lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20190925203725.7ps3i5nxeppx75xt@seger.debian.org>
Date: Wed, 25 Sep 2019 20:37:25 +0000
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4533-1] lemonldap-ng security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4533-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
September 25, 2019                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : lemonldap-ng
CVE ID         : CVE-2019-15941

It was discovered that the Lemonldap::NG web SSO system did not restrict
OIDC authorization codes to the relying party.

For the stable distribution (buster), this problem has been fixed in
version 2.0.2+ds-7+deb10u2.

We recommend that you upgrade your lemonldap-ng packages.

For the detailed security status of lemonldap-ng please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lemonldap-ng

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=PxoP
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