Operating System:

[Debian]

Published:

02 January 2020

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0013
                     debian-lan-config security update
                              2 January 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           debian-lan-config
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
                   Debian GNU/Linux 10
Impact/Access:     Unauthorised Access -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-3467  

Reference:         ESB-2019.4747
                   ESB-2019.4717
                   ESB-2019.4716

Original Bulletin: 
   http://www.debian.org/security/2019/dsa-4595

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4595-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 27, 2019                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : debian-lan-config
CVE ID         : CVE-2019-3467
Debian Bug     : 947459

It was discovered that debian-lan-config, a FAI config space for the
Debian-LAN system, configured too permissive ACLs for the Kerberos admin
server, which allowed password changes for other user principals.

This update provides a fixed configuration for new deployments, for
existing setups, the NEWS file shipped in this update provides advice
to fix the configuration.

For the oldstable distribution (stretch), this problem has been fixed
in version 0.23+deb9u1.

For the stable distribution (buster), this problem has been fixed in
version 0.25+deb10u1.

We recommend that you upgrade your debian-lan-config packages.

For the detailed security status of debian-lan-config please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/debian-lan-config

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=+h3D
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=cv/K
-----END PGP SIGNATURE-----