UbuntuUpdates.org

Package "cifs-utils"

Name: cifs-utils

Description:

Common Internet File System utilities

Latest version: 2:6.8-1ubuntu1.2
Release: bionic (18.04)
Level: security
Repository: main
Homepage: http://www.samba.org/~jlayton/cifs-utils/

Links


Download "cifs-utils"


Other versions of "cifs-utils" in Bionic

Repository Area Version
base main 2:6.8-1
updates main 2:6.8-1ubuntu1.2

Changelog

Version: 2:6.8-1ubuntu1.2 2022-06-02 18:06:19 UTC

  cifs-utils (2:6.8-1ubuntu1.2) bionic-security; urgency=medium

  * SECURITY UPDATE: command injection via shell
    - debian/patches/CVE-2020-14342.patch: fix injection in mount.cifs.c.
    - CVE-2020-14342
  * SECURITY UPDATE: krb5 credential use from host
    - debian/patches/CVE-2021-20208-1.patch: try to use container
      namespaces in cifs.upcall.c.
    - debian/patches/CVE-2021-20208-2.patch: fix regression in kerberos
      mount in cifs.upcall.c.
    - CVE-2021-20208
  * SECURITY UPDATE: buffer overflow in ip= command-line argument
    - debian/patches/CVE-2022-27239.patch: fix length check for ip option
      parsing in mount.cifs.c.
    - CVE-2022-27239
  * SECURITY UPDATE: information leak via verbose logging
    - debian/patches/CVE-2022-29869.patch: fix verbose messages on option
      parsing in mount.cifs.c.
    - CVE-2022-29869

 -- Marc Deslauriers <email address hidden> Wed, 01 Jun 2022 12:19:46 -0400

CVE-2020-14342 It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. A
CVE-2021-20208 A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credent
CVE-2022-27239 In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining
CVE-2022-29869 cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid creden



About   -   Send Feedback to @ubuntu_updates