[Git][security-tracker-team/security-tracker][master] Track fixed version for samba issues fixed in unstable

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Aug 1 13:33:40 BST 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
925a8821 by Salvatore Bonaccorso at 2022-08-01T14:32:51+02:00
Track fixed version for samba issues fixed in unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -11242,24 +11242,24 @@ CVE-2022-32747
 	RESERVED
 CVE-2022-32746 [Samba AD users can induce a use-after-free in the server process with an LDAP add or modify request]
 	RESERVED
-	- samba <unfixed> (bug #1016449)
+	- samba 2:4.16.4+dfsg-1 (bug #1016449)
 	[buster] - samba <no-dsa> (Minor issue; affects Samba as AD DC)
 	NOTE: https://www.samba.org/samba/security/CVE-2022-32746.html
 CVE-2022-32745 [Samba AD users can crash the server process with an LDAP add or modify request]
 	RESERVED
-	- samba <unfixed> (bug #1016449)
+	- samba 2:4.16.4+dfsg-1 (bug #1016449)
 	[buster] - samba <not-affected> (Only affects 4.13 and later)
 	NOTE: https://www.samba.org/samba/security/CVE-2022-32745.html
 CVE-2022-32744 [Samba AD users can forge password change requests for any user]
 	RESERVED
-	- samba <unfixed> (bug #1016449)
+	- samba 2:4.16.4+dfsg-1 (bug #1016449)
 	[buster] - samba <no-dsa> (Minor issue; affects Samba as AD DC)
 	NOTE: https://www.samba.org/samba/security/CVE-2022-32744.html
 CVE-2022-32743
 	RESERVED
 CVE-2022-32742 [Server memory information leak via SMB1]
 	RESERVED
-	- samba <unfixed> (bug #1016449)
+	- samba 2:4.16.4+dfsg-1 (bug #1016449)
 	NOTE: https://www.samba.org/samba/security/CVE-2022-32742.html
 CVE-2022-32741 (Attacker is able to determine if the provided username exists (and it' ...)
 	NOT-FOR-US: OTRS
@@ -11684,7 +11684,7 @@ CVE-2022-2032 (In Pandora FMS v7.0NG.761 and below, in the file manager section,
 	NOT-FOR-US: Pandora FMS
 CVE-2022-2031 [Samba AD users can bypass certain restrictions associated with changing passwords]
 	RESERVED
-	- samba <unfixed> (bug #1016449)
+	- samba 2:4.16.4+dfsg-1 (bug #1016449)
 	[buster] - samba <no-dsa> (Minor issue; affects Samba as AD DC)
 	NOTE: https://www.samba.org/samba/security/CVE-2022-2031.html
 CVE-2022-2030 (A directory traversal vulnerability caused by specific character seque ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/925a88214cb3b059767e1ca27a481f97b20c26b8

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/925a88214cb3b059767e1ca27a481f97b20c26b8
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220801/cf9ddde2/attachment.htm>


More information about the debian-security-tracker-commits mailing list