Executive Summary

Titledebian-lan-config security update
NameDSA-4595First vendor Publication2019-12-27
VendorDebianLast vendor Modification2019-12-27
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base ScoreN/AAttack RangeN/A
Cvss Impact ScoreN/AAttack ComplexityN/A
Cvss Expoit ScoreN/AAuthenticationN/A
Calculate full CVSS 2.0 Vectors scores


It was discovered that debian-lan-config, a FAI config space for the Debian-LAN system, configured too permissive ACLs for the Kerberos admin server, which allowed password changes for other user principals.

This update provides a fixed configuration for new deployments, for existing setups, the NEWS file shipped in this update provides advice to fix the configuration.

For the oldstable distribution (stretch), this problem has been fixed in version 0.23+deb9u1.

For the stable distribution (buster), this problem has been fixed in version 0.25+deb10u1.

We recommend that you upgrade your debian-lan-config packages.

For the detailed security status of debian-lan-config please refer to its security tracker page at: https://security-tracker.debian.org/tracker/debian-lan-config

Original Source

Url : http://www.debian.org/security/2019/dsa-4595

Alert History

If you want to see full details history, please login or register.
2019-12-28 00:18:37
  • First insertion