Описание
Security update for krb5
This update for krb5 fixes the following issues:
- CVE-2024-37370: Fixed confidential GSS krb5 wrap tokens with invalid fields were errouneously accepted (bsc#1227186).
- CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187).
Список пакетов
Container suse/ltss/sle12.5/sles12sp5:latest
krb5-1.16.3-46.15.1
Container suse/sles12sp5:latest
krb5-1.16.3-46.15.1
Image SLES12-SP5-Azure-BYOS
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-Azure-Basic-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-Azure-HPC-BYOS
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-Azure-HPC-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-Azure-SAP-BYOS
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-Azure-SAP-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-Azure-Standard-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-EC2-BYOS
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-EC2-ECS-On-Demand
krb5-1.16.3-46.15.1
Image SLES12-SP5-EC2-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-EC2-SAP-BYOS
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-EC2-SAP-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-GCE-BYOS
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-GCE-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-GCE-SAP-BYOS
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-GCE-SAP-On-Demand
krb5-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
krb5-1.16.3-46.15.1
krb5-32bit-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
krb5-1.16.3-46.15.1
krb5-32bit-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
SUSE Linux Enterprise Server 12 SP5
krb5-1.16.3-46.15.1
krb5-32bit-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
krb5-doc-1.16.3-46.15.1
krb5-plugin-kdb-ldap-1.16.3-46.15.1
krb5-plugin-preauth-otp-1.16.3-46.15.1
krb5-plugin-preauth-pkinit-1.16.3-46.15.1
krb5-server-1.16.3-46.15.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
krb5-1.16.3-46.15.1
krb5-32bit-1.16.3-46.15.1
krb5-client-1.16.3-46.15.1
krb5-doc-1.16.3-46.15.1
krb5-plugin-kdb-ldap-1.16.3-46.15.1
krb5-plugin-preauth-otp-1.16.3-46.15.1
krb5-plugin-preauth-pkinit-1.16.3-46.15.1
krb5-server-1.16.3-46.15.1
SUSE Linux Enterprise Software Development Kit 12 SP5
krb5-devel-1.16.3-46.15.1
Ссылки
- Link for SUSE-SU-2024:2300-1
- E-Mail link for SUSE-SU-2024:2300-1
- SUSE Security Ratings
- SUSE Bug 1227186
- SUSE Bug 1227187
- SUSE CVE CVE-2024-37370 page
- SUSE CVE CVE-2024-37371 page
Описание
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.
Затронутые продукты
Container suse/ltss/sle12.5/sles12sp5:latest:krb5-1.16.3-46.15.1
Container suse/sles12sp5:latest:krb5-1.16.3-46.15.1
Image SLES12-SP5-Azure-BYOS:krb5-1.16.3-46.15.1
Image SLES12-SP5-Azure-BYOS:krb5-client-1.16.3-46.15.1
Ссылки
- CVE-2024-37370
- SUSE Bug 1227186
- SUSE Bug 1227187
Описание
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
Затронутые продукты
Container suse/ltss/sle12.5/sles12sp5:latest:krb5-1.16.3-46.15.1
Container suse/sles12sp5:latest:krb5-1.16.3-46.15.1
Image SLES12-SP5-Azure-BYOS:krb5-1.16.3-46.15.1
Image SLES12-SP5-Azure-BYOS:krb5-client-1.16.3-46.15.1
Ссылки
- CVE-2024-37371
- SUSE Bug 1227186
- SUSE Bug 1227187