Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2019-2099

Опубликовано: 13 авг. 2019
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2019-2099: samba security, bug fix, and enhancement update (MODERATE)

[4.9.1-6]

  • related: #1703204 - Fix printing with smbspool as CUPS backend

[4.9.1-5]

  • resolves: #1703204 - Fix smbspool krb5 authentication

[4.9.1-4]

  • resolves: #1690222 - Fix --max-protocol documentation of smbclient
  • resolves: #1518353 - Fix 'net ads join -Uadmin@forestdomain'
  • resolves: #1696524 - Fix CVE-2019-3880

[4.9.1-3]

  • resolves: #1479451 - Fix 'net' command auth with Kerberos
  • resolves: #1686158 - Fix printing with CUPS
  • resolves: #1662408 - Fix username/password printing with CUPS

[4.9.1-2]

  • resolves: #1674403 - Fix panic when setting 'force group' on a share with an active connections
  • resolves: #1670720 - Fix installation of samba-python
  • resolves: #1669476 - Fix user lookup via UPN

[4.9.1-1]

  • resolves: #1649434 - Update to version 4.9.1
  • resolves: #1648852 - Fix out of bound array access in ctdb
  • resolves: #1647960 - Fix segfault in the debug system with hardended build
  • resolves: #1644328 - Fix segfault if wrong 'passdb backend' is configured
  • resolves: #1650452 - Add smbc_setOptionProtocols()
  • resolves: #1659513 - Fix testparm/pdbedit crash
  • resolves: #1529301 - Added new 'net ads spn' command
  • resolves: #1595277 - Fix manpage for 'net ads lookup'
  • resolves: #1600274 - Fix vfs_audit log which does not show full path names
  • resolves: #1623140 - Fix handling the 'disable netbios' option
  • resolves: #1624227 - Connect to spoolss with the correct version information
  • resolves: #1659533 - Fix new file and folder creation with vfs_glusterfs
  • resolves: #1579401 - Implement 'net ads leave --keep-account'
  • resolves: #1624227 - Fix spoolss client operations against newer Windows versions
  • resolves: #1656405 - Fix looking up local system accounts

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

ctdb

4.9.1-6.el7

ctdb-tests

4.9.1-6.el7

libsmbclient

4.9.1-6.el7

libsmbclient-devel

4.9.1-6.el7

libwbclient

4.9.1-6.el7

libwbclient-devel

4.9.1-6.el7

samba

4.9.1-6.el7

samba-client

4.9.1-6.el7

samba-client-libs

4.9.1-6.el7

samba-common

4.9.1-6.el7

samba-common-libs

4.9.1-6.el7

samba-common-tools

4.9.1-6.el7

samba-dc

4.9.1-6.el7

samba-dc-libs

4.9.1-6.el7

samba-devel

4.9.1-6.el7

samba-krb5-printing

4.9.1-6.el7

samba-libs

4.9.1-6.el7

samba-pidl

4.9.1-6.el7

samba-python

4.9.1-6.el7

samba-python-test

4.9.1-6.el7

samba-test

4.9.1-6.el7

samba-test-libs

4.9.1-6.el7

samba-winbind

4.9.1-6.el7

samba-winbind-clients

4.9.1-6.el7

samba-winbind-krb5-locator

4.9.1-6.el7

samba-winbind-modules

4.9.1-6.el7

Oracle Linux x86_64

ctdb

4.9.1-6.el7

ctdb-tests

4.9.1-6.el7

libsmbclient

4.9.1-6.el7

libsmbclient-devel

4.9.1-6.el7

libwbclient

4.9.1-6.el7

libwbclient-devel

4.9.1-6.el7

samba

4.9.1-6.el7

samba-client

4.9.1-6.el7

samba-client-libs

4.9.1-6.el7

samba-common

4.9.1-6.el7

samba-common-libs

4.9.1-6.el7

samba-common-tools

4.9.1-6.el7

samba-dc

4.9.1-6.el7

samba-dc-libs

4.9.1-6.el7

samba-devel

4.9.1-6.el7

samba-krb5-printing

4.9.1-6.el7

samba-libs

4.9.1-6.el7

samba-pidl

4.9.1-6.el7

samba-python

4.9.1-6.el7

samba-python-test

4.9.1-6.el7

samba-test

4.9.1-6.el7

samba-test-libs

4.9.1-6.el7

samba-vfs-glusterfs

4.9.1-6.el7

samba-winbind

4.9.1-6.el7

samba-winbind-clients

4.9.1-6.el7

samba-winbind-krb5-locator

4.9.1-6.el7

samba-winbind-modules

4.9.1-6.el7

Связанные CVE

Связанные уязвимости

CVSS3: 5.4
ubuntu
почти 7 лет назад

A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.

CVSS3: 4.2
redhat
почти 7 лет назад

A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.

CVSS3: 5.4
nvd
почти 7 лет назад

A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.

CVSS3: 5.4
debian
почти 7 лет назад

A flaw was found in the way samba implemented an RPC endpoint emulatin ...

suse-cvrf
почти 7 лет назад

Security update for samba