SUSE alert SUSE-SU-2025:3699-1 (krb5)
| From: | SLE-SECURITY-UPDATES <null@suse.de> | |
| To: | sle-security-updates@lists.suse.com | |
| Subject: | SUSE-SU-2025:3699-1: moderate: Security update for krb5 | |
| Date: | Tue, 21 Oct 2025 12:33:40 -0000 | |
| Message-ID: | <176105002000.31332.12992187415721574012@smelt2.prg2.suse.org> |
# Security update for krb5 Announcement ID: SUSE-SU-2025:3699-1 Release Date: 2025-10-21T10:08:11Z Rating: moderate References: * bsc#1241219 Cross-References: * CVE-2025-3576 CVSS scores: * CVE-2025-3576 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-3576 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-3576 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for krb5 fixes the following issues: * CVE-2025-3576: weakness in the MD5 checksum design allows for spoofing of GSSAPI-protected messages that are using RC4-HMAC-MD5 (bsc#1241219). Krb5 as very old protocol supported quite a number of ciphers that are not longer up to current cryptographic standards. To avoid problems with those, SUSE has by default now disabled those alorithms. The following algorithms have been removed from valid krb5 enctypes: * des3-cbc-sha1 * arcfour-hmac-md5 To reenable those algorithms, you can use allow options in krb5.conf: [libdefaults] allow_des3 = true allow_rc4 = true to reenable them. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3699=1 openSUSE-SLE-15.6-2025-3699=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3699=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3699=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-3699=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-3699=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * krb5-plugin-preauth-otp-1.20.1-150600.11.14.1 * krb5-devel-1.20.1-150600.11.14.1 * krb5-plugin-kdb-ldap-1.20.1-150600.11.14.1 * krb5-plugin-kdb-ldap-debuginfo-1.20.1-150600.11.14.1 * krb5-mini-1.20.1-150600.11.14.1 * krb5-debugsource-1.20.1-150600.11.14.1 * krb5-1.20.1-150600.11.14.1 * krb5-plugin-preauth-otp-debuginfo-1.20.1-150600.11.14.1 * krb5-plugin-preauth-pkinit-1.20.1-150600.11.14.1 * krb5-plugin-preauth-spake-debuginfo-1.20.1-150600.11.14.1 * krb5-client-debuginfo-1.20.1-150600.11.14.1 * krb5-server-debuginfo-1.20.1-150600.11.14.1 * krb5-plugin-preauth-spake-1.20.1-150600.11.14.1 * krb5-mini-debugsource-1.20.1-150600.11.14.1 * krb5-plugin-preauth-pkinit-debuginfo-1.20.1-150600.11.14.1 * krb5-debuginfo-1.20.1-150600.11.14.1 * krb5-mini-devel-1.20.1-150600.11.14.1 * krb5-mini-debuginfo-1.20.1-150600.11.14.1 * krb5-client-1.20.1-150600.11.14.1 * krb5-server-1.20.1-150600.11.14.1 * openSUSE Leap 15.6 (x86_64) * krb5-32bit-1.20.1-150600.11.14.1 * krb5-devel-32bit-1.20.1-150600.11.14.1 * krb5-32bit-debuginfo-1.20.1-150600.11.14.1 * openSUSE Leap 15.6 (aarch64_ilp32) * krb5-64bit-debuginfo-1.20.1-150600.11.14.1 * krb5-devel-64bit-1.20.1-150600.11.14.1 * krb5-64bit-1.20.1-150600.11.14.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * krb5-plugin-preauth-otp-1.20.1-150600.11.14.1 * krb5-devel-1.20.1-150600.11.14.1 * krb5-debugsource-1.20.1-150600.11.14.1 * krb5-plugin-preauth-pkinit-1.20.1-150600.11.14.1 * krb5-plugin-preauth-otp-debuginfo-1.20.1-150600.11.14.1 * krb5-client-debuginfo-1.20.1-150600.11.14.1 * krb5-plugin-preauth-pkinit-debuginfo-1.20.1-150600.11.14.1 * krb5-debuginfo-1.20.1-150600.11.14.1 * krb5-1.20.1-150600.11.14.1 * krb5-client-1.20.1-150600.11.14.1 * Basesystem Module 15-SP6 (x86_64) * krb5-32bit-1.20.1-150600.11.14.1 * krb5-32bit-debuginfo-1.20.1-150600.11.14.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * krb5-plugin-preauth-otp-1.20.1-150600.11.14.1 * krb5-devel-1.20.1-150600.11.14.1 * krb5-debugsource-1.20.1-150600.11.14.1 * krb5-plugin-preauth-pkinit-1.20.1-150600.11.14.1 * krb5-plugin-preauth-otp-debuginfo-1.20.1-150600.11.14.1 * krb5-client-debuginfo-1.20.1-150600.11.14.1 * krb5-plugin-preauth-pkinit-debuginfo-1.20.1-150600.11.14.1 * krb5-debuginfo-1.20.1-150600.11.14.1 * krb5-1.20.1-150600.11.14.1 * krb5-client-1.20.1-150600.11.14.1 * Basesystem Module 15-SP7 (x86_64) * krb5-32bit-1.20.1-150600.11.14.1 * krb5-32bit-debuginfo-1.20.1-150600.11.14.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * krb5-plugin-kdb-ldap-1.20.1-150600.11.14.1 * krb5-plugin-kdb-ldap-debuginfo-1.20.1-150600.11.14.1 * krb5-debugsource-1.20.1-150600.11.14.1 * krb5-server-debuginfo-1.20.1-150600.11.14.1 * krb5-debuginfo-1.20.1-150600.11.14.1 * krb5-server-1.20.1-150600.11.14.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * krb5-plugin-kdb-ldap-1.20.1-150600.11.14.1 * krb5-plugin-kdb-ldap-debuginfo-1.20.1-150600.11.14.1 * krb5-debugsource-1.20.1-150600.11.14.1 * krb5-server-debuginfo-1.20.1-150600.11.14.1 * krb5-debuginfo-1.20.1-150600.11.14.1 * krb5-server-1.20.1-150600.11.14.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3576.html * https://bugzilla.suse.com/show_bug.cgi?id=1241219
Attachment: None (type=text/html)
(HTML attachment elided)
