<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libasn1-8-7.8.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12580</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libasn1-8-7.8.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libasn1-8-7.8.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12580</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:12580</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14870/</URL>
      <Description>SUSE CVE CVE-2019-14870 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3671/</URL>
      <Description>SUSE CVE CVE-2021-3671 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-44758/</URL>
      <Description>SUSE CVE CVE-2021-44758 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3437/</URL>
      <Description>SUSE CVE CVE-2022-3437 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-41916/</URL>
      <Description>SUSE CVE CVE-2022-41916 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-42898/</URL>
      <Description>SUSE CVE CVE-2022-42898 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-44640/</URL>
      <Description>SUSE CVE CVE-2022-44640 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libasn1-8-7.8.0-1.1">
      <FullProductName ProductID="libasn1-8-7.8.0-1.1">libasn1-8-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgssapi3-7.8.0-1.1">
      <FullProductName ProductID="libgssapi3-7.8.0-1.1">libgssapi3-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libhcrypto4-7.8.0-1.1">
      <FullProductName ProductID="libhcrypto4-7.8.0-1.1">libhcrypto4-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libhdb9-7.8.0-1.1">
      <FullProductName ProductID="libhdb9-7.8.0-1.1">libhdb9-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libheimbase1-7.8.0-1.1">
      <FullProductName ProductID="libheimbase1-7.8.0-1.1">libheimbase1-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libheimdal-devel-7.8.0-1.1">
      <FullProductName ProductID="libheimdal-devel-7.8.0-1.1">libheimdal-devel-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libheimedit0-7.8.0-1.1">
      <FullProductName ProductID="libheimedit0-7.8.0-1.1">libheimedit0-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libheimntlm0-7.8.0-1.1">
      <FullProductName ProductID="libheimntlm0-7.8.0-1.1">libheimntlm0-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libhx509-5-7.8.0-1.1">
      <FullProductName ProductID="libhx509-5-7.8.0-1.1">libhx509-5-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libkadm5clnt7-7.8.0-1.1">
      <FullProductName ProductID="libkadm5clnt7-7.8.0-1.1">libkadm5clnt7-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libkadm5srv8-7.8.0-1.1">
      <FullProductName ProductID="libkadm5srv8-7.8.0-1.1">libkadm5srv8-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libkafs0-7.8.0-1.1">
      <FullProductName ProductID="libkafs0-7.8.0-1.1">libkafs0-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libkdc2-7.8.0-1.1">
      <FullProductName ProductID="libkdc2-7.8.0-1.1">libkdc2-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libkrb5-26-7.8.0-1.1">
      <FullProductName ProductID="libkrb5-26-7.8.0-1.1">libkrb5-26-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libotp0-7.8.0-1.1">
      <FullProductName ProductID="libotp0-7.8.0-1.1">libotp0-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libroken18-7.8.0-1.1">
      <FullProductName ProductID="libroken18-7.8.0-1.1">libroken18-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsl0-7.8.0-1.1">
      <FullProductName ProductID="libsl0-7.8.0-1.1">libsl0-7.8.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwind0-7.8.0-1.1">
      <FullProductName ProductID="libwind0-7.8.0-1.1">libwind0-7.8.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libasn1-8-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libasn1-8-7.8.0-1.1">libasn1-8-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgssapi3-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgssapi3-7.8.0-1.1">libgssapi3-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libhcrypto4-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libhcrypto4-7.8.0-1.1">libhcrypto4-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libhdb9-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libhdb9-7.8.0-1.1">libhdb9-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libheimbase1-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libheimbase1-7.8.0-1.1">libheimbase1-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libheimdal-devel-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libheimdal-devel-7.8.0-1.1">libheimdal-devel-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libheimedit0-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libheimedit0-7.8.0-1.1">libheimedit0-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libheimntlm0-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libheimntlm0-7.8.0-1.1">libheimntlm0-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libhx509-5-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libhx509-5-7.8.0-1.1">libhx509-5-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libkadm5clnt7-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libkadm5clnt7-7.8.0-1.1">libkadm5clnt7-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libkadm5srv8-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libkadm5srv8-7.8.0-1.1">libkadm5srv8-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libkafs0-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libkafs0-7.8.0-1.1">libkafs0-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libkdc2-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libkdc2-7.8.0-1.1">libkdc2-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libkrb5-26-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libkrb5-26-7.8.0-1.1">libkrb5-26-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libotp0-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libotp0-7.8.0-1.1">libotp0-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libroken18-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libroken18-7.8.0-1.1">libroken18-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsl0-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsl0-7.8.0-1.1">libsl0-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwind0-7.8.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwind0-7.8.0-1.1">libwind0-7.8.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.</Note>
    </Notes>
    <CVE>CVE-2019-14870</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libasn1-8-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgssapi3-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhcrypto4-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhdb9-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimbase1-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimdal-devel-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimedit0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimntlm0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhx509-5-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkadm5clnt7-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkadm5srv8-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkafs0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkdc2-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkrb5-26-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libotp0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libroken18-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsl0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwind0-7.8.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14870.html</URL>
        <Description>CVE-2019-14870</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158109</URL>
        <Description>SUSE Bug 1158109</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server.</Note>
    </Notes>
    <CVE>CVE-2021-3671</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libasn1-8-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgssapi3-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhcrypto4-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhdb9-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimbase1-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimdal-devel-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimedit0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimntlm0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhx509-5-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkadm5clnt7-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkadm5srv8-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkafs0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkdc2-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkrb5-26-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libotp0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libroken18-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsl0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwind0-7.8.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3671.html</URL>
