Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:0639: Red Hat Security Advisory: samba security update

An update for samba is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-38023: A flaw was found in samba. The Netlogon RPC implementations may use the rc4-hmac encryption algorithm, which is considered weak and should be avoided even if the client supports more modern encryption types. This issue could allow an attacker who knows the plain text content communicated between the samba client and server to craft data with the same MD5 calculation and replace it without being detected.
Red Hat Security Data
#vulnerability#mac#linux#red_hat#samba#sap

Synopsis

Important: samba security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for samba is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.

Security Fix(es):

  • samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the smb service will be restarted automatically.

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 2154362 - CVE-2022-38023 samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1

SRPM

samba-4.10.4-107.el8_1.src.rpm

SHA-256: 6a950c6b9c7dd3c47a27bab043e378e9c3c2de255eb83b8ab991ded28f244329

ppc64le

ctdb-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 289bd3b0ee002813d87906c1ef0dfcafb2ccb4706d4bb13b5a93b69c940fb7cf

ctdb-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 49121d971b3c3e087b78467deded1beadd8c5797b4f33e6d626fb3265040124e

ctdb-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 49121d971b3c3e087b78467deded1beadd8c5797b4f33e6d626fb3265040124e

ctdb-tests-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: c494ff9380441baecd740f74cda9d81422265615ec7797f37c101686096effd9

ctdb-tests-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 0995bdfc39cf79cd570d38bc6d3c7dce0862721c773be2c78f434a34a293559f

ctdb-tests-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 0995bdfc39cf79cd570d38bc6d3c7dce0862721c773be2c78f434a34a293559f

libsmbclient-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: e087b7cd018217445287667e4fccab59a36ed6b142971304a1dcf269152e2f17

libsmbclient-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 8822c609b3e6429128b456392a5d4d2b5dd42b3de9f69dc94e5a76a593a5057d

libsmbclient-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 8822c609b3e6429128b456392a5d4d2b5dd42b3de9f69dc94e5a76a593a5057d

libwbclient-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: ac7835b6924d777e5717660c3e4a1a3a526280c3ef39910957e93ec20bb48abf

libwbclient-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 4adb976a2708ebecc4f3ecc8eefb9a444c00d8b2d1d02c736a0fc3e2d0ac78d2

libwbclient-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 4adb976a2708ebecc4f3ecc8eefb9a444c00d8b2d1d02c736a0fc3e2d0ac78d2

python3-samba-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: c7acccd1b2f27db2284149a9ef660bc66312fde683193f37cb51609dc3ff6e8a

python3-samba-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 04276567e5722c2c37ad8414c046018a291791b7acfae448508b9c423419d319

python3-samba-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 04276567e5722c2c37ad8414c046018a291791b7acfae448508b9c423419d319

python3-samba-test-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 74467094be43963e939018035e2c48e444d1b25a237362e5e187a91b812d6e7d

samba-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: be76e1687aa9188b0bfe53960e9ca8ae36bb741d3eb456a86dd09e370e3d3845

samba-client-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 40c862a87638e90d0f3f4ed259d4fa99f4bcf4dd89a1a5b82e09bef61d4f86cc

samba-client-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 992f5a17d70363297a8c13b02ab55bff47a910357566876a3ef0c842a31ce43d

samba-client-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 992f5a17d70363297a8c13b02ab55bff47a910357566876a3ef0c842a31ce43d

samba-client-libs-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 9db48baa132ee592b6619f1710c374e8a0c643343202a7f0c04181fcba5035b2

samba-client-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: a952b556115ba7128daac44c14812cc2eff7a8499fae7896c8e291e90db5f6b9

samba-client-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: a952b556115ba7128daac44c14812cc2eff7a8499fae7896c8e291e90db5f6b9

samba-common-4.10.4-107.el8_1.noarch.rpm

SHA-256: 3f4c19f35902164d6a373fef4f991f967ff8d136bebbc7d821edf0f46c7bb2a0

samba-common-libs-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: a219814210535f09adc546f172be2f9e737a8f379a720c1a0491e4f228daed76

samba-common-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 72349373bc42ea2f6b9dc27ffc7b13f1f484a936d4d77c3a221b03c3ecce54d2

samba-common-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 72349373bc42ea2f6b9dc27ffc7b13f1f484a936d4d77c3a221b03c3ecce54d2

samba-common-tools-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 2e254a231d4476a813202258cb3cca1b239ae7b92daeb1dcc287323e86e8f295

