Bug 51051 - libpam-krb5: Multiple issues (4.4)
libpam-krb5: Multiple issues (4.4)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.4
All Linux
: P5 normal (vote)
: UCS 4.4-4-errata
Assigned To: Quality Assurance
Erik Damrose
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-04-01 09:24 CEST by Quality Assurance
Modified: 2020-04-02 14:47 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 0.0 () Debian


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2020-04-01 09:24:21 CEST
New Debian libpam-krb5 4.7-4+deb9u1A~4.4.4.202004010924 fixes:
This update addresses the following issue:
* libpam-krb5 (CVE-2020-10595)
Comment 1 Quality Assurance univentionstaff 2020-04-01 10:00:13 CEST
--- mirror/ftp/4.4/unmaintained/4.4-2/source/libpam-krb5_4.7-4A~4.4.0.201907221908.dsc
+++ apt/ucs_4.4-0-errata4.4-4/source/libpam-krb5_4.7-4+deb9u1A~4.4.4.202004010924.dsc
@@ -1,8 +1,14 @@
-4.7-4A~4.4.0.201907221908 [Mon, 22 Jul 2019 19:08:39 +0200] Univention builddaemon <buildd@univention.de>:
+4.7-4+deb9u1A~4.4.4.202004010924 [Wed, 01 Apr 2020 09:24:43 +0200] Univention builddaemon <buildd@univention.de>:
 
   * UCS auto build. The following patches have been applied to the original source package
     001-fix-detection-of-expired-password
     002-bug49740-restrict-password-length
+
+4.7-4+deb9u1 [Sun, 22 Mar 2020 21:22:06 -0700] Russ Allbery <rra@debian.org>:
+
+  * SECURITY: Fix potential one-byte buffer overflow when the underlying
+    Kerberos library initiates prompting (such as for PKINIT or when the
+    no_prompt PAM option is set).  (CVE-2020-10595)
 
 4.7-4 [Sat, 31 Dec 2016 13:42:47 -0800] Russ Allbery <rra@debian.org>:
 

<http://10.200.17.11/4.4-4/#7176588802676108634>
Comment 2 Erik Damrose univentionstaff 2020-04-02 12:22:42 CEST
OK: piuparts
OK: debdiff, dchdiff, dscdiff
OK: yaml
OK: Both patches in 4.4: 001-.. + 002-..
Verified
Comment 3 Erik Damrose univentionstaff 2020-04-02 14:47:54 CEST
<http://errata.software-univention.de/ucs/4.4/502.html>