Описание
ELSA-2016-1487: samba4 security update (MODERATE)
[4.2.10-7]
- resolves: #1351957 - Fix CVE-2016-2119
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
samba4
4.2.10-7.el6_8
samba4-client
4.2.10-7.el6_8
samba4-common
4.2.10-7.el6_8
samba4-dc
4.2.10-7.el6_8
samba4-dc-libs
4.2.10-7.el6_8
samba4-devel
4.2.10-7.el6_8
samba4-libs
4.2.10-7.el6_8
samba4-pidl
4.2.10-7.el6_8
samba4-python
4.2.10-7.el6_8
samba4-test
4.2.10-7.el6_8
samba4-winbind
4.2.10-7.el6_8
samba4-winbind-clients
4.2.10-7.el6_8
samba4-winbind-krb5-locator
4.2.10-7.el6_8
Oracle Linux i686
samba4
4.2.10-7.el6_8
samba4-client
4.2.10-7.el6_8
samba4-common
4.2.10-7.el6_8
samba4-dc
4.2.10-7.el6_8
samba4-dc-libs
4.2.10-7.el6_8
samba4-devel
4.2.10-7.el6_8
samba4-libs
4.2.10-7.el6_8
samba4-pidl
4.2.10-7.el6_8
samba4-python
4.2.10-7.el6_8
samba4-test
4.2.10-7.el6_8
samba4-winbind
4.2.10-7.el6_8
samba4-winbind-clients
4.2.10-7.el6_8
samba4-winbind-krb5-locator
4.2.10-7.el6_8
Oracle Linux sparc64
samba4
4.2.10-7.el6_8
samba4-client
4.2.10-7.el6_8
samba4-common
4.2.10-7.el6_8
samba4-dc
4.2.10-7.el6_8
samba4-dc-libs
4.2.10-7.el6_8
samba4-devel
4.2.10-7.el6_8
samba4-libs
4.2.10-7.el6_8
samba4-pidl
4.2.10-7.el6_8
samba4-python
4.2.10-7.el6_8
samba4-test
4.2.10-7.el6_8
samba4-winbind
4.2.10-7.el6_8
samba4-winbind-clients
4.2.10-7.el6_8
samba4-winbind-krb5-locator
4.2.10-7.el6_8
Связанные CVE
Связанные уязвимости
libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag.
libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag.
libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag.
libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3 ...