aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMike Gabriel <mike.gabriel@das-netzwerkteam.de>2020-04-01 22:56:34 +0200
committerBoyuan Yang <byang@debian.org>2020-04-01 20:11:18 -0400
commitd809e8a47b5e419f7e1225cd2d4ed884d4cb964f (patch)
treec87e7a87fa8b99b5038b039d2fa86c26b70b3612
parentf38f1980e424fc952810c4a4b639ecae466b2de1 (diff)
DLA-2166-1 advisory
-rw-r--r--english/lts/security/2020/dla-2166.data10
-rw-r--r--english/lts/security/2020/dla-2166.wml28
2 files changed, 38 insertions, 0 deletions
diff --git a/english/lts/security/2020/dla-2166.data b/english/lts/security/2020/dla-2166.data
new file mode 100644
index 00000000000..fd8fa548f04
--- /dev/null
+++ b/english/lts/security/2020/dla-2166.data
@@ -0,0 +1,10 @@
+<define-tag pagetitle>DLA-2166-1 libpam-krb5</define-tag>
+<define-tag report_date>2020-04-01</define-tag>
+<define-tag secrefs>CVE-2020-10595</define-tag>
+<define-tag packages>libpam-krb5</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>yes</define-tag>
+<define-tag fixed-section>no</define-tag>
+
+#use wml::debian::security
+
diff --git a/english/lts/security/2020/dla-2166.wml b/english/lts/security/2020/dla-2166.wml
new file mode 100644
index 00000000000..8cd60e6eb1a
--- /dev/null
+++ b/english/lts/security/2020/dla-2166.wml
@@ -0,0 +1,28 @@
+<define-tag description>LTS security update</define-tag>
+<define-tag moreinfo>
+
+<p>The krb5 PAM module (pam_krb5.so) had a buffer overflow that might have
+caused remote code execution in situations involving supplemental
+prompting by a Kerberos library. It might have overflown a buffer
+provided by the underlying Kerberos library by a single '\0' byte if an
+attacker responded to a prompt with an answer of a carefully chosen
+length. The effect may have ranged from heap corruption to stack
+corruption depending on the structure of the underlying Kerberos library,
+with unknown effects but possibly including code execution. This code
+path had not been used for normal authentication, but only when the
+Kerberos library did supplemental prompting, such as with PKINIT or when
+using the non-standard no_prompt PAM configuration option.</p>
+
+<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
+4.6-3+deb8u1.</p>
+
+<p>We recommend that you upgrade your libpam-krb5 packages.</p>
+
+<p>Further information about Debian LTS security advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/lts/security/2020/dla-2166.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy