lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1hXtj8-0005Nj-JU@seger.debian.org>
Date: Mon, 03 Jun 2019 20:38:42 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4455-1] heimdal security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4455-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
June 03, 2019                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : heimdal
CVE ID         : CVE-2018-16860 CVE-2019-12098
Debian Bug     : 928966 929064

Several vulnerabilities were discovered in Heimdal, an implementation of
Kerberos 5 that aims to be compatible with MIT Kerberos.

CVE-2018-16860

    Isaac Boukris and Andrew Bartlett discovered that Heimdal was
    susceptible to man-in-the-middle attacks caused by incomplete
    checksum validation. Details on the issue can be found in the Samba
    advisory at https://www.samba.org/samba/security/CVE-2018-16860.html

CVE-2019-12098

    It was discovered that failure of verification of the PA-PKINIT-KX key
    exchange client-side could permit to perform man-in-the-middle attack.

For the stable distribution (stretch), these problems have been fixed in
version 7.1.0+dfsg-13+deb9u3.

We recommend that you upgrade your heimdal packages.

For the detailed security status of heimdal please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/heimdal

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=GEYX
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