Sylvain Beucler pushed to branch master at Debian Security Tracker / security-tracker
Commits:
69b43095 by Sylvain Beucler at 2026-01-09T07:13:57+01:00
Typo
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -31378,7 +31378,7 @@ CVE-2025-10230 (A flaw was found in Samba, in the front-end WINS hook handling:
- samba 2:4.23.2+dfsg-1
[trixie] - samba 2:4.22.6+dfsg-0+deb13u1
[bookworm] - samba <no-dsa> (Minor issue; will be fixed via point release)
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
NOTE: https://www.samba.org/samba/security/CVE-2025-10230.html
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=15903
CVE-2025-61620
@@ -244169,7 +244169,7 @@ CVE-2023-42670 (A flaw was found in Samba. It is susceptible to a vulnerability
CVE-2023-42669 (A vulnerability was found in Samba's "rpcecho" development server, a n ...)
{DSA-5525-1}
- samba 2:4.19.1+dfsg-1
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://www.samba.org/samba/security/CVE-2023-42669.html
CVE-2023-4091 (A vulnerability was discovered in Samba, where the flaw allows SMB cli ...)
@@ -244182,7 +244182,7 @@ CVE-2023-4091 (A vulnerability was discovered in Samba, where the flaw allows SM
CVE-2023-4154 (A design flaw was found in Samba's DirSync control implementation, whi ...)
{DSA-5525-1}
- samba 2:4.19.1+dfsg-1
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://www.samba.org/samba/security/CVE-2023-4154.html
CVE-2023-3961 (A path traversal vulnerability was identified in Samba when processing ...)
@@ -280488,7 +280488,7 @@ CVE-2023-0923 (A flaw was found in the Kubernetes service for notebooks in RHODS
NOT-FOR-US: Red Hat OpenShift Data Science
CVE-2023-0922 (The Samba AD DC administration tool, when operating against a remote L ...)
- samba 2:4.17.7+dfsg-1
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://www.samba.org/samba/security/CVE-2023-0922.html
CVE-2023-0921 (A lack of length validation in GitLab CE/EE affecting all versions fro ...)
@@ -284184,7 +284184,7 @@ CVE-2023-0615 (A memory leak flaw and potential divide by zero and Integer overf
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2166287
CVE-2023-0614 (The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confident ...)
- samba 2:4.17.7+dfsg-1
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://www.samba.org/samba/security/CVE-2023-0614.html
CVE-2023-0613 (A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 and cla ...)
@@ -289140,7 +289140,7 @@ CVE-2023-0226
RESERVED
CVE-2023-0225 (A flaw was found in Samba. An incomplete access check on dnsHostName a ...)
- samba 2:4.17.7+dfsg-1
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://www.samba.org/samba/security/CVE-2023-0225.html
CVE-2023-0224 (The GiveWP WordPress plugin before 2.24.1 does not properly escape use ...)
@@ -303781,7 +303781,7 @@ CVE-2022-45142 (The fix for CVE-2022-3437 included changing memcmp to be constan
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=15296
CVE-2022-45141 (Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerabili ...)
- samba 2:4.16.0+dfsg-2
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://www.samba.org/samba/security/CVE-2022-45141.html
CVE-2022-45140 (The configuration backend allows an unauthenticated user to write arbi ...)
@@ -306139,7 +306139,7 @@ CVE-2022-44640 (Heimdal before 7.7.1 allows remote attackers to execute arbitrar
{DSA-5287-1 DLA-3206-1}
- heimdal 7.8.git20221115.a6cf945+dfsg-1 (bug #1024187)
- samba 2:4.17.4+dfsg-1
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4
NOTE: https://github.com/heimdal/heimdal/commit/ea5ec8f174920cb80ce2b168b49195378420449e (heimdal-7.7.1)
@@ -312959,7 +312959,7 @@ CVE-2022-42898 (PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.
