SUSE-SU-2023:3363-1

Source
https://www.suse.com/support/update/announcement/2023/suse-su-20233363-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:3363-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2023:3363-1
Related
Published
2023-08-18T12:55:04Z
Modified
2023-08-18T12:55:04Z
Summary
Security update for krb5
Details

This update for krb5 fixes the following issues:

  • CVE-2023-36054: Fixed a DoS that could be triggered by an authenticated remote user. (bsc#1214054)
References

Affected packages

SUSE:Linux Enterprise Micro 5.3 / krb5

Package

Name
krb5
Purl
pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Micro%205.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.19.2-150400.3.6.1

Ecosystem specific

{
    "binaries": [
        {
            "krb5": "1.19.2-150400.3.6.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.4 / krb5

Package

Name
krb5
Purl
pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Micro%205.4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.19.2-150400.3.6.1

Ecosystem specific

{
    "binaries": [
        {
            "krb5": "1.19.2-150400.3.6.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Basesystem 15 SP4 / krb5

Package

Name
krb5
Purl
pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.19.2-150400.3.6.1

Ecosystem specific

{
    "binaries": [
        {
            "krb5-devel": "1.19.2-150400.3.6.1",
            "krb5": "1.19.2-150400.3.6.1",
            "krb5-plugin-preauth-pkinit": "1.19.2-150400.3.6.1",
            "krb5-plugin-preauth-otp": "1.19.2-150400.3.6.1",
            "krb5-32bit": "1.19.2-150400.3.6.1",
            "krb5-client": "1.19.2-150400.3.6.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Server Applications 15 SP4 / krb5

Package

Name
krb5
Purl
pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.19.2-150400.3.6.1

Ecosystem specific

{
    "binaries": [
        {
            "krb5-plugin-kdb-ldap": "1.19.2-150400.3.6.1",
            "krb5-server": "1.19.2-150400.3.6.1"
        }
    ]
}

openSUSE:Leap Micro 5.3 / krb5

Package

Name
krb5
Purl
pkg:rpm/opensuse/krb5&distro=openSUSE%20Leap%20Micro%205.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.19.2-150400.3.6.1

Ecosystem specific

{
    "binaries": [
        {
            "krb5": "1.19.2-150400.3.6.1"
        }
    ]
}

openSUSE:Leap Micro 5.4 / krb5

Package

Name
krb5
Purl
pkg:rpm/opensuse/krb5&distro=openSUSE%20Leap%20Micro%205.4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.19.2-150400.3.6.1

Ecosystem specific

{
    "binaries": [
        {
            "krb5": "1.19.2-150400.3.6.1"
        }
    ]
}

openSUSE:Leap 15.4 / krb5

Package

Name
krb5
Purl
pkg:rpm/opensuse/krb5&distro=openSUSE%20Leap%2015.4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.19.2-150400.3.6.1

Ecosystem specific

{
    "binaries": [
        {
            "krb5-devel": "1.19.2-150400.3.6.1",
            "krb5-plugin-preauth-pkinit": "1.19.2-150400.3.6.1",
            "krb5-plugin-preauth-otp": "1.19.2-150400.3.6.1",
            "krb5-client": "1.19.2-150400.3.6.1",
            "krb5-plugin-preauth-spake": "1.19.2-150400.3.6.1",
            "krb5": "1.19.2-150400.3.6.1",
            "krb5-devel-32bit": "1.19.2-150400.3.6.1",
            "krb5-32bit": "1.19.2-150400.3.6.1",
            "krb5-plugin-kdb-ldap": "1.19.2-150400.3.6.1",
            "krb5-server": "1.19.2-150400.3.6.1"
        }
    ]
}