Synopsis
The remote Debian host is missing one or more security-related updates.
Description
The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4579 advisory.
------------------------------------------------------------------------- Debian LTS Advisory DLA-4579-1 [email protected] https://www.debian.org/lts/security/ Emmanuel Arias May 11, 2026 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : python-authlib Version : 0.15.4-1+deb11u2 CVE ID : CVE-2026-27962 CVE-2026-28490 CVE-2026-28498
Three security vulnerabilities were discovered in python-authlib, a python library which builds OAuth and OpenID Connect servers, that can cause authentication bypass or information leaks.
CVE-2026-27962
Fix authentication and authorization bypass vulnerability by embedding a crafted public key in the jwk header field when key=None is passed to JWS deserialization functions.
CVE-2026-28490
Authlib exposed distinguishable error responses between invalid PKCS#1 v1.5 padding and invalid AES-GCM tag, enabling Bleichenbacher-style attacks.
CVE-2026-28498
Fix OIDC ID Token validation bypass in at_hash and c_hash verification.
_verify_hash() silently returned True when create_half_hash() received an unknown algorithm, allowing forged ID Tokens to pass validation.
For Debian 11 bullseye, these problems have been fixed in version 0.15.4-1+deb11u2.
We recommend that you upgrade your python-authlib packages.
For the detailed security status of python-authlib please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/python-authlib
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS Attachment:
signature.asc Description: PGP signature
Tenable has extracted the preceding description block directly from the Debian security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade the python-authlib-doc packages.
Plugin Details
File Name: debian_DLA-4579.nasl
Agent: unix
Supported Sensors: Nessus Agent, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:N
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
Threat Vector: CVSS:4.0/E:P
Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
Vulnerability Information
CPE: p-cpe:/a:debian:debian_linux:python3-authlib, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:python-authlib-doc
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: Exploits are available
Patch Publication Date: 5/11/2026
Vulnerability Publication Date: 3/16/2026