- heimdal 7.8.git20221115.a6cf945+dfsg-1 (bug #1024187)
- krb5 1.20.1-1 (bug #1024267)
- samba 2:4.17.3+dfsg-1
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://www.samba.org/samba/security/CVE-2022-42898.html
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=15203
@@ -326364,7 +326364,7 @@ CVE-2022-38024
RESERVED
CVE-2022-38023 (Netlogon RPC Elevation of Privilege Vulnerability)
- samba 2:4.17.4+dfsg-1
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://www.samba.org/samba/security/CVE-2022-38023.html
NOTE: possible samba 4.13,4.15 regression: https://bugzilla.samba.org/show_bug.cgi?id=15243
@@ -326481,14 +326481,14 @@ CVE-2022-37968 (Microsoft has identified a vulnerability affecting the cluster c
NOT-FOR-US: Microsoft
CVE-2022-37967 (Windows Kerberos Elevation of Privilege Vulnerability)
- samba 2:4.17.4+dfsg-1
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://www.samba.org/samba/security/CVE-2022-37967.html
NOTE: possible samba 4.13,4.15 regression: https://bugzilla.samba.org/show_bug.cgi?id=15243
NOTE: and https://bugs.launchpad.net/ubuntu/+source/samba/+bug/2003867
CVE-2022-37966 (Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability)
- samba 2:4.17.4+dfsg-1
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://www.samba.org/samba/security/CVE-2022-37966.html
NOTE: possible samba 4.13,4.15 regression: https://bugzilla.samba.org/show_bug.cgi?id=15243
@@ -340547,7 +340547,7 @@ CVE-2022-32744 (A flaw was found in Samba. The KDC accepts kpasswd requests encr
CVE-2022-32743 (Samba does not validate the Validated-DNS-Host-Name right for the dNSH ...)
[experimental] - samba 2:4.17.0+dfsg-1
- samba 2:4.17.2+dfsg-3 (bug #1021022)
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14833
CVE-2022-32742 (A flaw was found in Samba. Some SMB1 write requests were not correctly ...)
@@ -347906,7 +347906,7 @@ CVE-2022-28702 (Incorrect Default Permissions vulnerability in ABB e-Design allo
CVE-2022-1615 (In Samba, GnuTLS gnutls_rnd() can fail and give predictable random val ...)
[experimental] - samba 2:4.17.0+dfsg-1
- samba 2:4.16.5+dfsg-2 (bug #1021024)
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <not-affected> (Vulnerable code introduced later)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=15103
NOTE: https://gitlab.com/samba-team/samba/-/merge_requests/2644
@@ -401138,7 +401138,7 @@ CVE-2021-3670 (MaxQueryDuration not honoured in Samba AD DC LDAP)
[buster] - ldb <no-dsa> (Minor issue)
[stretch] - ldb <no-dsa> (Minor issue)
- samba 2:4.16.0+dfsg-2
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Minor issue; affects Samba as AD DC; cf DSA 5015-1)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2077533
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14694
@@ -446617,7 +446617,7 @@ CVE-2021-20252 (A flaw was found in Red Hat 3scale API Management Platform 2. Th
CVE-2021-20251 (A flaw was found in samba. A race condition in the password lockout co ...)
[experimental] - samba 2:4.17.1+dfsg-1
- samba 2:4.17.2+dfsg-3
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14611
NOTE: https://gitlab.com/samba-team/samba/-/merge_requests/2708
@@ -463607,7 +463607,7 @@ CVE-2020-25721 (Kerberos acceptors need easy access to stable AD identifiers (eg
NOTE: https://www.samba.org/samba/security/CVE-2020-25721.html
CVE-2020-25720 (A vulnerability was found in Samba where a delegated administrator wit ...)
- samba 2:4.17.8+dfsg-1
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14810
NOTE: https://gitlab.com/samba-team/samba/-/merge_requests/2514
@@ -598872,7 +598872,7 @@ CVE-2018-14629 (A denial of service vulnerability was discovered in Samba's LDAP
CVE-2018-14628 (An information leak vulnerability was discovered in Samba's LDAP serve ...)
- samba 2:4.19.3+dfsg-1 (bug #1034803)
[bookworm] - samba <no-dsa> (Minor issue)
- [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)
+ [bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5477-1)
[buster] - samba <ignored> (Domain controller functionality is EOLed, see DSA-5015-1)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=13595
NOTE: https://www.samba.org/samba/security/CVE-2018-14628.html
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/69b43095b881c4c0c8aae2f771390f84a859ed6b
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/69b43095b881c4c0c8aae2f771390f84a859ed6b
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260109/62392d25/attachment-0001.htm>