Описание
Security update for cifs-utils
This update for cifs-utils fixes the following issues:
- CVE-2021-20208: Fixed a potential kerberos auth leak escaping from container (bsc#1183239)
Список пакетов
Image SLES15-SP1-Azure-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-Azure-HPC-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-CHOST-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP1-CHOST-BYOS-EC2
cifs-utils-6.9-5.9.1
Image SLES15-SP1-CHOST-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP1-EC2-HPC-HVM-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-EC2-HVM-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-GCE-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-Azure-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-EC2-HVM-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-GCE-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAPCAL-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAPCAL-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAPCAL-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Azure-Basic
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Azure-Standard
cifs-utils-6.9-5.9.1
Image SLES15-SP2-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP2-CHOST-BYOS-Aliyun
cifs-utils-6.9-5.9.1
Image SLES15-SP2-CHOST-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-CHOST-BYOS-EC2
cifs-utils-6.9-5.9.1
Image SLES15-SP2-CHOST-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP2-EC2-ECS-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP2-HPC-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-HPC-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-HPC-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-CHOST-BYOS-Aliyun
cifs-utils-6.9-5.9.1
Image SLES15-SP3-CHOST-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-CHOST-BYOS-EC2
cifs-utils-6.9-5.9.1
Image SLES15-SP3-CHOST-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-CHOST-BYOS-SAP-CCloud
cifs-utils-6.9-5.9.1
Image SLES15-SP3-EC2-ECS-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-HPC-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-HPC-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-HPC-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-HPC-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAPCAL-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAPCAL-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAPCAL-GCE
cifs-utils-6.9-5.9.1
SUSE Linux Enterprise Module for Basesystem 15 SP2
cifs-utils-6.9-5.9.1
cifs-utils-devel-6.9-5.9.1
Ссылки
- Link for SUSE-SU-2021:1161-1
- E-Mail link for SUSE-SU-2021:1161-1
- SUSE Security Ratings
- SUSE Bug 1183239
- SUSE CVE CVE-2021-20208 page
Описание
A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credentials of the host. The highest threat from this vulnerability is to data confidentiality and integrity.
Затронутые продукты
Image SLES15-SP1-Azure-BYOS:cifs-utils-6.9-5.9.1
Image SLES15-SP1-Azure-HPC-BYOS:cifs-utils-6.9-5.9.1
Image SLES15-SP1-CHOST-BYOS-Azure:cifs-utils-6.9-5.9.1
Image SLES15-SP1-CHOST-BYOS-EC2:cifs-utils-6.9-5.9.1
Ссылки
- CVE-2021-20208
- SUSE Bug 1183239