Описание
ELSA-2019-2099: samba security, bug fix, and enhancement update (MODERATE)
[4.9.1-6]
- related: #1703204 - Fix printing with smbspool as CUPS backend
[4.9.1-5]
- resolves: #1703204 - Fix smbspool krb5 authentication
[4.9.1-4]
- resolves: #1690222 - Fix --max-protocol documentation of smbclient
- resolves: #1518353 - Fix 'net ads join -Uadmin@forestdomain'
- resolves: #1696524 - Fix CVE-2019-3880
[4.9.1-3]
- resolves: #1479451 - Fix 'net' command auth with Kerberos
- resolves: #1686158 - Fix printing with CUPS
- resolves: #1662408 - Fix username/password printing with CUPS
[4.9.1-2]
- resolves: #1674403 - Fix panic when setting 'force group' on a share with an active connections
- resolves: #1670720 - Fix installation of samba-python
- resolves: #1669476 - Fix user lookup via UPN
[4.9.1-1]
- resolves: #1649434 - Update to version 4.9.1
- resolves: #1648852 - Fix out of bound array access in ctdb
- resolves: #1647960 - Fix segfault in the debug system with hardended build
- resolves: #1644328 - Fix segfault if wrong 'passdb backend' is configured
- resolves: #1650452 - Add smbc_setOptionProtocols()
- resolves: #1659513 - Fix testparm/pdbedit crash
- resolves: #1529301 - Added new 'net ads spn' command
- resolves: #1595277 - Fix manpage for 'net ads lookup'
- resolves: #1600274 - Fix vfs_audit log which does not show full path names
- resolves: #1623140 - Fix handling the 'disable netbios' option
- resolves: #1624227 - Connect to spoolss with the correct version information
- resolves: #1659533 - Fix new file and folder creation with vfs_glusterfs
- resolves: #1579401 - Implement 'net ads leave --keep-account'
- resolves: #1624227 - Fix spoolss client operations against newer Windows versions
- resolves: #1656405 - Fix looking up local system accounts
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
ctdb
4.9.1-6.el7
ctdb-tests
4.9.1-6.el7
libsmbclient
4.9.1-6.el7
libsmbclient-devel
4.9.1-6.el7
libwbclient
4.9.1-6.el7
libwbclient-devel
4.9.1-6.el7
samba
4.9.1-6.el7
samba-client
4.9.1-6.el7
samba-client-libs
4.9.1-6.el7
samba-common
4.9.1-6.el7
samba-common-libs
4.9.1-6.el7
samba-common-tools
4.9.1-6.el7
samba-dc
4.9.1-6.el7
samba-dc-libs
4.9.1-6.el7
samba-devel
4.9.1-6.el7
samba-krb5-printing
4.9.1-6.el7
samba-libs
4.9.1-6.el7
samba-pidl
4.9.1-6.el7
samba-python
4.9.1-6.el7
samba-python-test
4.9.1-6.el7
samba-test
4.9.1-6.el7
samba-test-libs
4.9.1-6.el7
samba-winbind
4.9.1-6.el7
samba-winbind-clients
4.9.1-6.el7
samba-winbind-krb5-locator
4.9.1-6.el7
samba-winbind-modules
4.9.1-6.el7
Oracle Linux x86_64
ctdb
4.9.1-6.el7
ctdb-tests
4.9.1-6.el7
libsmbclient
4.9.1-6.el7
libsmbclient-devel
4.9.1-6.el7
libwbclient
4.9.1-6.el7
libwbclient-devel
4.9.1-6.el7
samba
4.9.1-6.el7
samba-client
4.9.1-6.el7
samba-client-libs
4.9.1-6.el7
samba-common
4.9.1-6.el7
samba-common-libs
4.9.1-6.el7
samba-common-tools
4.9.1-6.el7
samba-dc
4.9.1-6.el7
samba-dc-libs
4.9.1-6.el7
samba-devel
4.9.1-6.el7
samba-krb5-printing
4.9.1-6.el7
samba-libs
4.9.1-6.el7
samba-pidl
4.9.1-6.el7
samba-python
4.9.1-6.el7
samba-python-test
4.9.1-6.el7
samba-test
4.9.1-6.el7
samba-test-libs
4.9.1-6.el7
samba-vfs-glusterfs
4.9.1-6.el7
samba-winbind
4.9.1-6.el7
samba-winbind-clients
4.9.1-6.el7
samba-winbind-krb5-locator
4.9.1-6.el7
samba-winbind-modules
4.9.1-6.el7
Связанные CVE
Связанные уязвимости
A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
A flaw was found in the way samba implemented an RPC endpoint emulatin ...