From d809e8a47b5e419f7e1225cd2d4ed884d4cb964f Mon Sep 17 00:00:00 2001 From: Mike Gabriel Date: Wed, 1 Apr 2020 22:56:34 +0200 Subject: DLA-2166-1 advisory --- english/lts/security/2020/dla-2166.data | 10 ++++++++++ english/lts/security/2020/dla-2166.wml | 28 ++++++++++++++++++++++++++++ 2 files changed, 38 insertions(+) create mode 100644 english/lts/security/2020/dla-2166.data create mode 100644 english/lts/security/2020/dla-2166.wml diff --git a/english/lts/security/2020/dla-2166.data b/english/lts/security/2020/dla-2166.data new file mode 100644 index 00000000000..fd8fa548f04 --- /dev/null +++ b/english/lts/security/2020/dla-2166.data @@ -0,0 +1,10 @@ +DLA-2166-1 libpam-krb5 +2020-04-01 +CVE-2020-10595 +libpam-krb5 +yes +yes +no + +#use wml::debian::security + diff --git a/english/lts/security/2020/dla-2166.wml b/english/lts/security/2020/dla-2166.wml new file mode 100644 index 00000000000..8cd60e6eb1a --- /dev/null +++ b/english/lts/security/2020/dla-2166.wml @@ -0,0 +1,28 @@ +LTS security update + + +

The krb5 PAM module (pam_krb5.so) had a buffer overflow that might have +caused remote code execution in situations involving supplemental +prompting by a Kerberos library. It might have overflown a buffer +provided by the underlying Kerberos library by a single '\0' byte if an +attacker responded to a prompt with an answer of a carefully chosen +length. The effect may have ranged from heap corruption to stack +corruption depending on the structure of the underlying Kerberos library, +with unknown effects but possibly including code execution. This code +path had not been used for normal authentication, but only when the +Kerberos library did supplemental prompting, such as with PKINIT or when +using the non-standard no_prompt PAM configuration option.

+ +

For Debian 8 Jessie, this problem has been fixed in version +4.6-3+deb8u1.

+ +

We recommend that you upgrade your libpam-krb5 packages.

+ +

Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: https://wiki.debian.org/LTS

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2020/dla-2166.data" +# $Id: $ -- cgit v1.2.3