exploit the possibilities

Debian Security Advisory 4589-1

Debian Security Advisory 4589-1
Posted Dec 19, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4589-1 - It was discovered that debian-edu-config, a set of configuration files used for the Debian Edu blend, configured too permissive ACLs for the Kerberos admin server, which allowed password changes for other user principals.

tags | advisory
systems | linux, debian
advisories | CVE-2019-3467
MD5 | e4df8ed4769291e763e92613218f5687

Debian Security Advisory 4589-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4589-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
December 18, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : debian-edu-config
CVE ID : CVE-2019-3467
Debian Bug : 946797

It was discovered that debian-edu-config, a set of configuration files
used for the Debian Edu blend, configured too permissive ACLs for the
Kerberos admin server, which allowed password changes for other user
principals.

For the oldstable distribution (stretch), this problem has been fixed
in version 1.929+deb9u4.

For the stable distribution (buster), this problem has been fixed in
version 2.10.65+deb10u3.

We recommend that you upgrade your debian-edu-config packages.

For the detailed security status of debian-edu-config please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/debian-edu-config

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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6lpd
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close