lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 12 Nov 2015 21:11:36 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3395-2] krb5 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3395-2                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
November 12, 2015                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : krb5
CVE ID         : CVE-2015-2697
Debian Bug     : 803088

Marc Deslauriers reported that the update for krb5 issued as DSA-3395-1
did not contain the patch to address CVE-2015-2697 for the packages
built for the oldstable distribution (wheezy). Updated packages are now
available to address this issue. For reference, the relevant part of the
original advisory text follows.

CVE-2015-2697

    It was discovered that the build_principal_va() function incorrectly
    handles input strings. An authenticated attacker can take advantage
    of this flaw to cause a KDC to crash using a TGS request with a
    large realm field beginning with a null byte.

For the oldstable distribution (wheezy), this problem has been fixed
in version 1.10.1+dfsg-5+deb7u6.

We recommend that you upgrade your krb5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=/WpO
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists