Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:1161-1

Опубликовано: 13 апр. 2021
Источник: suse-cvrf

Описание

Security update for cifs-utils

This update for cifs-utils fixes the following issues:

  • CVE-2021-20208: Fixed a potential kerberos auth leak escaping from container (bsc#1183239)

Список пакетов

Image SLES15-SP1-Azure-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-Azure-HPC-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-CHOST-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP1-CHOST-BYOS-EC2
cifs-utils-6.9-5.9.1
Image SLES15-SP1-CHOST-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP1-EC2-HPC-HVM-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-EC2-HVM-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-GCE-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-Azure-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-EC2-HVM-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAP-GCE-BYOS
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAPCAL-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAPCAL-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP1-SAPCAL-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Azure-Basic
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Azure-Standard
cifs-utils-6.9-5.9.1
Image SLES15-SP2-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP2-CHOST-BYOS-Aliyun
cifs-utils-6.9-5.9.1
Image SLES15-SP2-CHOST-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-CHOST-BYOS-EC2
cifs-utils-6.9-5.9.1
Image SLES15-SP2-CHOST-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP2-EC2-ECS-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP2-HPC-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-HPC-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-HPC-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP2-SAP-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-CHOST-BYOS-Aliyun
cifs-utils-6.9-5.9.1
Image SLES15-SP3-CHOST-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-CHOST-BYOS-EC2
cifs-utils-6.9-5.9.1
Image SLES15-SP3-CHOST-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-CHOST-BYOS-SAP-CCloud
cifs-utils-6.9-5.9.1
Image SLES15-SP3-EC2-ECS-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-HPC-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-HPC-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-HPC-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-HPC-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-BYOS-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-BYOS-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-BYOS-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAP-GCE
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAPCAL-Azure
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAPCAL-EC2-HVM
cifs-utils-6.9-5.9.1
Image SLES15-SP3-SAPCAL-GCE
cifs-utils-6.9-5.9.1
SUSE Linux Enterprise Module for Basesystem 15 SP2
cifs-utils-6.9-5.9.1
cifs-utils-devel-6.9-5.9.1

Описание

A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credentials of the host. The highest threat from this vulnerability is to data confidentiality and integrity.


Затронутые продукты
Image SLES15-SP1-Azure-BYOS:cifs-utils-6.9-5.9.1
Image SLES15-SP1-Azure-HPC-BYOS:cifs-utils-6.9-5.9.1
Image SLES15-SP1-CHOST-BYOS-Azure:cifs-utils-6.9-5.9.1
Image SLES15-SP1-CHOST-BYOS-EC2:cifs-utils-6.9-5.9.1

Ссылки
Уязвимость SUSE-SU-2021:1161-1