Source: libpam-tacplus Version: 1.3.8-2 Severity: important Tags: security upstream Forwarded: https://github.com/kravietz/pam_tacplus/pull/163 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for libpam-tacplus. CVE-2020-27743[0]: | libtac in pam_tacplus through 1.5.1 lacks a check for a failure of | RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non- | random/predictable session_id. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2020-27743 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27743 [1] https://github.com/kravietz/pam_tacplus/pull/163 Regards, Salvatore