Santiago R.R. pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9bc9aafe by Santiago Ruano Rincón at 2023-12-01T11:30:06-03:00
give more info about regressions in some CVE related to samba/bullseye-and-older

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -77177,6 +77177,8 @@ CVE-2022-42898 (PAC parsing in MIT Kerberos 5 (aka 
krb5) before 1.19.4 and 1.20.
        NOTE: 
https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c
        NOTE: Heimdal: 
https://github.com/heimdal/heimdal/commit/0c56257bdac80da015878fffdb0f8a42b8d73246
 (heimdal-7.7.1)
        NOTE: Heimdal regression: https://github.com/heimdal/heimdal/pull/1025
+       NOTE: possible samba 4.13,4.15 regression: 
https://bugzilla.samba.org/show_bug.cgi?id=15243
+       NOTE: and https://bugs.launchpad.net/ubuntu/+source/samba/+bug/2003867
 CVE-2022-42897 (Array Networks AG/vxAG with ArrayOS AG before 9.4.0.469 allows 
unauthe ...)
        NOT-FOR-US: Array Networks
 CVE-2022-3478 (An issue has been discovered in GitLab affecting all versions 
starting ...)
@@ -77756,7 +77758,8 @@ CVE-2022-3437 (A heap-based buffer overflow 
vulnerability was found in Samba wit
        NOTE: 
https://github.com/heimdal/heimdal/commit/c8407ca079294d76a5ed140ba5b546f870d23ed2
 (heimdal-7.7.1)
        NOTE: 
https://github.com/heimdal/heimdal/commit/8fb508a25a6a47289c73e3f4339352a73a396eef
 (heimdal-7.7.1)
        NOTE: In scope for continued Samba support
-       NOTE: Important risk of regression in samba/bullseye (4.13)
+       NOTE: possible samba 4.13,4.15 regression: 
https://bugzilla.samba.org/show_bug.cgi?id=15243
+       NOTE: and https://bugs.launchpad.net/ubuntu/+source/samba/+bug/2003867
 CVE-2021-46845
        RESERVED
 CVE-2020-36606
@@ -90562,6 +90565,8 @@ CVE-2022-38024
 CVE-2022-38023 (Netlogon RPC Elevation of Privilege Vulnerability)
        - samba 2:4.17.4+dfsg-1
        NOTE: https://www.samba.org/samba/security/CVE-2022-38023.html
+       NOTE: possible samba 4.13,4.15 regression: 
https://bugzilla.samba.org/show_bug.cgi?id=15243
+       NOTE: and https://bugs.launchpad.net/ubuntu/+source/samba/+bug/2003867
 CVE-2022-38022 (Windows Kernel Elevation of Privilege Vulnerability. This CVE 
ID is un ...)
        NOT-FOR-US: Microsoft
 CVE-2022-38021 (Connected User Experiences and Telemetry Elevation of 
Privilege Vulner ...)
@@ -90677,9 +90682,13 @@ CVE-2022-37967 (Windows Kerberos Elevation of 
Privilege Vulnerability)
        [bullseye] - samba <ignored> (Domain controller functionality is EOLed, 
see DSA DSA-5477-1)
        [buster] - samba <ignored> (Domain controller functionality is EOLed, 
see DSA-5015-1)
        NOTE: https://www.samba.org/samba/security/CVE-2022-37967.html
+       NOTE: possible samba 4.13,4.15 regression: 
https://bugzilla.samba.org/show_bug.cgi?id=15243
+       NOTE: and https://bugs.launchpad.net/ubuntu/+source/samba/+bug/2003867
 CVE-2022-37966 (Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability)
        - samba 2:4.17.4+dfsg-1
        NOTE: https://www.samba.org/samba/security/CVE-2022-37966.html
+       NOTE: possible samba 4.13,4.15 regression: 
https://bugzilla.samba.org/show_bug.cgi?id=15243
+       NOTE: and https://bugs.launchpad.net/ubuntu/+source/samba/+bug/2003867
 CVE-2022-37965 (Windows Point-to-Point Tunneling Protocol Denial of Service 
Vulnerabil ...)
        NOT-FOR-US: Microsoft
 CVE-2022-37964 (Windows Kernel Elevation of Privilege Vulnerability)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9bc9aafed627e43086d1ed7387da2e7bd0e1f843

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9bc9aafed627e43086d1ed7387da2e7bd0e1f843
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to