{"affected":[{"ecosystem_specific":{"binaries":[{"krb5":"1.12.1-25.1","krb5-32bit":"1.12.1-25.1","krb5-client":"1.12.1-25.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12","name":"krb5","purl":"pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Desktop%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12.1-25.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"krb5":"1.12.1-25.1","krb5-32bit":"1.12.1-25.1","krb5-client":"1.12.1-25.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP1","name":"krb5","purl":"pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12.1-25.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"krb5-devel":"1.12.1-25.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12","name":"krb5","purl":"pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12.1-25.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"krb5-devel":"1.12.1-25.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP1","name":"krb5","purl":"pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12.1-25.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"krb5":"1.12.1-25.1","krb5-32bit":"1.12.1-25.1","krb5-client":"1.12.1-25.1","krb5-doc":"1.12.1-25.1","krb5-plugin-kdb-ldap":"1.12.1-25.1","krb5-plugin-preauth-otp":"1.12.1-25.1","krb5-plugin-preauth-pkinit":"1.12.1-25.1","krb5-server":"1.12.1-25.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12","name":"krb5","purl":"pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12.1-25.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"krb5":"1.12.1-25.1","krb5-32bit":"1.12.1-25.1","krb5-client":"1.12.1-25.1","krb5-doc":"1.12.1-25.1","krb5-plugin-kdb-ldap":"1.12.1-25.1","krb5-plugin-preauth-otp":"1.12.1-25.1","krb5-plugin-preauth-pkinit":"1.12.1-25.1","krb5-server":"1.12.1-25.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12","name":"krb5","purl":"pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12.1-25.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"krb5":"1.12.1-25.1","krb5-32bit":"1.12.1-25.1","krb5-client":"1.12.1-25.1","krb5-doc":"1.12.1-25.1","krb5-plugin-kdb-ldap":"1.12.1-25.1","krb5-plugin-preauth-otp":"1.12.1-25.1","krb5-plugin-preauth-pkinit":"1.12.1-25.1","krb5-server":"1.12.1-25.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1","name":"krb5","purl":"pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12.1-25.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"krb5":"1.12.1-25.1","krb5-32bit":"1.12.1-25.1","krb5-client":"1.12.1-25.1","krb5-doc":"1.12.1-25.1","krb5-plugin-kdb-ldap":"1.12.1-25.1","krb5-plugin-preauth-otp":"1.12.1-25.1","krb5-plugin-preauth-pkinit":"1.12.1-25.1","krb5-server":"1.12.1-25.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"krb5","purl":"pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12.1-25.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for krb5 fixes the following issues:\n\n- CVE-2015-8629: Information leak authenticated attackers with permissions to modify the database (bsc#963968)\n- CVE-2015-8630: An authenticated attacker with permission to modify a principal entry may have caused kadmind to crash (bsc#963964)\n- CVE-2015-8631: An authenticated attacker could have caused a memory leak in auditd by supplying a null principal name in request (bsc#963975)\n","id":"SUSE-SU-2016:0429-1","modified":"2016-02-11T10:51:55Z","published":"2016-02-11T10:51:55Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160429-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/963964"},{"type":"REPORT","url":"https://bugzilla.suse.com/963968"},{"type":"REPORT","url":"https://bugzilla.suse.com/963975"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-8629"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-8630"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-8631"}],"related":["CVE-2015-8629","CVE-2015-8630","CVE-2015-8631"],"summary":"Security update for krb5","upstream":["CVE-2015-8629","CVE-2015-8630","CVE-2015-8631"]}