|
Message-ID: <532FC077.60108@redhat.com> Date: Mon, 24 Mar 2014 16:19:51 +1100 From: Murray McAllister <mmcallis@...hat.com> To: oss-security@...ts.openwall.com Subject: possible CVE request: smb4k credentials cache leak Hi, https://bugs.gentoo.org/show_bug.cgi?id=505376 notes that smb4k (an SMB/CIFS share browser for KDE) version 1.1.1 fixes a potential security issue: "Fixed potential security issue reported by Heiner Markert. Do not allow the cruid option to be entered via the "Additional options" line edit. Also, implement a check in Smb4KMountJob::createMountAction() that removes the cruid option from the custom options returned by Smb4KSettings::customCIFSOptions()." http://sourceforge.net/projects/smb4k/files/Smb4K%20%28stable%20releases%29/1.1.1/ Does it need a CVE? I do not have further details, sorry. -- Murray McAllister / Red Hat Security Response Team https://bugzilla.redhat.com/show_bug.cgi?id=1079819
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.