Описание
ELSA-2023-4325: samba security and bug fix update (MODERATE)
[4.17.5-103.0.1]
- Fix memleak in _nss_winbind_initgroups_dyn [Orabug: 34994509]
[4.17.5-103]
- resolves: rhbz#2223600 - Fix trust relationship between workstation and DC
- resolves: rhbz#2222895 - Fix CVE-2023-3347
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
libnetapi
4.17.5-103.0.1.el9_2
libnetapi-devel
4.17.5-103.0.1.el9_2
libsmbclient
4.17.5-103.0.1.el9_2
libsmbclient-devel
4.17.5-103.0.1.el9_2
libwbclient
4.17.5-103.0.1.el9_2
libwbclient-devel
4.17.5-103.0.1.el9_2
python3-samba
4.17.5-103.0.1.el9_2
python3-samba-dc
4.17.5-103.0.1.el9_2
python3-samba-devel
4.17.5-103.0.1.el9_2
python3-samba-test
4.17.5-103.0.1.el9_2
samba
4.17.5-103.0.1.el9_2
samba-client
4.17.5-103.0.1.el9_2
samba-client-libs
4.17.5-103.0.1.el9_2
samba-common
4.17.5-103.0.1.el9_2
samba-common-libs
4.17.5-103.0.1.el9_2
samba-common-tools
4.17.5-103.0.1.el9_2
samba-dc-libs
4.17.5-103.0.1.el9_2
samba-dcerpc
4.17.5-103.0.1.el9_2
samba-devel
4.17.5-103.0.1.el9_2
samba-krb5-printing
4.17.5-103.0.1.el9_2
samba-ldb-ldap-modules
4.17.5-103.0.1.el9_2
samba-libs
4.17.5-103.0.1.el9_2
samba-pidl
4.17.5-103.0.1.el9_2
samba-test
4.17.5-103.0.1.el9_2
samba-test-libs
4.17.5-103.0.1.el9_2
samba-tools
4.17.5-103.0.1.el9_2
samba-usershares
4.17.5-103.0.1.el9_2
samba-vfs-iouring
4.17.5-103.0.1.el9_2
samba-winbind
4.17.5-103.0.1.el9_2
samba-winbind-clients
4.17.5-103.0.1.el9_2
samba-winbind-krb5-locator
4.17.5-103.0.1.el9_2
samba-winbind-modules
4.17.5-103.0.1.el9_2
Oracle Linux x86_64
libnetapi
4.17.5-103.0.1.el9_2
libnetapi-devel
4.17.5-103.0.1.el9_2
libsmbclient
4.17.5-103.0.1.el9_2
libsmbclient-devel
4.17.5-103.0.1.el9_2
libwbclient
4.17.5-103.0.1.el9_2
libwbclient-devel
4.17.5-103.0.1.el9_2
python3-samba
4.17.5-103.0.1.el9_2
python3-samba-dc
4.17.5-103.0.1.el9_2
python3-samba-devel
4.17.5-103.0.1.el9_2
python3-samba-test
4.17.5-103.0.1.el9_2
samba
4.17.5-103.0.1.el9_2
samba-client
4.17.5-103.0.1.el9_2
samba-client-libs
4.17.5-103.0.1.el9_2
samba-common
4.17.5-103.0.1.el9_2
samba-common-libs
4.17.5-103.0.1.el9_2
samba-common-tools
4.17.5-103.0.1.el9_2
samba-dc-libs
4.17.5-103.0.1.el9_2
samba-dcerpc
4.17.5-103.0.1.el9_2
samba-devel
4.17.5-103.0.1.el9_2
samba-krb5-printing
4.17.5-103.0.1.el9_2
samba-ldb-ldap-modules
4.17.5-103.0.1.el9_2
samba-libs
4.17.5-103.0.1.el9_2
samba-pidl
4.17.5-103.0.1.el9_2
samba-test
4.17.5-103.0.1.el9_2
samba-test-libs
4.17.5-103.0.1.el9_2
samba-tools
4.17.5-103.0.1.el9_2
samba-usershares
4.17.5-103.0.1.el9_2
samba-vfs-iouring
4.17.5-103.0.1.el9_2
samba-winbind
4.17.5-103.0.1.el9_2
samba-winbind-clients
4.17.5-103.0.1.el9_2
samba-winbind-krb5-locator
4.17.5-103.0.1.el9_2
samba-winbind-modules
4.17.5-103.0.1.el9_2
samba-winexe
4.17.5-103.0.1.el9_2
Связанные CVE
Связанные уязвимости
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.
A vulnerability was found in Samba's SMB2 packet signing mechanism. Th ...
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.