[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2020:2730-1 -- SLES samba, libdcerpc-binding0, libdcerpc-devel, libdcerpc-samr-devel, libdcerpc-samr0, libdcerpc0, libndr-devel, libndr-krb5pac-devel, libndr-krb5pac0, libndr-nbt-devel, libndr-nbt0, libndr-standard-devel, libndr-standard0, libndr0, libnetapi-devel, libnetapi0, libsamba-credentials-devel, libsamba-credentials0, libsamba-errors-devel, libsamba-errors0, libsamba-hostconfig-devel, libsamba-hostconfig0, libsamba-passdb-devel, libsamba-passdb0, libsamba-policy-devel, libsamba-policy-python3-devel, libsamba-policy0-python3, libsamba-util-devel, libsamba-util0, libsamdb-devel, libsamdb0, libsmbclient-devel, libsmbclient0, libsmbconf-devel, libsmbconf0, libsmbldap-devel, libsmbldap2, libtevent-util-devel, libtevent-util0, libwbclient-devel, libwbclient0

ID: oval:org.secpod.oval:def:89050374Date: (C)2023-10-10   (M)2024-01-23
Class: PATCHFamily: unix




This update for samba fixes the following issues: - ZeroLogon: An elevation of privilege was possible with some non default configurations when an attacker established a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol . - Update to samba 4.11.13 + s3: libsmb: Fix SMB2 client rename bug to a Windows server; ; + dsdb: Allow "password hash userPassword schemes = CryptSHA256" to work on RHEL7; ; + dbcheck: Allow a dangling forward link outside our known NCs; ; + lib/debug: Set the correct default backend loglevel to MAX_DEBUG_LEVEL; ; + s3:smbd: PANIC: assert failed in get_lease_type; ; + lib/util: do not install "test_util_paths"; ; + lib:util: Fix smbclient -l basename dir; ; + s3:smbd: PANIC: assert failed in get_lease_type; ; + util: Allow symlinks in directory_create_or_exist; ; + docs: Fix documentation for require_membership_of of pam_winbind; ; + s3:winbind:idmap_ad: Make failure to get attrnames for schema mode fatal; ;

Platform:
SUSE Linux Enterprise Server 15 SP2
SUSE Linux Enterprise Desktop 15 SP2
Product:
samba
libdcerpc-binding0
libdcerpc-devel
libdcerpc-samr-devel
libdcerpc-samr0
libdcerpc0
libndr-devel
libndr-krb5pac-devel
libndr-krb5pac0
libndr-nbt-devel
libndr-nbt0
libndr-standard-devel
libndr-standard0
libndr0
libnetapi-devel
libnetapi0
libsamba-credentials-devel
libsamba-credentials0
libsamba-errors-devel
libsamba-errors0
libsamba-hostconfig-devel
libsamba-hostconfig0
libsamba-passdb-devel
libsamba-passdb0
libsamba-policy-devel
libsamba-policy-python3-devel
libsamba-policy0-python3
libsamba-util-devel
libsamba-util0
libsamdb-devel
libsamdb0
libsmbclient-devel
libsmbclient0
libsmbconf-devel
libsmbconf0
libsmbldap-devel
libsmbldap2
libtevent-util-devel
libtevent-util0
libwbclient-devel
libwbclient0
Reference:
SUSE-SU-2020:2730-1
CVE-2020-1472
CVE    1
CVE-2020-1472
CPE    43
cpe:/a:libdcerpc-binding0:libdcerpc-binding0
cpe:/a:libndr-nbt0:libndr-nbt0
cpe:/a:libndr-standard:libndr-standard-devel
cpe:/a:libndr:libndr-devel
...

© SecPod Technologies