summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-11-12 22:18:49 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2021-11-12 22:18:49 +0100
commitdd6d94545dcdc2e99beffc81fbc6ac5ca0b02fb9 (patch)
tree87cb2d030e1990433d06f716be763cbc60ff83b9
parentb1585931f105178a033b6f539a8e92cf104d9fa6 (diff)
Update status for samba in buster
-rw-r--r--data/CVE/list.20205
-rw-r--r--data/CVE/list.20211
2 files changed, 6 insertions, 0 deletions
diff --git a/data/CVE/list.2020 b/data/CVE/list.2020
index 1f0475f019..49a1d1d46f 100644
--- a/data/CVE/list.2020
+++ b/data/CVE/list.2020
@@ -12907,6 +12907,7 @@ CVE-2020-25722 [AD DC UPN vs samAccountName not checked]
RESERVED
{DSA-5003-1}
- samba 2:4.13.14+dfsg-1
+ [buster] - samba <ignored> (Intrusive backport; affects Samba as AD DC)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14564
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14725
NOTE: https://www.samba.org/samba/security/CVE-2020-25722.html
@@ -12914,6 +12915,7 @@ CVE-2020-25721 [[Kerberos acceptors need easy access to stable AD identifiers (e
RESERVED
{DSA-5003-1}
- samba 2:4.13.14+dfsg-1
+ [buster] - samba <ignored> (Intrusive backport; affects Samba as AD DC)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14725
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14557
NOTE: https://www.samba.org/samba/security/CVE-2020-25721.html
@@ -12923,6 +12925,7 @@ CVE-2020-25719 [AD DC Username based races when no PAC is given]
RESERVED
{DSA-5003-1}
- samba 2:4.13.14+dfsg-1
+ [buster] - samba <ignored> (Intrusive backport; affects Samba as AD DC)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14561
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14725
NOTE: https://www.samba.org/samba/security/CVE-2020-25719.html
@@ -12930,6 +12933,7 @@ CVE-2020-25718 [An RODC can issue (forge) administrator tickets to other servers
RESERVED
{DSA-5003-1}
- samba 2:4.13.14+dfsg-1
+ [buster] - samba <ignored> (Intrusive backport; affects Samba as AD DC)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14558
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14725
NOTE: https://www.samba.org/samba/security/CVE-2020-25718.html
@@ -12937,6 +12941,7 @@ CVE-2020-25717 [A user on the domain can become root on domain members]
RESERVED
{DSA-5003-1}
- samba 2:4.13.14+dfsg-1
+ [buster] - samba <ignored> (Intrusive backport; backport only 'min domain uid' parameter)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14556
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14725
NOTE: https://www.samba.org/samba/security/CVE-2020-25717.html
diff --git a/data/CVE/list.2021 b/data/CVE/list.2021
index 9e83660bc4..2544ee6f5c 100644
--- a/data/CVE/list.2021
+++ b/data/CVE/list.2021
@@ -8011,6 +8011,7 @@ CVE-2021-3738 [crash in dsdb stack]
RESERVED
{DSA-5003-1}
- samba 2:4.13.14+dfsg-1
+ [buster] - samba <no-dsa> (Minor issue; affects Samba as AD DC)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14468
NOTE: https://www.samba.org/samba/security/CVE-2021-3738.html
CVE-2021-3737 [client can enter an infinite loop on a 100 Continue response from the server]

© 2014-2024 Faster IT GmbH | imprint | privacy policy