Описание
ELSA-2021-4058: samba security update (MODERATE)
[4.13.3-5]
- resolves: #2003507 - Fix CVE-2021-20254
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
ctdb
4.13.3-5.el8_4
ctdb-tests
4.13.3-5.el8_4
libsmbclient
4.13.3-5.el8_4
libsmbclient-devel
4.13.3-5.el8_4
libwbclient
4.13.3-5.el8_4
libwbclient-devel
4.13.3-5.el8_4
python3-samba
4.13.3-5.el8_4
python3-samba-test
4.13.3-5.el8_4
samba
4.13.3-5.el8_4
samba-client
4.13.3-5.el8_4
samba-client-libs
4.13.3-5.el8_4
samba-common
4.13.3-5.el8_4
samba-common-libs
4.13.3-5.el8_4
samba-common-tools
4.13.3-5.el8_4
samba-devel
4.13.3-5.el8_4
samba-krb5-printing
4.13.3-5.el8_4
samba-libs
4.13.3-5.el8_4
samba-pidl
4.13.3-5.el8_4
samba-test
4.13.3-5.el8_4
samba-test-libs
4.13.3-5.el8_4
samba-winbind
4.13.3-5.el8_4
samba-winbind-clients
4.13.3-5.el8_4
samba-winbind-krb5-locator
4.13.3-5.el8_4
samba-winbind-modules
4.13.3-5.el8_4
Oracle Linux x86_64
ctdb
4.13.3-5.el8_4
ctdb-tests
4.13.3-5.el8_4
libsmbclient
4.13.3-5.el8_4
libsmbclient-devel
4.13.3-5.el8_4
libwbclient
4.13.3-5.el8_4
libwbclient-devel
4.13.3-5.el8_4
python3-samba
4.13.3-5.el8_4
python3-samba-test
4.13.3-5.el8_4
samba
4.13.3-5.el8_4
samba-client
4.13.3-5.el8_4
samba-client-libs
4.13.3-5.el8_4
samba-common
4.13.3-5.el8_4
samba-common-libs
4.13.3-5.el8_4
samba-common-tools
4.13.3-5.el8_4
samba-devel
4.13.3-5.el8_4
samba-krb5-printing
4.13.3-5.el8_4
samba-libs
4.13.3-5.el8_4
samba-pidl
4.13.3-5.el8_4
samba-test
4.13.3-5.el8_4
samba-test-libs
4.13.3-5.el8_4
samba-winbind
4.13.3-5.el8_4
samba-winbind-clients
4.13.3-5.el8_4
samba-winbind-krb5-locator
4.13.3-5.el8_4
samba-winbind-modules
4.13.3-5.el8_4
samba-winexe
4.13.3-5.el8_4
Связанные CVE
Связанные уязвимости
A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.
A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.
A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.
A flaw was found in samba. The Samba smbd file server must map Windows ...