update for krb5

- fix KDC null pointer dereference in TGS handling
(MITKRB5-SA-2011-007, bnc#730393)
CVE-2011-1530

- fix KDC HA feature introduced with implementing KDC poll
(RT#6951)

- fix minor error messages for the IAKERB GSSAPI mechanism
(see: http://krbdev.mit.edu/rt/Ticket/Display.html?id=7020)

- fix KDC null pointer dereference in TGS handling
(MITKRB5-SA-2011-007, bnc#730393)
CVE-2011-1530

- fix KDC HA feature introduced with implementing KDC poll
(RT#6951, bnc#731648)

- fix minor error messages for the IAKERB GSSAPI mechanism
(see: http://krbdev.mit.edu/rt/Ticket/Display.html?id=7020)

Fixed bugs
bnc#731648
The OpenSuSE version of krb5 1.9 has introduced a bug that causes denial of service.
bnc#730393
VUL-0: CVE-2011-1530: krb5: KDC null pointer dereference in TGS handling
CVE-CVE-2011-1530
The process_tgs_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS r
Selected Binaries
openSUSE Build Service is sponsored by