Package "cifs-utils"
Name: |
cifs-utils
|
Description: |
Common Internet File System utilities
|
Latest version: |
2:6.8-1ubuntu1.2 |
Release: |
bionic (18.04) |
Level: |
security |
Repository: |
main |
Homepage: |
http://www.samba.org/~jlayton/cifs-utils/ |
Links
Download "cifs-utils"
Other versions of "cifs-utils" in Bionic
Changelog
cifs-utils (2:6.8-1ubuntu1.2) bionic-security; urgency=medium
* SECURITY UPDATE: command injection via shell
- debian/patches/CVE-2020-14342.patch: fix injection in mount.cifs.c.
- CVE-2020-14342
* SECURITY UPDATE: krb5 credential use from host
- debian/patches/CVE-2021-20208-1.patch: try to use container
namespaces in cifs.upcall.c.
- debian/patches/CVE-2021-20208-2.patch: fix regression in kerberos
mount in cifs.upcall.c.
- CVE-2021-20208
* SECURITY UPDATE: buffer overflow in ip= command-line argument
- debian/patches/CVE-2022-27239.patch: fix length check for ip option
parsing in mount.cifs.c.
- CVE-2022-27239
* SECURITY UPDATE: information leak via verbose logging
- debian/patches/CVE-2022-29869.patch: fix verbose messages on option
parsing in mount.cifs.c.
- CVE-2022-29869
-- Marc Deslauriers <email address hidden> Wed, 01 Jun 2022 12:19:46 -0400
|
CVE-2020-14342 |
It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. A |
CVE-2021-20208 |
A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credent |
CVE-2022-27239 |
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining |
CVE-2022-29869 |
cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid creden |
|
About
-
Send Feedback to @ubuntu_updates