samba-common-tools-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 49c39b1a2980d2a8749fb0659064112a04c23935075943d05c03b31d7b32c0f3

samba-common-tools-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 49c39b1a2980d2a8749fb0659064112a04c23935075943d05c03b31d7b32c0f3

samba-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 700692cbeb77b4c6a680dfef5c311cf2c28dc6b9fdf0a3314be12b70ff5e0c54

samba-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 700692cbeb77b4c6a680dfef5c311cf2c28dc6b9fdf0a3314be12b70ff5e0c54

samba-debugsource-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 81803d3ea6e0b7a1631791d4487d13bb6d4b0a21cca2016b80db467b4f6e7325

samba-debugsource-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 81803d3ea6e0b7a1631791d4487d13bb6d4b0a21cca2016b80db467b4f6e7325

samba-krb5-printing-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: ee4963c74aab4bf4c834f609e4fea750be86ed756c4b7f23c98a34d7ab95c743

samba-krb5-printing-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 81d627e3fbd0730de27ec2b6d8c6d6fd8089646825df08c7717b1c35edb813c8

samba-krb5-printing-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 81d627e3fbd0730de27ec2b6d8c6d6fd8089646825df08c7717b1c35edb813c8

samba-libs-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 10ad64a5254794b9f40ccc908feb462f9677d3c8ec578c5346d18f405e4d8646

samba-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 36f35ddcf5872ea3ac91922a32aac962e1fcb77b5b559c5ae62514aa47807444

samba-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 36f35ddcf5872ea3ac91922a32aac962e1fcb77b5b559c5ae62514aa47807444

samba-pidl-4.10.4-107.el8_1.noarch.rpm

SHA-256: a2fbcfd3ad51e6f54e8f97cf91d47b80389226420150f9b8a8730c1795fb96e5

samba-test-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: dcaa6b231629a152b7c0d359834304f8bac0c42ced73dfbb846f4de6de1e120e

samba-test-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: bb018cef501d52cbcc62f138804117edf9fa639381cde9adfa7ab755bac6312e

samba-test-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: bb018cef501d52cbcc62f138804117edf9fa639381cde9adfa7ab755bac6312e

samba-test-libs-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 5a2cd78f7ba5dce5cfc9fd7fcd364716682410b7255e82d7e670da4040d72953

samba-test-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 68a84bb5be39d5dbb51521e287148516498b5ceb2091d8ebc2366fd559bceb07

samba-test-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 68a84bb5be39d5dbb51521e287148516498b5ceb2091d8ebc2366fd559bceb07

samba-winbind-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 169150a7699e469562a087abc20850285922aa2ce2f15428ccf62fc9821aaf75

samba-winbind-clients-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 260eccbd673af88192ac8ffc9c49fc39dc254c6daa1915d916c7c9191ef47d98

samba-winbind-clients-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 929a1debe29dfa7250ecbb85d3d5e77401d6ffbf2918ebc36a6090f6e2ee6e79

samba-winbind-clients-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 929a1debe29dfa7250ecbb85d3d5e77401d6ffbf2918ebc36a6090f6e2ee6e79

samba-winbind-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 7297ef9f8d850b0bcd471602ddc34d3899c6f84bbce781ab44ef4e8ccecd9b44

samba-winbind-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 7297ef9f8d850b0bcd471602ddc34d3899c6f84bbce781ab44ef4e8ccecd9b44

samba-winbind-krb5-locator-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: 98530b7aa06cbae59d5d866e076bea861f30904ab0a67224f9d690ad41cd50d8

samba-winbind-krb5-locator-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: d0a70aacf28fcfe544ebfea827d74df7cc010825f858b89e5edc54a1573ea9b8

samba-winbind-krb5-locator-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: d0a70aacf28fcfe544ebfea827d74df7cc010825f858b89e5edc54a1573ea9b8

samba-winbind-modules-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: fd65472248ee57da970e049f50bbf2577448ecd1e1823add699756abfcd2fa0f

samba-winbind-modules-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: d85b0dcd8ff4aa50cb339e3b1ec809ca764300605fd707531edf3769281a5296

