Summary: | <net-fs/samba-{3.6.22,4.0.13,4.1.3}: two vulnerabilities (CVE-2012-6150, CVE-2013-4408) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | samba |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1036897 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() CVE-2012-6150 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6150): The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake. *** Bug 493726 has been marked as a duplicate of this bug. *** +*samba-4.1.3 (09 Dec 2013) +*samba-4.0.13 (09 Dec 2013) +*samba-3.6.22 (09 Dec 2013) + + 09 Dec 2013; Lars Wendler <polynomial-c@gentoo.org> +samba-3.6.22.ebuild, + -samba-4.0.11.ebuild, +samba-4.0.13.ebuild, -samba-4.1.1.ebuild, + +samba-4.1.3.ebuild: + Security bump (bug #493726). Removed old. + Arches please test and mark stable =net-fs/samba-3.6.22. Target KEYWORDS are: alpha amd64 arm hppa ia64 ~mips ppc ppc64 sparc x86 ~amd64-fbsd ~x86-fbsd ~arm-linux ~x86-linux Stable for HPPA. amd64 stable x86 stable ppc stable ppc64 stable arm stable sparc stable alpha stable ia64 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Arches and Maintainer(s), Thank you for your work. New GLSA Request filed. This issue was resolved and addressed in GLSA 201502-15 at http://security.gentoo.org/glsa/glsa-201502-15.xml by GLSA coordinator Kristian Fiskerstrand (K_F). |