From 938f826e043d763348386b34309c52525d06c52f Mon Sep 17 00:00:00 2001 From: Anton Gladky Date: Sun, 10 May 2020 17:09:38 +0200 Subject: DLA-2207-1 --- english/lts/security/2020/dla-2207.data | 10 ++++++++++ english/lts/security/2020/dla-2207.wml | 22 ++++++++++++++++++++++ 2 files changed, 32 insertions(+) create mode 100644 english/lts/security/2020/dla-2207.data create mode 100644 english/lts/security/2020/dla-2207.wml (limited to 'english') diff --git a/english/lts/security/2020/dla-2207.data b/english/lts/security/2020/dla-2207.data new file mode 100644 index 00000000000..d47fee77db3 --- /dev/null +++ b/english/lts/security/2020/dla-2207.data @@ -0,0 +1,10 @@ +DLA-2207-1 libntlm +2020-05-10 +CVE-2019-17455 +libntlm +yes +yes +no + +#use wml::debian::security + diff --git a/english/lts/security/2020/dla-2207.wml b/english/lts/security/2020/dla-2207.wml new file mode 100644 index 00000000000..f7b23d18299 --- /dev/null +++ b/english/lts/security/2020/dla-2207.wml @@ -0,0 +1,22 @@ +LTS security update + + +

It was discovered that libntlm through 1.5 relies on a fixed buffer size for +tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse +read and write operations, as demonstrated by a stack-based buffer +over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted +NTLM request.

+ +

For Debian 8 Jessie, this problem has been fixed in version +1.4-3+deb8u1.

+ +

We recommend that you upgrade your libntlm packages.

+ +

Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: https://wiki.debian.org/LTS

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2020/dla-2207.data" +# $Id: $ -- cgit v1.2.3