update that solves one vulnerability can now be installed. ## Description: This update for krb5 fixes the following issues: * CVE-2025-3576: weakness in the MD5 checksum design allows for spoofing of GSSAPI-protected messages that are using RC4-HMAC-MD5 (bsc#1241219). Krb5, as a very old protocol, supported quite a number of ciphers that are not longer up to current cryptographic standards. To avoid problems with those, SUSE has by default now disabled those algorithms. The following algorithms have been removed from valid krb5 enctypes: * des3-cbc-sha1 * arcfour-hmac-md5 To reenable those algorithms, you can use allow options in `krb5.conf`: [libdefaults] allow_des3 = true allow_rc4 = true ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3270=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-3270=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * krb5-plugin-preauth-pkinit-1.20.1-150500.3.17.1 * krb5-1.20.1-150500.3.17.1 * krb5-plugin-kdb-ldap-debuginfo-1.20.1-150500.3.17.1 * krb5-plugin-preauth-spake-debuginfo-1.20.1-150500.3.17.1 * krb5-server-debuginfo-1.20.1-150500.3.17.1 * krb5-devel-1.20.1-150500.3.17.1 * krb5-mini-devel-1.20.1-150500.3.17.1 * krb5-mini-debuginfo-1.20.1-150500.3.17.1 * krb5-client-debuginfo-1.20.1-150500.3.17.1 * krb5-plugin-preauth-otp-debuginfo-1.20.1-150500.3.17.1 * krb5-server-1.20.1-150500.3.17.1 * krb5-client-1.20.1-150500.3.17.1 * krb5-debugsource-1.20.1-150500.3.17.1 * krb5-debuginfo-1.20.1-150500.3.17.1 * krb5-plugin-preauth-spake-1.20.1-150500.3.17.1 * krb5-plugin-preauth-pkinit-debuginfo-1.20.1-150500.3.17.1 * krb5-mini-1.20.1-150500.3.17.1 * krb5-plugin-kdb-ldap-1.20.1-150500.3.17.1 * krb5-plugin-preauth-otp-1.20.1-150500.3.17.1 * krb5-mini-debugsource-1.20.1-150500.3.17.1 * openSUSE Leap 15.5 (x86_64) * krb5-32bit-debuginfo-1.20.1-150500.3.17.1 * krb5-32bit-1.20.1-150500.3.17.1 * krb5-devel-32bit-1.20.1-150500.3.17.1 * openSUSE Leap 15.5 (aarch64_ilp32) * krb5-64bit-1.20.1-150500.3.17.1 * krb5-64bit-debuginfo-1.20.1-150500.3.17.1 * krb5-devel-64bit-1.20.1-150500.3.17.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * krb5-client-1.20.1-150500.3.17.1 * krb5-1.20.1-150500.3.17.1 * krb5-debuginfo-1.20.1-150500.3.17.1 * krb5-debugsource-1.20.1-150500.3.17.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3576.html * https://bugzilla.suse.com/show_bug.cgi?id=1241219


Attachment: None (type=text/html)

(HTML attachment elided)


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds