SUSE alert SUSE-SU-2025:03270-1 (krb5)
From: | OPENSUSE-SECURITY-UPDATES <null@suse.de> | |
To: | security-announce@lists.opensuse.org | |
Subject: | SUSE-SU-2025:03270-1: moderate: Security update for krb5 | |
Date: | Thu, 18 Sep 2025 12:30:07 -0000 | |
Message-ID: | <175819860725.9345.9376267041190631248@smelt2.prg2.suse.org> | |
Archive-link: | Article |
# Security update for krb5 Announcement ID: SUSE-SU-2025:03270-1 Release Date: 2025-09-18T11:18:09Z Rating: moderate References: * bsc#1241219 Cross-References: * CVE-2025-3576 CVSS scores: * CVE-2025-3576 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-3576 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-3576 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Micro 5.5 An update that solves one vulnerability can now be installed. ## Description: This update for krb5 fixes the following issues: * CVE-2025-3576: weakness in the MD5 checksum design allows for spoofing of GSSAPI-protected messages that are using RC4-HMAC-MD5 (bsc#1241219). Krb5, as a very old protocol, supported quite a number of ciphers that are not longer up to current cryptographic standards. To avoid problems with those, SUSE has by default now disabled those algorithms. The following algorithms have been removed from valid krb5 enctypes: * des3-cbc-sha1 * arcfour-hmac-md5 To reenable those algorithms, you can use allow options in `krb5.conf`: [libdefaults] allow_des3 = true allow_rc4 = true ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3270=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-3270=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * krb5-plugin-preauth-pkinit-1.20.1-150500.3.17.1 * krb5-1.20.1-150500.3.17.1 * krb5-plugin-kdb-ldap-debuginfo-1.20.1-150500.3.17.1 * krb5-plugin-preauth-spake-debuginfo-1.20.1-150500.3.17.1 * krb5-server-debuginfo-1.20.1-150500.3.17.1 * krb5-devel-1.20.1-150500.3.17.1 * krb5-mini-devel-1.20.1-150500.3.17.1 * krb5-mini-debuginfo-1.20.1-150500.3.17.1 * krb5-client-debuginfo-1.20.1-150500.3.17.1 * krb5-plugin-preauth-otp-debuginfo-1.20.1-150500.3.17.1 * krb5-server-1.20.1-150500.3.17.1 * krb5-client-1.20.1-150500.3.17.1 * krb5-debugsource-1.20.1-150500.3.17.1 * krb5-debuginfo-1.20.1-150500.3.17.1 * krb5-plugin-preauth-spake-1.20.1-150500.3.17.1 * krb5-plugin-preauth-pkinit-debuginfo-1.20.1-150500.3.17.1 * krb5-mini-1.20.1-150500.3.17.1 * krb5-plugin-kdb-ldap-1.20.1-150500.3.17.1 * krb5-plugin-preauth-otp-1.20.1-150500.3.17.1 * krb5-mini-debugsource-1.20.1-150500.3.17.1 * openSUSE Leap 15.5 (x86_64) * krb5-32bit-debuginfo-1.20.1-150500.3.17.1 * krb5-32bit-1.20.1-150500.3.17.1 * krb5-devel-32bit-1.20.1-150500.3.17.1 * openSUSE Leap 15.5 (aarch64_ilp32) * krb5-64bit-1.20.1-150500.3.17.1 * krb5-64bit-debuginfo-1.20.1-150500.3.17.1 * krb5-devel-64bit-1.20.1-150500.3.17.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * krb5-client-1.20.1-150500.3.17.1 * krb5-1.20.1-150500.3.17.1 * krb5-debuginfo-1.20.1-150500.3.17.1 * krb5-debugsource-1.20.1-150500.3.17.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3576.html * https://bugzilla.suse.com/show_bug.cgi?id=1241219
Attachment: None (type=text/html)
(HTML attachment elided)