samba-winbind-modules-debuginfo-4.10.4-107.el8_1.ppc64le.rpm

SHA-256: d85b0dcd8ff4aa50cb339e3b1ec809ca764300605fd707531edf3769281a5296

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1

SRPM

samba-4.10.4-107.el8_1.src.rpm

SHA-256: 6a950c6b9c7dd3c47a27bab043e378e9c3c2de255eb83b8ab991ded28f244329

x86_64

ctdb-4.10.4-107.el8_1.x86_64.rpm

SHA-256: c5bcf1381adf3051f56e58917c8efe0ccbaafb4df3fbb8eb2d613c84943f5ea9

ctdb-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: bfe0675a09506690c60c3c94eeb6d9365def65dc36d4f1fcae5d12a93f23a95a

ctdb-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 2ca1feb59abaa92615115a953c34866af28c48749b2d379f196a6c9dd7908ce8

ctdb-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 2ca1feb59abaa92615115a953c34866af28c48749b2d379f196a6c9dd7908ce8

ctdb-tests-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 6345265f7874be91f8474e66d96aa078c5fd11120cb323da738ef390c0f10dc2

ctdb-tests-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: 7904933d47c1358a0efa3097ec95d159cc9a579c93f2a80016e3f3c6d3288f0e

ctdb-tests-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 4146681781d6e736c45de163b6ef77c4d6b396b515303c7bc7f6cea67294195a

ctdb-tests-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 4146681781d6e736c45de163b6ef77c4d6b396b515303c7bc7f6cea67294195a

libsmbclient-4.10.4-107.el8_1.i686.rpm

SHA-256: a3ee035e7a7fb2cb5d017d31433ee81d649adada80c682190f52c37c392ba30f

libsmbclient-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 40e2b8769073961f0988b987391b700c69b9953e8f7bb5defbdcf30f3a97aada

libsmbclient-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: 4bf1fa1c8afa219676be9de2196e4c395e607e1d41ee14f1540c75bab7f698d2

libsmbclient-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: bdae2768a23b7085eb386b5f988f5297ba7f3f5bf1439ca5d7fa75e75dd30208

libsmbclient-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: bdae2768a23b7085eb386b5f988f5297ba7f3f5bf1439ca5d7fa75e75dd30208

libwbclient-4.10.4-107.el8_1.i686.rpm

SHA-256: 693efc3ffbad422662ecb0661804e2f45fa062e70f2c7d07eb91f6aab9007b78

libwbclient-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 158c121d260e5d5a0e5f66716b1740f43253260361e0ced22f4913e3d49f0f94

libwbclient-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: fb91e12c7ee7f33770cc00a12cc38581ddbfe4f008c62cfe2fadfc5f66695b48

libwbclient-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 97bc8297c8ea23e0fa876d96febdb762e0091e8c734b752caf46512737f1450a

libwbclient-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 97bc8297c8ea23e0fa876d96febdb762e0091e8c734b752caf46512737f1450a

python3-samba-4.10.4-107.el8_1.i686.rpm

SHA-256: 5889b148d106aea8cec45855da8b747d98984250ef7881678b7489f745c8209a

python3-samba-4.10.4-107.el8_1.x86_64.rpm

SHA-256: d41c6a8a164188ebc9ca29018ef4c555187eaee141348306f1be6bb3aa3fabfd

python3-samba-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: d722e451cb8bb14f6266a7e4fdf7bc7c621eeb764572751361f2a846c72ccfd8

python3-samba-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: ffed58765f59a17de01923e69467ed37dfe0eef9ddc87b6ef2e63c4861c11825

python3-samba-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: ffed58765f59a17de01923e69467ed37dfe0eef9ddc87b6ef2e63c4861c11825

python3-samba-test-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 75b4ea306d6ab51ebb51af71c8a51963fe18e2eba75db4dead0ee0373a55866d

samba-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 7cb7aaebe3f848157d7bd043e1862218f4695b9fd9654dababd2219163c978e7

samba-client-4.10.4-107.el8_1.x86_64.rpm

SHA-256: a0d4fc99522eaabeb7bfea30f089706886723fd96c1d98c2fe3831613ec83226

samba-client-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: d019e2f278ead6a32510e1a6c3bf60f67eafd31ca5cc160a842a8448ad96242f

samba-client-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 4120c5de9460cbb39e7e43c9be4d27f216c854c5b860007f41afec2d3b8023f1

samba-client-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 4120c5de9460cbb39e7e43c9be4d27f216c854c5b860007f41afec2d3b8023f1

samba-client-libs-4.10.4-107.el8_1.i686.rpm

SHA-256: 5f3f3f4810fff9582d440a25b57133f287d791b7fd975c3293d2900520a53267

samba-client-libs-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 3e9ffd5dfd1dae3f1987d1f652164bf0796cf836705f0288500f19e493fddb09

