Univention Bugzilla – Bug 51051
libpam-krb5: Multiple issues (4.4)
Last modified: 2020-04-02 14:47:54 CEST
New Debian libpam-krb5 4.7-4+deb9u1A~4.4.4.202004010924 fixes: This update addresses the following issue: * libpam-krb5 (CVE-2020-10595)
--- mirror/ftp/4.4/unmaintained/4.4-2/source/libpam-krb5_4.7-4A~4.4.0.201907221908.dsc +++ apt/ucs_4.4-0-errata4.4-4/source/libpam-krb5_4.7-4+deb9u1A~4.4.4.202004010924.dsc @@ -1,8 +1,14 @@ -4.7-4A~4.4.0.201907221908 [Mon, 22 Jul 2019 19:08:39 +0200] Univention builddaemon <buildd@univention.de>: +4.7-4+deb9u1A~4.4.4.202004010924 [Wed, 01 Apr 2020 09:24:43 +0200] Univention builddaemon <buildd@univention.de>: * UCS auto build. The following patches have been applied to the original source package 001-fix-detection-of-expired-password 002-bug49740-restrict-password-length + +4.7-4+deb9u1 [Sun, 22 Mar 2020 21:22:06 -0700] Russ Allbery <rra@debian.org>: + + * SECURITY: Fix potential one-byte buffer overflow when the underlying + Kerberos library initiates prompting (such as for PKINIT or when the + no_prompt PAM option is set). (CVE-2020-10595) 4.7-4 [Sat, 31 Dec 2016 13:42:47 -0800] Russ Allbery <rra@debian.org>: <http://10.200.17.11/4.4-4/#7176588802676108634>
OK: piuparts OK: debdiff, dchdiff, dscdiff OK: yaml OK: Both patches in 4.4: 001-.. + 002-.. Verified
<http://errata.software-univention.de/ucs/4.4/502.html>