Source: libpam-tacplus
Version: 1.3.8-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/kravietz/pam_tacplus/pull/163
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for libpam-tacplus.

CVE-2020-27743[0]:
| libtac in pam_tacplus through 1.5.1 lacks a check for a failure of
| RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-
| random/predictable session_id.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-27743
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27743
[1] https://github.com/kravietz/pam_tacplus/pull/163

Regards,
Salvatore

Reply via email to