Univention Bugzilla – Bug 51052
libpam-krb5: Multiple issues (4.3)
Last modified: 2020-04-02 15:09:05 CEST
New Debian libpam-krb5 4.7-4+deb9u1A~4.3.5.202004010930 fixes: This update addresses the following issue: * libpam-krb5 (CVE-2020-10595)
--- mirror/ftp/4.3/unmaintained/4.3-0/source/libpam-krb5_4.7-4A~4.3.0.201801240051.dsc +++ apt/ucs_4.3-0-errata4.3-5/source/libpam-krb5_4.7-4+deb9u1A~4.3.5.202004010930.dsc @@ -1,7 +1,13 @@ -4.7-4A~4.3.0.201801240051 [Wed, 24 Jan 2018 00:51:43 +0100] Univention builddaemon <buildd@univention.de>: +4.7-4+deb9u1A~4.3.5.202004010930 [Wed, 01 Apr 2020 09:31:25 +0200] Univention builddaemon <buildd@univention.de>: * UCS auto build. The following patches have been applied to the original source package 001-fix-detection-of-expired-password + +4.7-4+deb9u1 [Sun, 22 Mar 2020 21:22:06 -0700] Russ Allbery <rra@debian.org>: + + * SECURITY: Fix potential one-byte buffer overflow when the underlying + Kerberos library initiates prompting (such as for PKINIT or when the + no_prompt PAM option is set). (CVE-2020-10595) 4.7-4 [Sat, 31 Dec 2016 13:42:47 -0800] Russ Allbery <rra@debian.org>: <http://10.200.17.11/4.3-5/#33725835069612761>
OK: piuparts OK: debdiff, dchdiff, dscdiff OK: yaml OK: only one patch in 4.3: 001-fix-detection-of-expired-password Verified
<http://errata.software-univention.de/ucs/4.3/664.html>