diff options
author | Mike Gabriel <mike.gabriel@das-netzwerkteam.de> | 2020-04-01 22:56:34 +0200 |
---|---|---|
committer | Boyuan Yang <byang@debian.org> | 2020-04-01 20:11:18 -0400 |
commit | d809e8a47b5e419f7e1225cd2d4ed884d4cb964f (patch) | |
tree | c87e7a87fa8b99b5038b039d2fa86c26b70b3612 | |
parent | f38f1980e424fc952810c4a4b639ecae466b2de1 (diff) |
DLA-2166-1 advisory
-rw-r--r-- | english/lts/security/2020/dla-2166.data | 10 | ||||
-rw-r--r-- | english/lts/security/2020/dla-2166.wml | 28 |
2 files changed, 38 insertions, 0 deletions
diff --git a/english/lts/security/2020/dla-2166.data b/english/lts/security/2020/dla-2166.data new file mode 100644 index 00000000000..fd8fa548f04 --- /dev/null +++ b/english/lts/security/2020/dla-2166.data @@ -0,0 +1,10 @@ +<define-tag pagetitle>DLA-2166-1 libpam-krb5</define-tag> +<define-tag report_date>2020-04-01</define-tag> +<define-tag secrefs>CVE-2020-10595</define-tag> +<define-tag packages>libpam-krb5</define-tag> +<define-tag isvulnerable>yes</define-tag> +<define-tag fixed>yes</define-tag> +<define-tag fixed-section>no</define-tag> + +#use wml::debian::security + diff --git a/english/lts/security/2020/dla-2166.wml b/english/lts/security/2020/dla-2166.wml new file mode 100644 index 00000000000..8cd60e6eb1a --- /dev/null +++ b/english/lts/security/2020/dla-2166.wml @@ -0,0 +1,28 @@ +<define-tag description>LTS security update</define-tag> +<define-tag moreinfo> + +<p>The krb5 PAM module (pam_krb5.so) had a buffer overflow that might have +caused remote code execution in situations involving supplemental +prompting by a Kerberos library. It might have overflown a buffer +provided by the underlying Kerberos library by a single '\0' byte if an +attacker responded to a prompt with an answer of a carefully chosen +length. The effect may have ranged from heap corruption to stack +corruption depending on the structure of the underlying Kerberos library, +with unknown effects but possibly including code execution. This code +path had not been used for normal authentication, but only when the +Kerberos library did supplemental prompting, such as with PKINIT or when +using the non-standard no_prompt PAM configuration option.</p> + +<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version +4.6-3+deb8u1.</p> + +<p>We recommend that you upgrade your libpam-krb5 packages.</p> + +<p>Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p> +</define-tag> + +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2020/dla-2166.data" +# $Id: $ |