Mailinglist Archive: opensuse-updates (117 mails)

< Previous Next >
openSUSE-SU-2017:2180-1: moderate: Security update for libheimdal
openSUSE Security Update: Security update for libheimdal

Announcement ID: openSUSE-SU-2017:2180-1
Rating: moderate
References: #1048278
Cross-References: CVE-2017-11103 CVE-2017-6594
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2

An update that fixes two vulnerabilities is now available.


This update for libheimdal fixes the following issues:

- Fix CVE-2017-11103: Orpheus' Lyre KDC-REP service name validation.
This is a critical vulnerability. In _krb5_extract_ticket() the
KDC-REP service name must be
obtained from encrypted version stored in 'enc_part' instead
of the unencrypted version stored in 'ticket'. Use of the unecrypted
version provides an opportunity for successful server impersonation and
other attacks. Identified by Jeffrey Altman, Viktor Duchovni and Nico
Williams. See for more details.

- Fix CVE-2017-6594: transit path validation inadvertently caused the
previous hop realm to not be added to the transit path of issued
tickets. This may, in some cases, enable bypass of capath policy in
Heimdal versions 1.5 through 7.2. Note, this may break sites that
rely on the bug. With the bug some incomplete [capaths] worked, that
should not have. These may now break authentication in some
cross-realm configurations.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2017-937=1

- openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-937=1

To bring your system up-to-date, use "zypper patch".

Package List:

- openSUSE Leap 42.3 (i586 x86_64):


- openSUSE Leap 42.2 (i586 x86_64):



< Previous Next >
This Thread
  • No further messages