<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">krb5-1.19.2-2.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10899</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">krb5-1.19.2-2.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the krb5-1.19.2-2.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10899</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10899</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-6143/</URL>
      <Description>SUSE CVE CVE-2006-6143 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-6144/</URL>
      <Description>SUSE CVE CVE-2006-6144 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-0956/</URL>
      <Description>SUSE CVE CVE-2007-0956 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-0957/</URL>
      <Description>SUSE CVE CVE-2007-0957 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-1216/</URL>
      <Description>SUSE CVE CVE-2007-1216 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-2442/</URL>
      <Description>SUSE CVE CVE-2007-2442 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-2798/</URL>
      <Description>SUSE CVE CVE-2007-2798 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-3999/</URL>
      <Description>SUSE CVE CVE-2007-3999 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-4000/</URL>
      <Description>SUSE CVE CVE-2007-4000 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-5894/</URL>
      <Description>SUSE CVE CVE-2007-5894 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-5902/</URL>
      <Description>SUSE CVE CVE-2007-5902 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-5971/</URL>
      <Description>SUSE CVE CVE-2007-5971 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-5972/</URL>
      <Description>SUSE CVE CVE-2007-5972 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0062/</URL>
      <Description>SUSE CVE CVE-2008-0062 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0947/</URL>
      <Description>SUSE CVE CVE-2008-0947 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11368/</URL>
      <Description>SUSE CVE CVE-2017-11368 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11462/</URL>
      <Description>SUSE CVE CVE-2017-11462 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5729/</URL>
      <Description>SUSE CVE CVE-2018-5729 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-36222/</URL>
      <Description>SUSE CVE CVE-2021-36222 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-37750/</URL>
      <Description>SUSE CVE CVE-2021-37750 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="krb5-1.19.2-2.2">
      <FullProductName ProductID="krb5-1.19.2-2.2">krb5-1.19.2-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-32bit-1.19.2-2.2">
      <FullProductName ProductID="krb5-32bit-1.19.2-2.2">krb5-32bit-1.19.2-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-client-1.19.2-2.2">
      <FullProductName ProductID="krb5-client-1.19.2-2.2">krb5-client-1.19.2-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-devel-1.19.2-2.2">
      <FullProductName ProductID="krb5-devel-1.19.2-2.2">krb5-devel-1.19.2-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-devel-32bit-1.19.2-2.2">
      <FullProductName ProductID="krb5-devel-32bit-1.19.2-2.2">krb5-devel-32bit-1.19.2-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-plugin-kdb-ldap-1.19.2-2.2">
      <FullProductName ProductID="krb5-plugin-kdb-ldap-1.19.2-2.2">krb5-plugin-kdb-ldap-1.19.2-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-plugin-preauth-otp-1.19.2-2.2">
      <FullProductName ProductID="krb5-plugin-preauth-otp-1.19.2-2.2">krb5-plugin-preauth-otp-1.19.2-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-plugin-preauth-pkinit-1.19.2-2.2">
      <FullProductName ProductID="krb5-plugin-preauth-pkinit-1.19.2-2.2">krb5-plugin-preauth-pkinit-1.19.2-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-plugin-preauth-spake-1.19.2-2.2">
      <FullProductName ProductID="krb5-plugin-preauth-spake-1.19.2-2.2">krb5-plugin-preauth-spake-1.19.2-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="krb5-server-1.19.2-2.2">
      <FullProductName ProductID="krb5-server-1.19.2-2.2">krb5-server-1.19.2-2.2</FullProductName>
    </Branch>
    <Relationship ProductReference="krb5-1.19.2-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-1.19.2-2.2">krb5-1.19.2-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-32bit-1.19.2-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2">krb5-32bit-1.19.2-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-client-1.19.2-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-client-1.19.2-2.2">krb5-client-1.19.2-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-devel-1.19.2-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-devel-1.19.2-2.2">krb5-devel-1.19.2-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-devel-32bit-1.19.2-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2">krb5-devel-32bit-1.19.2-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-kdb-ldap-1.19.2-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2">krb5-plugin-kdb-ldap-1.19.2-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-preauth-otp-1.19.2-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2">krb5-plugin-preauth-otp-1.19.2-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-preauth-pkinit-1.19.2-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2">krb5-plugin-preauth-pkinit-1.19.2-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-plugin-preauth-spake-1.19.2-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2">krb5-plugin-preauth-spake-1.19.2-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="krb5-server-1.19.2-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:krb5-server-1.19.2-2.2">krb5-server-1.19.2-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2006-6143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-6143.html</URL>
        <Description>CVE-2006-6143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/225990</URL>
        <Description>SUSE Bug 225990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/225992</URL>
        <Description>SUSE Bug 225992</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The "mechglue" abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) via unspecified vectors that cause mechglue to free uninitialized pointers.</Note>
    </Notes>
    <CVE>CVE-2006-6144</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-6144.html</URL>
        <Description>CVE-2006-6144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/225990</URL>
        <Description>SUSE Bug 225990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/225992</URL>
        <Description>SUSE Bug 225992</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The telnet daemon (telnetd) in MIT krb5 before 1.6.1 allows remote attackers to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882.</Note>
    </Notes>
    <CVE>CVE-2007-0956</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-0956.html</URL>
        <Description>CVE-2007-0956</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/247765</URL>
        <Description>SUSE Bug 247765</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/256319</URL>
        <Description>SUSE Bug 256319</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers.</Note>
    </Notes>
    <CVE>CVE-2007-0957</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-0957.html</URL>
        <Description>CVE-2007-0957</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/253548</URL>
        <Description>SUSE Bug 253548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/256319</URL>
        <Description>SUSE Bug 256319</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an "an invalid direction encoding".</Note>
    </Notes>
