-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 27 Dec 2025 10:40:36 +0100 Source: smb4k Binary: smb4k smb4k-dbgsym Architecture: riscv64 Version: 4.0.0-1+deb13u1 Distribution: trixie-security Urgency: high Maintainer: riscv64 Build Daemon (rv-osuosl-03) Changed-By: Salvatore Bonaccorso Description: smb4k - Samba (SMB) share advanced browser Closes: 1122381 Changes: smb4k (4.0.0-1+deb13u1) trixie-security; urgency=high . * Non-maintainer upload by the Security Team. * Fix two security issues in the KAuth mounthelper: - CVE-2025-66002: local users can perform arbitrary unmounts via smb4kmounthelper due to lack of input validation - CVE-2025-66003: local users can perform a local root exploit via smb4k mounthelper if they can access and control the contents of a Samba share (Closes: #1122381) * Merge Smb4KHardwareInterface class from master so that the merged security fixes can be compiled Checksums-Sha1: b1136b8d6e5687d8522c41de18303e3ddf57fe45 10793276 smb4k-dbgsym_4.0.0-1+deb13u1_riscv64.deb 8e209d7927c85c757994e50641f148a575e6622d 21808 smb4k_4.0.0-1+deb13u1_riscv64-buildd.buildinfo 4f7207244c342ea4cefba3e2cad2a720c17cdd4e 5116320 smb4k_4.0.0-1+deb13u1_riscv64.deb Checksums-Sha256: 641dbae74d97d725f4b254ff55913cf38756e68cfd911ca0f5830644d7f5043a 10793276 smb4k-dbgsym_4.0.0-1+deb13u1_riscv64.deb 648eefcb37d56fb54bd5beeec7e048ee74e61e787f20d0b1309fdd6a093756e6 21808 smb4k_4.0.0-1+deb13u1_riscv64-buildd.buildinfo 7cd444ae85203e338c1064f2e33ac3666f2e024312ae7742f6cd6c7d0a7a1487 5116320 smb4k_4.0.0-1+deb13u1_riscv64.deb Files: 9d74ef79e02d3288ccb6c4eb33b741e7 10793276 debug optional smb4k-dbgsym_4.0.0-1+deb13u1_riscv64.deb 20f980e9a8341f11a6c64ff702be4ccd 21808 kde optional smb4k_4.0.0-1+deb13u1_riscv64-buildd.buildinfo 0ebdf13f7d5ef7864b190787877ce502 5116320 kde optional smb4k_4.0.0-1+deb13u1_riscv64.deb -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEExv8RwtKAmv8J56r/6ETk30hvxtkFAmlVHX4ACgkQ6ETk30hv xtnKAA//dkvsrPMa+klqwHcj8f5VeHrHKbPomjSK3EiwW24+MbStWTCc/5B79THo Pf1Trzks4TkLKc3jUjCFPkHzwDKA1aQhNMSsWPqR9NSXCA6VSXKEL2hmLNi3PtL4 IvFGSxb9GXR6F+1nnQbeZ5SwesJ0IfVGfWJM5QPDZtS4LqCQiKeO2WBq6uSXMVx9 HYD/qFFb7iL9pdGg7fT3fTSNDrts1IiqiYCm7Zz2lCPoG1RVBMYa19a/CmmFG5ow 9Gkb1nR0ucat1uv5mi3UuaAvd6xQ1WSXHB6RrskLn0YnRtUA+XO6NiKQBhci/9mP DAUb0LOEtYqiIdwBgTviwh5lGuYtOn36Fj/8m1HGCE5ZaNBUIXp+XgDu7pMasx3q JNRPG6JmZkTKYcCgAY+ADoQH0YSnQmpfHehP4eSxGLJH4rVE0r/LeozInSa7l8Jr CAL6p9eETK9BFHOowX2bBJw3pzwLhQsh/55siK2lWHcSn3Ec0gBOlVMYh2sy1QXr /SCwFjOWX8iZomgw+4/K7w7d9NbqLWwrzqOjSlZuwdPj0C+DN6tshsXTvq684RU2 e6NhVcJhYY5Y+7sZFU30fbAxLLjw+GTMrs9fSZr4aYaRNMumMwCNHXcMtOif3Akf nvCzW5vcEjsUSQn6qkSu1pYG2QwN24lLBqLBP6DYNudDMO0IU5g= =hhtW -----END PGP SIGNATURE-----