        <Description>CVE-2021-3671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191622</URL>
        <Description>SUSE Bug 1191622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205667</URL>
        <Description>SUSE Bug 1205667</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heimdal before 7.7.1 allows attackers to cause a NULL pointer dereference in a SPNEGO acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero initial_response value to send_accept.</Note>
    </Notes>
    <CVE>CVE-2021-44758</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libasn1-8-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgssapi3-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhcrypto4-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhdb9-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimbase1-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimdal-devel-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimedit0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimntlm0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhx509-5-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkadm5clnt7-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkadm5srv8-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkafs0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkdc2-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkrb5-26-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libotp0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libroken18-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsl0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwind0-7.8.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-44758.html</URL>
        <Description>CVE-2021-44758</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205667</URL>
        <Description>SUSE Bug 1205667</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack.</Note>
    </Notes>
    <CVE>CVE-2022-3437</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libasn1-8-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgssapi3-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhcrypto4-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhdb9-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimbase1-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimdal-devel-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimedit0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimntlm0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhx509-5-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkadm5clnt7-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkadm5srv8-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkafs0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkdc2-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkrb5-26-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libotp0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libroken18-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsl0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwind0-7.8.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3437.html</URL>
        <Description>CVE-2022-3437</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1204254</URL>
        <Description>SUSE Bug 1204254</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205667</URL>
        <Description>SUSE Bug 1205667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208992</URL>
        <Description>SUSE Bug 1208992</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions prior to 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal's PKI certificate validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as any third-party applications using Heimdal's libhx509. Users should upgrade to Heimdal 7.7.1 or 7.8. There are no known workarounds for this issue.</Note>
    </Notes>
    <CVE>CVE-2022-41916</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libasn1-8-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgssapi3-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhcrypto4-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhdb9-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimbase1-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimdal-devel-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimedit0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimntlm0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhx509-5-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkadm5clnt7-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkadm5srv8-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkafs0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkdc2-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkrb5-26-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libotp0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libroken18-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsl0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwind0-7.8.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-41916.html</URL>
        <Description>CVE-2022-41916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205667</URL>
        <Description>SUSE Bug 1205667</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."</Note>
    </Notes>
    <CVE>CVE-2022-42898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libasn1-8-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgssapi3-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhcrypto4-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhdb9-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimbase1-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimdal-devel-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimedit0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimntlm0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhx509-5-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkadm5clnt7-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkadm5srv8-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkafs0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkdc2-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkrb5-26-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libotp0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libroken18-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsl0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwind0-7.8.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-42898.html</URL>
        <Description>CVE-2022-42898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205126</URL>
        <Description>SUSE Bug 1205126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205667</URL>
        <Description>SUSE Bug 1205667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207423</URL>
        <Description>SUSE Bug 1207423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207690</URL>
        <Description>SUSE Bug 1207690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211487</URL>
        <Description>SUSE Bug 1211487</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC).</Note>
    </Notes>
    <CVE>CVE-2022-44640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libasn1-8-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgssapi3-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhcrypto4-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhdb9-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimbase1-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimdal-devel-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimedit0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libheimntlm0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libhx509-5-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkadm5clnt7-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkadm5srv8-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkafs0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkdc2-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libkrb5-26-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libotp0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libroken18-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsl0-7.8.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwind0-7.8.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-44640.html</URL>
        <Description>CVE-2022-44640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205667</URL>
        <Description>SUSE Bug 1205667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206730</URL>
        <Description>SUSE Bug 1206730</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
