Source: samba
Version: 2:4.13.5+dfsg-1
Severity: grave
Tags: security upstream
Justification: user security hole
Forwarded: https://bugzilla.samba.org/show_bug.cgi?id=14571
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 2:4.9.5+dfsg-5

Hi,

The following vulnerability was published for samba.

I think would be best if we can have this fixed in bullseye, though
note we marked it for now no-dsa for buster itself.

CVE-2021-20254[0]:
| Negative idmap cache entries can cause incorrect group entries in
| the Samba file server process token

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-20254
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254
[1] https://bugzilla.samba.org/show_bug.cgi?id=14571
[2] https://www.samba.org/samba/security/CVE-2021-20254.html
[3] 
https://git.samba.org/?p=samba.git;a=commitdiff;h=75ad84167f5d2379557ec078d17c9a1c244402fc

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to