    <CVE>CVE-2007-1216</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-1216.html</URL>
        <Description>CVE-2007-1216</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/252487</URL>
        <Description>SUSE Bug 252487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/256319</URL>
        <Description>SUSE Bug 256319</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.</Note>
    </Notes>
    <CVE>CVE-2007-2442</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-2442.html</URL>
        <Description>CVE-2007-2442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/271191</URL>
        <Description>SUSE Bug 271191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/283681</URL>
        <Description>SUSE Bug 283681</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.</Note>
    </Notes>
    <CVE>CVE-2007-2798</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-2798.html</URL>
        <Description>CVE-2007-2798</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/278689</URL>
        <Description>SUSE Bug 278689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/283681</URL>
        <Description>SUSE Bug 283681</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.</Note>
    </Notes>
    <CVE>CVE-2007-3999</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-3999.html</URL>
        <Description>CVE-2007-3999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/302377</URL>
        <Description>SUSE Bug 302377</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/305261</URL>
        <Description>SUSE Bug 305261</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy.c in the Kerberos administration daemon (kadmind) in MIT Kerberos 5 (krb5) 1.5 through 1.6.2 does not properly check return values when the policy does not exist, which might allow remote authenticated users with the "modify policy" privilege to execute arbitrary code via unspecified vectors that trigger a write to an uninitialized pointer.</Note>
    </Notes>
    <CVE>CVE-2007-4000</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-4000.html</URL>
        <Description>CVE-2007-4000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/302377</URL>
        <Description>SUSE Bug 302377</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/305261</URL>
        <Description>SUSE Bug 305261</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED **  The reply function in ftpd.c in the gssftp ftpd in MIT Kerberos 5 (krb5) does not initialize the length variable when auth_type has a certain value, which has unknown impact and remote authenticated attack vectors.  NOTE: the original disclosure misidentifies the conditions under which the uninitialized variable is used.  NOTE: the vendor disputes this issue, stating " The 'length' variable is only uninitialized if 'auth_type' is neither the 'KERBEROS_V4' nor 'GSSAPI'; this condition cannot occur in the unmodified source code."</Note>
    </Notes>
    <CVE>CVE-2007-5894</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-5894.html</URL>
        <Description>CVE-2007-5894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/346745</URL>
        <Description>SUSE Bug 346745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/346749</URL>
        <Description>SUSE Bug 346749</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.</Note>
    </Notes>
    <CVE>CVE-2007-5902</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-5902.html</URL>
        <Description>CVE-2007-5902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/346747</URL>
        <Description>SUSE Bug 346747</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/346749</URL>
        <Description>SUSE Bug 346749</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/krb5/k5sealv3.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors.</Note>
    </Notes>
    <CVE>CVE-2007-5971</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-5971.html</URL>
        <Description>CVE-2007-5971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/346748</URL>
        <Description>SUSE Bug 346748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/346749</URL>
        <Description>SUSE Bug 346749</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the krb5_def_store_mkey function in lib/kdb/kdb_default.c in MIT Kerberos 5 (krb5) 1.5 has unknown impact and remote authenticated attack vectors.  NOTE: the free operations occur in code that stores the krb5kdc master key, and so the attacker must have privileges to store this key.</Note>
    </Notes>
    <CVE>CVE-2007-5972</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-5972.html</URL>
        <Description>CVE-2007-5972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/346749</URL>
        <Description>SUSE Bug 346749</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.</Note>
    </Notes>
    <CVE>CVE-2008-0062</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0062.html</URL>
        <Description>CVE-2008-0062</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/361373</URL>
        <Description>SUSE Bug 361373</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the RPC library used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.4 through 1.6.3 allows remote attackers to execute arbitrary code by triggering a large number of open file descriptors.</Note>
    </Notes>
    <CVE>CVE-2008-0947</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0947.html</URL>
        <Description>CVE-2008-0947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/363151</URL>
        <Description>SUSE Bug 363151</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.</Note>
    </Notes>
    <CVE>CVE-2017-11368</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11368.html</URL>
        <Description>CVE-2017-11368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049819</URL>
        <Description>SUSE Bug 1049819</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to have unspecified impact via vectors involving automatic deletion of security contexts on error.</Note>
    </Notes>
    <CVE>CVE-2017-11462</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11462.html</URL>
        <Description>CVE-2017-11462</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056995</URL>
        <Description>SUSE Bug 1056995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122468</URL>
        <Description>SUSE Bug 1122468</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.</Note>
    </Notes>
    <CVE>CVE-2018-5729</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5729.html</URL>
        <Description>CVE-2018-5729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076211</URL>
        <Description>SUSE Bug 1076211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083926</URL>
        <Description>SUSE Bug 1083926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122468</URL>
        <Description>SUSE Bug 1122468</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.</Note>
    </Notes>
    <CVE>CVE-2021-36222</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-36222.html</URL>
        <Description>CVE-2021-36222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188571</URL>
        <Description>SUSE Bug 1188571</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.</Note>
    </Notes>
    <CVE>CVE-2021-37750</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:krb5-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-client-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-devel-32bit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.19.2-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:krb5-server-1.19.2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-37750.html</URL>
        <Description>CVE-2021-37750</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189929</URL>
        <Description>SUSE Bug 1189929</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