samba-client-libs-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: ecea8bf228ae9da2fbdb153bc396c3c56b81c751d794ce78377b1afe94c15e28

samba-client-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: d76a63b73776312529cfbeb034f5dc5bda589bea162ea04587f18f76a48d1bfa

samba-client-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: d76a63b73776312529cfbeb034f5dc5bda589bea162ea04587f18f76a48d1bfa

samba-common-4.10.4-107.el8_1.noarch.rpm

SHA-256: 3f4c19f35902164d6a373fef4f991f967ff8d136bebbc7d821edf0f46c7bb2a0

samba-common-libs-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 831c47427c942f68932a8adc450accc4a02609ba04d0435b761ac1e2bcea471a

samba-common-libs-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: a9d1c9c85130cb54081a9b51bcc1735efae5e1fd666ffd5b448b94298f6b349d

samba-common-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: ef2bf8a1766d2356ee7615060937675ad175c136fabbcbe797fd79dcc15345cc

samba-common-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: ef2bf8a1766d2356ee7615060937675ad175c136fabbcbe797fd79dcc15345cc

samba-common-tools-4.10.4-107.el8_1.x86_64.rpm

SHA-256: b42d3b8aef0a9d7d9f35cf62314489ef44d1e60dd3becf49584fc84d3edb3a82

samba-common-tools-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: 64d2ffc0b1c890741d6658b005f1cc54b911a813a5fcaaff7a3b16534eca2e37

samba-common-tools-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: f0351667a106ccbdc4e8e2b27d896b84c724248c2eb0d432bf765893596efabf

samba-common-tools-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: f0351667a106ccbdc4e8e2b27d896b84c724248c2eb0d432bf765893596efabf

samba-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: 76d22faa58f6dbf512893cc51d7e5765f01b4633edd03309c33ddb0a86b98c20

samba-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 35eb4ab01b0667896ff0095cf174e66f77dc88f4a1e94db1e5f2ca823a063f45

samba-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 35eb4ab01b0667896ff0095cf174e66f77dc88f4a1e94db1e5f2ca823a063f45

samba-debugsource-4.10.4-107.el8_1.i686.rpm

SHA-256: 680e8d50964b0fd5de8dd524ec02d439659e9061eda30f2762867a33b4f2794f

samba-debugsource-4.10.4-107.el8_1.x86_64.rpm

SHA-256: a1e2f5c5d17d81bd1ba7c9917701806e3d30b5c9ca29cade75e739ee7413c8c2

samba-debugsource-4.10.4-107.el8_1.x86_64.rpm

SHA-256: a1e2f5c5d17d81bd1ba7c9917701806e3d30b5c9ca29cade75e739ee7413c8c2

samba-krb5-printing-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 28917f48cb160b10761eafb9a674c64b7bd2c635460cebdeabb9601c1ab71975

samba-krb5-printing-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: eedfa2c81804603237da3f6a281cebb8bbcc73b9828c3b9e38c14c332b18dc96

samba-krb5-printing-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: cc1e75f0a66265acb027b0cecbc8c975197f48a5c856fe720090595abfa8dd44

samba-krb5-printing-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: cc1e75f0a66265acb027b0cecbc8c975197f48a5c856fe720090595abfa8dd44

samba-libs-4.10.4-107.el8_1.i686.rpm

SHA-256: d998e51db430cbbaa9e1fd487df3514dfb3a70ccb26eeb2759f0d8a3eeb6eb10

samba-libs-4.10.4-107.el8_1.x86_64.rpm

SHA-256: a6d14ad6a3f413689d7887ca2ac2526319aabde0177f0c9f70b673ec6b444974

samba-libs-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: 008a2a6e97e144b9a91ce3cddc8e92e60e8349b47083cc4af60ca8d771680748

samba-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 5008674aa8bb9031e0a121aa489c2dcc32032ccef19643e69485e818ad158ca6

samba-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 5008674aa8bb9031e0a121aa489c2dcc32032ccef19643e69485e818ad158ca6

samba-pidl-4.10.4-107.el8_1.noarch.rpm

SHA-256: a2fbcfd3ad51e6f54e8f97cf91d47b80389226420150f9b8a8730c1795fb96e5

samba-test-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 14504527bb556489990ba9d098b3a83be2d904e59cff6532dfa1eb17bc98d4b8

