Bug 1309992 (CVE-2015-7560)
Summary: | CVE-2015-7560 samba: Incorrect ACL get/set allowed on symlink path | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aavati, asn, gdeschner, jarrpa, madam, nlevinki, rfortier, sbose, security-response-team, sgirijan, sisharma, smohan, ssaha, vbellur |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | samba 4.4.0rc4, samba 4.3.6, samba 4.2.9, samba 4.1.23 | Doc Type: | Bug Fix |
Doc Text: |
A flaw was found in the way Samba handled ACLs on symbolic links. An authenticated user could use this flaw to gain access to an arbitrary file or directory by overwriting its ACL.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2016-03-24 02:50:01 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1314667, 1314668, 1314669, 1314670, 1314671, 1314672, 1314673, 1314674, 1315942 | ||
Bug Blocks: | 1309971 |