Updated krb5 packages fix security vulnerabilities:
In any MIT krb5 release with the patches for CVE-2015-2696 applied, an application which calls gssexportsec_context() may experience memory corruption if the context was established using the IAKERB mechanism. Historically, some vulnerabilities of this nature can be translated into remote code execution, though the necessary exploits must be tailored to the individual application and are usually quite complicated (CVE-2015-2698).