samba-test-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: 257554afb2dd13f28eb04767bdd45e3e31b8ab58f9ccd5fef3b0d1fc51027d51

samba-test-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 9592ad053b47266a2f850289916fc0189a5bbed6e769f54914674c4dc7636d1f

samba-test-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 9592ad053b47266a2f850289916fc0189a5bbed6e769f54914674c4dc7636d1f

samba-test-libs-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 3f439da6cd8b0ce21bd6d1b245f8cce96a5dee0c3dd5210ac638fb9978afcec6

samba-test-libs-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: c3c17db8dae7761f90d05100501fd6231e977b4d0e2c805af042a96dfbe77784

samba-test-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: f1dbf134c8f4fd6e7b3ab122b7785539e7cf226df8df250231b2f4d2157983fd

samba-test-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: f1dbf134c8f4fd6e7b3ab122b7785539e7cf226df8df250231b2f4d2157983fd

samba-vfs-glusterfs-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: e3c0311a58ff1d76a182c67c21e37022581d153ceacb77fde3caccdbd7ef839f

samba-vfs-glusterfs-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: e3c0311a58ff1d76a182c67c21e37022581d153ceacb77fde3caccdbd7ef839f

samba-winbind-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 42d138c2254b9bf9161fc58da3d84533f1ca73e1e3d3d32ab9927f105305c1e5

samba-winbind-clients-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 8d6c7e2a5ca7669bd39bf1c520fcaecb13d4a2b6c8b74fb50ba92e394680823e

samba-winbind-clients-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: 2d52f2f30d08ace2f965ffa4123d426d12b863f06ee2a5ceb6fbc1655be8e5f7

samba-winbind-clients-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 9ddde1e534dfc15a0092c28f3c46cd56aca47e623bd37a63cec41e35a3f4d4ae

samba-winbind-clients-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 9ddde1e534dfc15a0092c28f3c46cd56aca47e623bd37a63cec41e35a3f4d4ae

samba-winbind-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: ad940daab7678b00ecc81821dc1428fd5988b97795963280e9d8801f9e636588

samba-winbind-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 47e76adc34495da9e3580c2587092a7303b591ff0fe9306eda509bc20c21bb9c

samba-winbind-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 47e76adc34495da9e3580c2587092a7303b591ff0fe9306eda509bc20c21bb9c

samba-winbind-krb5-locator-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 5d35c3680642b2bfa3ae67197d20ea3b2fe7bd0b4527189d7f1e6b82f69c5dea

samba-winbind-krb5-locator-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: 2c997af37db35dfafdda5ad6440734132d5133aeebc67dc2261fc61c51e554c3

samba-winbind-krb5-locator-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 9521719c30b5c9130211fe25c9718711ecf7843d086a6966b00406b683d87018

samba-winbind-krb5-locator-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 9521719c30b5c9130211fe25c9718711ecf7843d086a6966b00406b683d87018

samba-winbind-modules-4.10.4-107.el8_1.i686.rpm

SHA-256: 91c346445a89765beea971a639351e035f2a0cff2944207b8ff5ea4016feb61d

samba-winbind-modules-4.10.4-107.el8_1.x86_64.rpm

SHA-256: 431513815fbcbaa441769490e2492cd0caae82cc2e35908b33438ee546140aae

samba-winbind-modules-debuginfo-4.10.4-107.el8_1.i686.rpm

SHA-256: b37dd977a08e806bb3d454c46f3e7354840ef9ca544fbc23d23b8a0d85dd375d

samba-winbind-modules-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: a17d26d8ff71a11593f3cdbb7448be464e60cf7d90f1f13aec0a80b2130b5c71

samba-winbind-modules-debuginfo-4.10.4-107.el8_1.x86_64.rpm

SHA-256: a17d26d8ff71a11593f3cdbb7448be464e60cf7d90f1f13aec0a80b2130b5c71

Related news

Gentoo Linux Security Advisory 202309-06

Gentoo Linux Security Advisory 202309-6 - Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution. Versions greater than or equal to 4.18.4 are affected.

Red Hat Security Advisory 2023-3491-01

Red Hat Security Advisory 2023-3491-01 - An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Issues addressed include a use-after-free vulnerability.

CVE-2023-23694: DSA-2023-071: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities – 7.0.450

Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

Red Hat Security Advisory 2023-2137-01

Red Hat Security Advisory 2023-2137-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.

