Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:2300-1

Опубликовано: 04 июл. 2024
Источник: suse-cvrf

Описание

Security update for krb5

This update for krb5 fixes the following issues:

  • CVE-2024-37370: Fixed confidential GSS krb5 wrap tokens with invalid fields were errouneously accepted (bsc#1227186).
  • CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187).

Список пакетов

Container suse/ltss/sle12.5/sles12sp5:latest
krb5-1.16.3-46.15.1
Container suse/sles12sp5:latest
krb5-1.16.3-46.15.1
Image SLES12-SP5-Azure-BYOS
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-Azure-Basic-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-Azure-HPC-BYOS
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-Azure-HPC-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-Azure-SAP-BYOS
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-Azure-SAP-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-Azure-Standard-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-EC2-BYOS
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-EC2-ECS-On-Demand
krb5-1.16.3-46.15.1
Image SLES12-SP5-EC2-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-EC2-SAP-BYOS
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-EC2-SAP-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-GCE-BYOS
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-GCE-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-GCE-SAP-BYOS
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-GCE-SAP-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
krb5-1.16.3-46.15.1
krb5-32bit-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
krb5-1.16.3-46.15.1
krb5-32bit-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
SUSE Linux Enterprise Server 12 SP5
krb5-1.16.3-46.15.1
krb5-32bit-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
krb5-doc-1.16.3-46.15.1
krb5-plugin-kdb-ldap-1.16.3-46.15.1
krb5-plugin-preauth-otp-1.16.3-46.15.1
krb5-plugin-preauth-pkinit-1.16.3-46.15.1
krb5-server-1.16.3-46.15.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
krb5-1.16.3-46.15.1
krb5-32bit-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
krb5-doc-1.16.3-46.15.1
krb5-plugin-kdb-ldap-1.16.3-46.15.1
krb5-plugin-preauth-otp-1.16.3-46.15.1
krb5-plugin-preauth-pkinit-1.16.3-46.15.1
krb5-server-1.16.3-46.15.1
SUSE Linux Enterprise Software Development Kit 12 SP5
krb5-devel-1.16.3-46.15.1

Описание

In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.


Затронутые продукты
Container suse/ltss/sle12.5/sles12sp5:latest:krb5-1.16.3-46.15.1
Container suse/sles12sp5:latest:krb5-1.16.3-46.15.1
Image SLES12-SP5-Azure-BYOS:krb5-1.16.3-46.15.1
Image SLES12-SP5-Azure-BYOS:krb5-client-1.16.3-46.15.1

Ссылки

Описание

In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.


Затронутые продукты
Container suse/ltss/sle12.5/sles12sp5:latest:krb5-1.16.3-46.15.1
Container suse/sles12sp5:latest:krb5-1.16.3-46.15.1
Image SLES12-SP5-Azure-BYOS:krb5-1.16.3-46.15.1
Image SLES12-SP5-Azure-BYOS:krb5-client-1.16.3-46.15.1

Ссылки