Bug#708267: cve-2002-2443: kpasswd udp ping-pong

2013-05-20 Thread Tom Yu
Florian Weimer writes: > * Tom Yu: > >> Some limited testing indicates that when the packet storm is confined >> to a single host, legitimate kpasswd and kadm5 requests can still get >> through, and the CPU usage pegs at about 70%. I haven't tested with >>

Bug#704775: Processed: found 704775 in 1.8.3+dfsg-4squeeze6

2013-04-15 Thread Tom Yu
Sam Hartman writes: > My recommendation is that this is not worth a DSA or stable fix for > squeeze unless some Debian user comes forward and says that they're > seeing crashes in the wild related to this. > > --Sam Keep in mind that unmodified client software can trivially trigger this vulnerab

Bug#604925: /usr/lib/libgssapi_krb5.so.2: cannot login to ssh after upgrade from lenny to squeeze

2010-12-09 Thread Tom Yu
forwarded 604925 http://krbdev.mit.edu/rt/Ticket/Display.html?id=6839&user=guest&pass=guest tags 604925 + confirmed upstream fixed-upstream thanks I committed a slightly different fix that avoids breaking the krb5_pac_verify() API. http://src.mit.edu/fisheye/changelog/krb5/?cs=24564 -- To UN

Bug#604925: /usr/lib/libgssapi_krb5.so.2: cannot login to ssh after upgrade from lenny to squeeze

2010-12-09 Thread Tom Yu
Sam Hartman writes: > This patch looks reasonable. I have not confirmed that successfully > makes the PAC disappear, but if you've examined the logic there I'm > happy to assume it does. On the other hand, we do appear to expose the krb5_pac_verify() interface that is called by the static authd

Bug#604925: /usr/lib/libgssapi_krb5.so.2: cannot login to ssh after upgrade from lenny to squeeze

2010-12-09 Thread Tom Yu
Sam Hartman writes: > Hi. At today's release meeting, MIT indicated that they are going to > set up an OSX X test environment to reproduce this problem. They will > also look into whether we can ignore the PAC and remove it from the > authdata if it fails to verify rather than failing the authe

Bug#577490: forwarded, fixed upstream

2010-04-20 Thread Tom Yu
retitle 577490 CVE-2010-1320 double free in KDC caused by ticket renewal forwarded 577490 http://krbdev.mit.edu/rt/Ticket/Display.html?id=6702 tags 577490 + fixed-upstream thanks Upstream bug #6702 CVE-2010-1230 KDC double free caused by ticket renewal (MITKRB5-SA-2010-004) -- To UNSUBSCRIBE,

Bug#577490: CVE-2010-1320

2010-04-13 Thread Tom Yu
tags 577490 security thanks upstream advisory is pending CVE-2010-1320 CVSSv2 vector AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org