Santiago R.R. pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7d7a215d by Santiago Ruano Rincón at 2024-03-22T11:23:58-03:00
Mark samba's CVE-2023-0614 and CVE-2022-38023 as ignored. Add note about 
CVE-2022-42898

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -73235,6 +73235,8 @@ CVE-2023-0615 (A memory leak flaw and potential divide 
by zero and Integer overf
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2166287
 CVE-2023-0614 (The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 
Confident ...)
        - samba 2:4.17.7+dfsg-1
+       [bullseye] - samba <ignored> (Domain controller functionality is EOLed, 
see DSA DSA-5477-1)
+       [buster] - samba <ignored> (Domain controller functionality is EOLed, 
see DSA-5015-1)
        NOTE: https://www.samba.org/samba/security/CVE-2023-0614.html
 CVE-2023-0613 (A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 
and cla ...)
        NOT-FOR-US: TRENDnet
@@ -101925,6 +101927,7 @@ CVE-2022-42898 (PAC parsing in MIT Kerberos 5 (aka 
krb5) before 1.19.4 and 1.20.
        - samba 2:4.17.3+dfsg-1
        NOTE: https://www.samba.org/samba/security/CVE-2022-42898.html
        NOTE: https://bugzilla.samba.org/show_bug.cgi?id=15203
+       NOTE: samba: only exploitable in 32-bit systems, according to upstream 
advisory
        NOTE: MIT-krb5: 
https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583 
(master)
        NOTE: MIT-krb5: 
https://github.com/krb5/krb5/commit/b99de751dd35360c0fccac74a40f4a60dbf1ceea 
(krb5-1.20.1-final)
        NOTE: MIT-krb5: 
https://github.com/krb5/krb5/commit/4e661f0085ec5f969c76c0896a34322c6c432de4 
(krb5-1.19.4-final)
@@ -115321,6 +115324,8 @@ CVE-2022-38024
        RESERVED
 CVE-2022-38023 (Netlogon RPC Elevation of Privilege Vulnerability)
        - samba 2:4.17.4+dfsg-1
+       [bullseye] - samba <ignored> (Domain controller functionality is EOLed, 
see DSA DSA-5477-1)
+       [buster] - samba <ignored> (Domain controller functionality is EOLed, 
see DSA-5015-1)
        NOTE: https://www.samba.org/samba/security/CVE-2022-38023.html
        NOTE: possible samba 4.13,4.15 regression: 
https://bugzilla.samba.org/show_bug.cgi?id=15243
        NOTE: and https://bugs.launchpad.net/ubuntu/+source/samba/+bug/2003867



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7d7a215d0862978966af171aea64b5823b540a9f

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7d7a215d0862978966af171aea64b5823b540a9f
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to