exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 4589-1

Debian Security Advisory 4589-1
Posted Dec 19, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4589-1 - It was discovered that debian-edu-config, a set of configuration files used for the Debian Edu blend, configured too permissive ACLs for the Kerberos admin server, which allowed password changes for other user principals.

tags | advisory
systems | linux, debian
advisories | CVE-2019-3467
SHA-256 | 81ed36fc1bdd6f0fc5538e25cf7ea4ef12558378dee24e75461bf5406b3f57fa

Debian Security Advisory 4589-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4589-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
December 18, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : debian-edu-config
CVE ID : CVE-2019-3467
Debian Bug : 946797

It was discovered that debian-edu-config, a set of configuration files
used for the Debian Edu blend, configured too permissive ACLs for the
Kerberos admin server, which allowed password changes for other user
principals.

For the oldstable distribution (stretch), this problem has been fixed
in version 1.929+deb9u4.

For the stable distribution (buster), this problem has been fixed in
version 2.10.65+deb10u3.

We recommend that you upgrade your debian-edu-config packages.

For the detailed security status of debian-edu-config please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/debian-edu-config

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl36qpMACgkQEMKTtsN8
TjaKSBAAjXOOr5I57eoEY2jJXEWblgb/qbjcLdgwgkDuxhD1lN1mXDRDK7uOdKif
g4s4omVNlVe/g3rwJCqBByqBDeUK2KCYk2mqdbsbhQrZbz6HrPjwh309ewuORh+o
uWFF8ieD0yHKzE4VnbwNMcKInFzszALFP7zSbIdCKV/JDigUo/CrpPRTpYIa8Z3W
Xak7QqXotFE1qPlXQZURqgHcO9ZcdStwHxWpEZo5FpiF9oUl2KHsEKhv2lfdopzW
B477GpaCufa8nH2X4ahw3W4Idlm2GAJma6Sagk7BHqlHQAvE46q/qLLVjfCTFcis
je5J0vaVZg5OIiAE1D+mS4bYeio4OZJWaLOf7/6rArWHN3lcrfhMuFDYrSvaURJs
i+bMJxbguNZ/V66Ij5mQmq8PfSM3+nxEp5LbUrQ2KFZAx5/c1LtxzlUi5y3YKXrS
bMEuk+6w9NFWx1KGzPRM9aa+4a95DpJlof67VE3sSeXBc6YtBxf5VqXm6bh1jE7Z
S4uXyYdaMXpJT4lIjKX7LC1g1Z7j8X8tNKuIx7F5LDYnQEZK+aKuCKRZai5a0B4g
OtkgTROsJ2zQ+xg5go3zorqx6WJECwWRyFJwVdItqyBrlJ1QX2UeaYuvFB7KS/BO
8yCLdYR1oHR6FEMOxK7NfuR7gjW4VHBscsGlxUIZyu2IMF0Suec=6lpd
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close