Red Hat Security Advisory 2023-1090-01

Red Hat Security Advisory 2023-1090-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.

RHSA-2023:1090: Red Hat Security Advisory: samba security update

An update for samba is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-38023: A flaw was found in samba. The Netlogon RPC implementations may use the rc4-hmac encryption algorithm, which is considered weak and should be avoided even if the client supports more modern encryption types. This issue could allow an attacker who knows the plain text content communicated between the samba client and server to craft data with the s...

Red Hat Security Advisory 2023-0838-01

Red Hat Security Advisory 2023-0838-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.

RHSA-2023:0838: Red Hat Security Advisory: samba security update

An update for samba is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-38023: A flaw was found in samba. The Netlogon RPC implementations may use the rc4-hmac encryption algorithm, which is considered weak and should be avoided even if the client supports more modern encryption types. This issue could allow an attacker who knows the plain text content communicated between the samba client and server to craft data with the s...

Red Hat Security Advisory 2023-0698-01

Red Hat Security Advisory 2023-0698-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.52.

RHSA-2023:0698: Red Hat Security Advisory: OpenShift Container Platform 4.10.52 security update

Red Hat OpenShift Container Platform release 4.10.52 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3064: A flaw was found in go-yaml. This issue causes the consumption of excessive amounts of CPU or memory when attempting to parse a large or maliciously crafted YAML document.

Red Hat Security Advisory 2023-0637-01

Red Hat Security Advisory 2023-0637-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.

Red Hat Security Advisory 2023-0638-01

Red Hat Security Advisory 2023-0638-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.

Red Hat Security Advisory 2023-0639-01

Red Hat Security Advisory 2023-0639-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.

RHSA-2023:0638: Red Hat Security Advisory: samba security update

An update for samba is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-38023: A flaw was found in samba. The Netlogon RPC implementations may use the rc4-hmac encryption algorithm, which is considered weak and should be avoided even if the client supports more modern e...

RHSA-2023:0637: Red Hat Security Advisory: samba security update

An update for samba is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-38023: A flaw was found in samba. The Netlogon RPC implementations may use the rc4-hmac encryption algorithm, which is considered weak and should be avoided even if the client supports more modern encryption types. This issue could allow an attacker who knows the plain text content communicated between the samba client and serve...

Ubuntu Security Notice USN-5822-2

Ubuntu Security Notice 5822-2 - USN-5822-1 fixed vulnerabilities in Samba. The update for Ubuntu 20.04 LTS introduced regressions in certain environments. Pending investigation of these regressions, this update temporarily reverts the security fixes. It was discovered that Samba incorrectly handled the bad password count logic. It was discovered that Samba supported weak RC4/HMAC-MD5 in NetLogon Secure Channel. Greg Hudson discovered that Samba incorrectly handled PAC parsing. Joseph Sutton discovered that Samba could be forced to issue rc4-hmac encrypted Kerberos tickets.

Ubuntu Security Notice USN-5822-1

Ubuntu Security Notice 5822-1 - It was discovered that Samba incorrectly handled the bad password count logic. A remote attacker could possibly use this issue to bypass bad passwords lockouts. This issue was only addressed in Ubuntu 22.10. Evgeny Legerov discovered that Samba incorrectly handled buffers in certain GSSAPI routines of Heimdal. A remote attacker could possibly use this issue to cause Samba to crash, resulting in a denial of service.

Samba Issues Security Updates to Patch Multiple High-Severity Vulnerabilities

Samba has released software updates to remediate multiple vulnerabilities that, if successfully exploited, could allow an attacker to take control of affected systems. The high-severity flaws, tracked as CVE-2022-38023, CVE-2022-37966, CVE-2022-37967, and CVE-2022-45141, have been patched in versions 4.17.4, 4.16.8 and 4.15.13 released on December 15, 2022. Samba is an open source Windows

Microsoft Patch Tuesday November 2022: Exchange ProxyNotShell RCE, JScript9, MoTW, OpenSSL, Edge, CNG, Print Spooler

Hello everyone! This episode will be about Microsoft Patch Tuesday for November 2022, including vulnerabilities that were added between October and November Patch Tuesdays. As usual, I use my open source Vulristics project to create the report. Alternative video link (for Russia): https://vk.com/video-149273431_456239107 The most important news of this Patch Tuesday was a release of patches […]

CVE-2022-38023

Netlogon RPC Elevation of Privilege Vulnerability.