Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2021-4058

Опубликовано: 02 нояб. 2021
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2021-4058: samba security update (MODERATE)

[4.13.3-5]

  • resolves: #2003507 - Fix CVE-2021-20254

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

ctdb

4.13.3-5.el8_4

ctdb-tests

4.13.3-5.el8_4

libsmbclient

4.13.3-5.el8_4

libsmbclient-devel

4.13.3-5.el8_4

libwbclient

4.13.3-5.el8_4

libwbclient-devel

4.13.3-5.el8_4

python3-samba

4.13.3-5.el8_4

python3-samba-test

4.13.3-5.el8_4

samba

4.13.3-5.el8_4

samba-client

4.13.3-5.el8_4

samba-client-libs

4.13.3-5.el8_4

samba-common

4.13.3-5.el8_4

samba-common-libs

4.13.3-5.el8_4

samba-common-tools

4.13.3-5.el8_4

samba-devel

4.13.3-5.el8_4

samba-krb5-printing

4.13.3-5.el8_4

samba-libs

4.13.3-5.el8_4

samba-pidl

4.13.3-5.el8_4

samba-test

4.13.3-5.el8_4

samba-test-libs

4.13.3-5.el8_4

samba-winbind

4.13.3-5.el8_4

samba-winbind-clients

4.13.3-5.el8_4

samba-winbind-krb5-locator

4.13.3-5.el8_4

samba-winbind-modules

4.13.3-5.el8_4

Oracle Linux x86_64

ctdb

4.13.3-5.el8_4

ctdb-tests

4.13.3-5.el8_4

libsmbclient

4.13.3-5.el8_4

libsmbclient-devel

4.13.3-5.el8_4

libwbclient

4.13.3-5.el8_4

libwbclient-devel

4.13.3-5.el8_4

python3-samba

4.13.3-5.el8_4

python3-samba-test

4.13.3-5.el8_4

samba

4.13.3-5.el8_4

samba-client

4.13.3-5.el8_4

samba-client-libs

4.13.3-5.el8_4

samba-common

4.13.3-5.el8_4

samba-common-libs

4.13.3-5.el8_4

samba-common-tools

4.13.3-5.el8_4

samba-devel

4.13.3-5.el8_4

samba-krb5-printing

4.13.3-5.el8_4

samba-libs

4.13.3-5.el8_4

samba-pidl

4.13.3-5.el8_4

samba-test

4.13.3-5.el8_4

samba-test-libs

4.13.3-5.el8_4

samba-winbind

4.13.3-5.el8_4

samba-winbind-clients

4.13.3-5.el8_4

samba-winbind-krb5-locator

4.13.3-5.el8_4

samba-winbind-modules

4.13.3-5.el8_4

samba-winexe

4.13.3-5.el8_4

Связанные CVE

Связанные уязвимости

CVSS3: 6.8
ubuntu
больше 4 лет назад

A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.

CVSS3: 6.8
redhat
больше 4 лет назад

A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.

CVSS3: 6.8
nvd
больше 4 лет назад

A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.

CVSS3: 6.8
msrc
10 месяцев назад

Описание отсутствует

CVSS3: 6.8
debian
больше 4 лет назад

A flaw was found in samba. The Samba smbd file server must map Windows ...