Package : krb5 Vulnerability : programming error Problem type : local Debian-specific: no CVE IDs : CVE-2006-3083 CVE-2006-3084 CERT advisories: VU#580124 VU#401660
In certain application programs packaged in the MIT Kerberos 5 source distribution, calls to setuid() and seteuid() are not always checked for success and which may fail with some PAM configurations. A local user could exploit one of these vulnerabilities to result in privilege escalation. No exploit code is known to exist at this time.
For the stable distribution (sarge) these problems have been fixed in version 1.3.6-2sarge3.
For the unstable distribution (sid) these problems have been fixed in version 1.4.3-9.
We recommend that you upgrade your krb5 packages.
Upgrade Instructions - --------------------
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge - --------------------------------