Synopsis: Low: krb5 security, bug fix, and enhancement update Advisory ID: SLSA-2016:2591-2 Issue Date: 2016-11-03 CVE Numbers: CVE-2016-3119 CVE-2016-3120 -- The following packages have been upgraded to a newer upstream version: krb5 (1.14.1). Security Fix(es): * A NULL pointer dereference flaw was found in MIT Kerberos kadmind service. An authenticated attacker with permission to modify a principal entry could use this flaw to cause kadmind to dereference a null pointer and crash by supplying an empty DB argument to the modify_principal command, if kadmind was configured to use the LDAP KDB module. (CVE-2016-3119) * A NULL pointer dereference flaw was found in MIT Kerberos krb5kdc service. An authenticated attacker could use this flaw to cause krb5kdc to dereference a null pointer and crash by making an S4U2Self request, if the restrict_anonymous_to_tgt option was set to true. (CVE-2016-3120) Additional Changes: -- SL7 x86_64 krb5-debuginfo-1.14.1-26.el7.i686.rpm krb5-debuginfo-1.14.1-26.el7.x86_64.rpm krb5-libs-1.14.1-26.el7.i686.rpm krb5-libs-1.14.1-26.el7.x86_64.rpm krb5-pkinit-1.14.1-26.el7.x86_64.rpm krb5-workstation-1.14.1-26.el7.x86_64.rpm libkadm5-1.14.1-26.el7.i686.rpm libkadm5-1.14.1-26.el7.x86_64.rpm krb5-devel-1.14.1-26.el7.i686.rpm krb5-devel-1.14.1-26.el7.x86_64.rpm krb5-server-1.14.1-26.el7.x86_64.rpm krb5-server-ldap-1.14.1-26.el7.x86_64.rpm - Scientific Linux Development Team