Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-4325

Опубликовано: 02 авг. 2023
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2023-4325: samba security and bug fix update (MODERATE)

[4.17.5-103.0.1]

  • Fix memleak in _nss_winbind_initgroups_dyn [Orabug: 34994509]

[4.17.5-103]

  • resolves: rhbz#2223600 - Fix trust relationship between workstation and DC
  • resolves: rhbz#2222895 - Fix CVE-2023-3347

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

libnetapi

4.17.5-103.0.1.el9_2

libnetapi-devel

4.17.5-103.0.1.el9_2

libsmbclient

4.17.5-103.0.1.el9_2

libsmbclient-devel

4.17.5-103.0.1.el9_2

libwbclient

4.17.5-103.0.1.el9_2

libwbclient-devel

4.17.5-103.0.1.el9_2

python3-samba

4.17.5-103.0.1.el9_2

python3-samba-dc

4.17.5-103.0.1.el9_2

python3-samba-devel

4.17.5-103.0.1.el9_2

python3-samba-test

4.17.5-103.0.1.el9_2

samba

4.17.5-103.0.1.el9_2

samba-client

4.17.5-103.0.1.el9_2

samba-client-libs

4.17.5-103.0.1.el9_2

samba-common

4.17.5-103.0.1.el9_2

samba-common-libs

4.17.5-103.0.1.el9_2

samba-common-tools

4.17.5-103.0.1.el9_2

samba-dc-libs

4.17.5-103.0.1.el9_2

samba-dcerpc

4.17.5-103.0.1.el9_2

samba-devel

4.17.5-103.0.1.el9_2

samba-krb5-printing

4.17.5-103.0.1.el9_2

samba-ldb-ldap-modules

4.17.5-103.0.1.el9_2

samba-libs

4.17.5-103.0.1.el9_2

samba-pidl

4.17.5-103.0.1.el9_2

samba-test

4.17.5-103.0.1.el9_2

samba-test-libs

4.17.5-103.0.1.el9_2

samba-tools

4.17.5-103.0.1.el9_2

samba-usershares

4.17.5-103.0.1.el9_2

samba-vfs-iouring

4.17.5-103.0.1.el9_2

samba-winbind

4.17.5-103.0.1.el9_2

samba-winbind-clients

4.17.5-103.0.1.el9_2

samba-winbind-krb5-locator

4.17.5-103.0.1.el9_2

samba-winbind-modules

4.17.5-103.0.1.el9_2

Oracle Linux x86_64

libnetapi

4.17.5-103.0.1.el9_2

libnetapi-devel

4.17.5-103.0.1.el9_2

libsmbclient

4.17.5-103.0.1.el9_2

libsmbclient-devel

4.17.5-103.0.1.el9_2

libwbclient

4.17.5-103.0.1.el9_2

libwbclient-devel

4.17.5-103.0.1.el9_2

python3-samba

4.17.5-103.0.1.el9_2

python3-samba-dc

4.17.5-103.0.1.el9_2

python3-samba-devel

4.17.5-103.0.1.el9_2

python3-samba-test

4.17.5-103.0.1.el9_2

samba

4.17.5-103.0.1.el9_2

samba-client

4.17.5-103.0.1.el9_2

samba-client-libs

4.17.5-103.0.1.el9_2

samba-common

4.17.5-103.0.1.el9_2

samba-common-libs

4.17.5-103.0.1.el9_2

samba-common-tools

4.17.5-103.0.1.el9_2

samba-dc-libs

4.17.5-103.0.1.el9_2

samba-dcerpc

4.17.5-103.0.1.el9_2

samba-devel

4.17.5-103.0.1.el9_2

samba-krb5-printing

4.17.5-103.0.1.el9_2

samba-ldb-ldap-modules

4.17.5-103.0.1.el9_2

samba-libs

4.17.5-103.0.1.el9_2

samba-pidl

4.17.5-103.0.1.el9_2

samba-test

4.17.5-103.0.1.el9_2

samba-test-libs

4.17.5-103.0.1.el9_2

samba-tools

4.17.5-103.0.1.el9_2

samba-usershares

4.17.5-103.0.1.el9_2

samba-vfs-iouring

4.17.5-103.0.1.el9_2

samba-winbind

4.17.5-103.0.1.el9_2

samba-winbind-clients

4.17.5-103.0.1.el9_2

samba-winbind-krb5-locator

4.17.5-103.0.1.el9_2

samba-winbind-modules

4.17.5-103.0.1.el9_2

samba-winexe

4.17.5-103.0.1.el9_2

Связанные CVE

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

CVSS3: 5.9
redhat
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

CVSS3: 5.9
nvd
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

CVSS3: 5.9
debian
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. Th ...

CVSS3: 5.9
github
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.