Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 24 Mar 2014 16:19:51 +1100
From: Murray McAllister <mmcallis@...hat.com>
To: oss-security@...ts.openwall.com
Subject: possible CVE request: smb4k credentials cache leak

Hi,

https://bugs.gentoo.org/show_bug.cgi?id=505376 notes that smb4k (an 
SMB/CIFS share browser for KDE) version 1.1.1 fixes a potential security 
issue:

"Fixed potential security issue reported by Heiner Markert. Do not allow 
the cruid option to be entered via the "Additional options" line edit. 
Also, implement a check in Smb4KMountJob::createMountAction() that 
removes the cruid option from the custom options returned by 
Smb4KSettings::customCIFSOptions()."

http://sourceforge.net/projects/smb4k/files/Smb4K%20%28stable%20releases%29/1.1.1/

Does it need a CVE? I do not have further details, sorry.

--
Murray McAllister / Red Hat Security Response Team

https://bugzilla.redhat.com/show_bug.cgi?id=1079819

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.