diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2021-11-12 22:18:49 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2021-11-12 22:18:49 +0100 |
commit | dd6d94545dcdc2e99beffc81fbc6ac5ca0b02fb9 (patch) | |
tree | 87cb2d030e1990433d06f716be763cbc60ff83b9 | |
parent | b1585931f105178a033b6f539a8e92cf104d9fa6 (diff) |
Update status for samba in buster
-rw-r--r-- | data/CVE/list.2020 | 5 | ||||
-rw-r--r-- | data/CVE/list.2021 | 1 |
2 files changed, 6 insertions, 0 deletions
diff --git a/data/CVE/list.2020 b/data/CVE/list.2020 index 1f0475f019..49a1d1d46f 100644 --- a/data/CVE/list.2020 +++ b/data/CVE/list.2020 @@ -12907,6 +12907,7 @@ CVE-2020-25722 [AD DC UPN vs samAccountName not checked] RESERVED {DSA-5003-1} - samba 2:4.13.14+dfsg-1 + [buster] - samba <ignored> (Intrusive backport; affects Samba as AD DC) NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14564 NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14725 NOTE: https://www.samba.org/samba/security/CVE-2020-25722.html @@ -12914,6 +12915,7 @@ CVE-2020-25721 [[Kerberos acceptors need easy access to stable AD identifiers (e RESERVED {DSA-5003-1} - samba 2:4.13.14+dfsg-1 + [buster] - samba <ignored> (Intrusive backport; affects Samba as AD DC) NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14725 NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14557 NOTE: https://www.samba.org/samba/security/CVE-2020-25721.html @@ -12923,6 +12925,7 @@ CVE-2020-25719 [AD DC Username based races when no PAC is given] RESERVED {DSA-5003-1} - samba 2:4.13.14+dfsg-1 + [buster] - samba <ignored> (Intrusive backport; affects Samba as AD DC) NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14561 NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14725 NOTE: https://www.samba.org/samba/security/CVE-2020-25719.html @@ -12930,6 +12933,7 @@ CVE-2020-25718 [An RODC can issue (forge) administrator tickets to other servers RESERVED {DSA-5003-1} - samba 2:4.13.14+dfsg-1 + [buster] - samba <ignored> (Intrusive backport; affects Samba as AD DC) NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14558 NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14725 NOTE: https://www.samba.org/samba/security/CVE-2020-25718.html @@ -12937,6 +12941,7 @@ CVE-2020-25717 [A user on the domain can become root on domain members] RESERVED {DSA-5003-1} - samba 2:4.13.14+dfsg-1 + [buster] - samba <ignored> (Intrusive backport; backport only 'min domain uid' parameter) NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14556 NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14725 NOTE: https://www.samba.org/samba/security/CVE-2020-25717.html diff --git a/data/CVE/list.2021 b/data/CVE/list.2021 index 9e83660bc4..2544ee6f5c 100644 --- a/data/CVE/list.2021 +++ b/data/CVE/list.2021 @@ -8011,6 +8011,7 @@ CVE-2021-3738 [crash in dsdb stack] RESERVED {DSA-5003-1} - samba 2:4.13.14+dfsg-1 + [buster] - samba <no-dsa> (Minor issue; affects Samba as AD DC) NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14468 NOTE: https://www.samba.org/samba/security/CVE-2021-3738.html CVE-2021-3737 [client can enter an infinite loop on a 100 Continue response from the server] |