You are here
Home > Preporuke > Ispravak nadogradnje za programski paket krb5

Ispravak nadogradnje za programski paket krb5

  • Detalji os-a: LDE
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-3395-2 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
November 12, 2015 https://www.debian.org/security/faq
– ————————————————————————-

Package : krb5
CVE ID : CVE-2015-2697
Debian Bug : 803088

Marc Deslauriers reported that the update for krb5 issued as DSA-3395-1
did not contain the patch to address CVE-2015-2697 for the packages
built for the oldstable distribution (wheezy). Updated packages are now
available to address this issue. For reference, the relevant part of the
original advisory text follows.

CVE-2015-2697

It was discovered that the build_principal_va() function incorrectly
handles input strings. An authenticated attacker can take advantage
of this flaw to cause a KDC to crash using a TGS request with a
large realm field beginning with a null byte.

For the oldstable distribution (wheezy), this problem has been fixed
in version 1.10.1+dfsg-5+deb7u6.

We recommend that you upgrade your krb5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIcBAEBCgAGBQJWRP8BAAoJEAVMuPMTQ89EOYkQAJapOzRZJJ9R2X8CEl2oDzC3
It0qbSVMU3YwTtwLmHzgwSf1XmlVDRP9+bRURmK7rqERoLdeGLEEHXOoi5i4I80m
fJT2uleuMGPWiYvLRb/aFWMdgd+tNDcmrFX0YQVYuyNPO5ixOuusIKE1Sihbcx+T
j/haOd5t+HStYbi2667ph5p8xlwykmONEUjkRY/6CE5D/SR8sfnFZARQ8iD8ug2u
J6nvXFHnvQuU0xmDr/jDPH0pAhF3Ntvm9Tl0RHpkQ6MIfe0DS2yGs1TXtQSVSY8u
0vgejWbXqSwXr5VjsB6KcZ83PjsSYyaCsLy3zq8dC00yuCGUyG59chlvFqm3+Hhv
sjXlA38DobsxkiFT3cIXJLGjzIcz3fcMKFy2kaBikPSkxDQKfj1a8OgMoK9ojCF0
kYdhLaO4pVEJDQeTMyxscQVZwy5O//hicNJvfYSTWbwOvcxGWnBri/hS89Ct4KQI
JoBXYsa1OOCH5PGD5CW/uVmFw+KtQnK59eg3CdMthlIfIDV4RYXBq6SuG+oVPfbF
6Q2mKwmyBunBi0cltcAo7vUUJUZQeiLpwq6kl3UxpbZMDqsJ+rbW8z33sNTZj2WG
imCG6Xjt2GThyRB2m8cyKLFlJJ+SQZGBOEW3/155/s/2h5uUxr2VKYzMWt5vWZe4
NuNKx1P9QVemIc0qcQNb
=/WpO
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2015-11-0006-ADV
CveCVE-2015-2697
ID izvornikaDSA-3395-2 DSA-3395-1
Proizvodkrb5
Izvorhttp://www.debian.org
Top
More in Preporuke
Sigurnosni propust programskog paketa lxd

Otkriven je sigurnosni propust u programskom paketu lxd za Ubuntu 15.10. Propust je uzrokovan neispravnim postavljanjem dozvola priključnice (socket), što...

Close