Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: t...@packages.debian.org, David Gstir <da...@sigma-star.at>, 
Richard Weinberger <rich...@sigma-star.at>, car...@debian.org
Control: affects -1 + src:tgt
User: release.debian....@packages.debian.org
Usertags: pu

Hi SRM,

tgt is affected in stable by CVE-2024-45751, but it is no-dsa. I did a
while back a NMU for unstable, preparing for this bookworm-pu update
as well. Given there are no issues reported with it in unstable, now
proposing as well the bookworm update.

Description is at 
https://security-tracker.debian.org/tracker/CVE-2024-45751
https://www.openwall.com/lists/oss-security/2024/09/07/2

|The user-space iSCSI target daemon of the Linux target framework (tgt)
|uses an insecure random number generator to generate CHAP
|authentication callenges. This results in predictable challenges which
|an attacker capable of recording network traffic between iSCSI target
|and initiator can abuse to bypass CHAP authentication by replaying
|previous responses.

The patch switches to a proper entropy source.

Regards,
Salvatore

Reply via email to