tags 400589 fixed-upstream security confirmed 
thanks

This bug is confirmed to affect sarge. An upload is planned in the next
hours. Sid & etch are safe with the last version, 5.3

        
Ghe Rivero 

El lun, 27-11-2006 a las 14:27 +0100, Martin Schwier escribió:
> Package: libapache-mod-auth-kerb
> Version: 4.996-5.0-rc6-1
> Severity: important
> Tags: security
> 
> heise-security [1] reports about a security hole in mod_auth_kerb.
> There is an entry (under review) in the CVE List too [2].
> 
> Is this package affected?
> 
> --
> Martin Schwier
> [EMAIL PROTECTED]
> 
> [1] http://www.heise-security.co.uk/news/81406
> [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5989
> 
> 
> -- System Information:
> Debian Release: 3.1
> Architecture: i386 (i686)
> Kernel: Linux 2.4.32+std
> Locale: LANG=de_DE, LC_CTYPE=de_DE (charmap=ISO-8859-1) (ignored: LC_ALL 
> set to de_DE)
> 
> Versions of packages libapache-mod-auth-kerb depends on:
> ii  apache-common         1.3.33-6sarge3     support files for all 
> Apache webse
> ii  krb5-config           1.6                Configuration files for 
> Kerberos V
> ii  libc6                 2.3.2.ds1-22sarge4 GNU C Library: Shared 
> libraries an
> ii  libcomerr2            1.37-2sarge1       common error description 
> library
> ii  libkrb53              1.3.6-2sarge3      MIT Kerberos runtime libraries
> 
> 
> 
-- 
 .''`.  Pienso, Luego Incordio   
: :' :  
`. `'   Proudly running Debian GNU/Linux 
  `-    www.debian.org    <ghe at debian dot org>

GPG Key: 26F020F7
GPG fingerprint: 4986 39DA D152 050B 4699 9A71 66DB 5A36 26F0 20F7



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to