Headline
RHSA-2023:0639: Red Hat Security Advisory: samba security update
An update for samba is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-38023: A flaw was found in samba. The Netlogon RPC implementations may use the rc4-hmac encryption algorithm, which is considered weak and should be avoided even if the client supports more modern encryption types. This issue could allow an attacker who knows the plain text content communicated between the samba client and server to craft data with the same MD5 calculation and replace it without being detected.
Synopsis
Important: samba security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for samba is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
- samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the smb service will be restarted automatically.
Affected Products
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64
Fixes
- BZ - 2154362 - CVE-2022-38023 samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1
SRPM
samba-4.10.4-107.el8_1.src.rpm
SHA-256: 6a950c6b9c7dd3c47a27bab043e378e9c3c2de255eb83b8ab991ded28f244329
ppc64le
ctdb-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 289bd3b0ee002813d87906c1ef0dfcafb2ccb4706d4bb13b5a93b69c940fb7cf
ctdb-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 49121d971b3c3e087b78467deded1beadd8c5797b4f33e6d626fb3265040124e
ctdb-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 49121d971b3c3e087b78467deded1beadd8c5797b4f33e6d626fb3265040124e
ctdb-tests-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: c494ff9380441baecd740f74cda9d81422265615ec7797f37c101686096effd9
ctdb-tests-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 0995bdfc39cf79cd570d38bc6d3c7dce0862721c773be2c78f434a34a293559f
ctdb-tests-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 0995bdfc39cf79cd570d38bc6d3c7dce0862721c773be2c78f434a34a293559f
libsmbclient-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: e087b7cd018217445287667e4fccab59a36ed6b142971304a1dcf269152e2f17
libsmbclient-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 8822c609b3e6429128b456392a5d4d2b5dd42b3de9f69dc94e5a76a593a5057d
libsmbclient-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 8822c609b3e6429128b456392a5d4d2b5dd42b3de9f69dc94e5a76a593a5057d
libwbclient-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: ac7835b6924d777e5717660c3e4a1a3a526280c3ef39910957e93ec20bb48abf
libwbclient-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 4adb976a2708ebecc4f3ecc8eefb9a444c00d8b2d1d02c736a0fc3e2d0ac78d2
libwbclient-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 4adb976a2708ebecc4f3ecc8eefb9a444c00d8b2d1d02c736a0fc3e2d0ac78d2
python3-samba-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: c7acccd1b2f27db2284149a9ef660bc66312fde683193f37cb51609dc3ff6e8a
python3-samba-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 04276567e5722c2c37ad8414c046018a291791b7acfae448508b9c423419d319
python3-samba-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 04276567e5722c2c37ad8414c046018a291791b7acfae448508b9c423419d319
python3-samba-test-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 74467094be43963e939018035e2c48e444d1b25a237362e5e187a91b812d6e7d
samba-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: be76e1687aa9188b0bfe53960e9ca8ae36bb741d3eb456a86dd09e370e3d3845
samba-client-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 40c862a87638e90d0f3f4ed259d4fa99f4bcf4dd89a1a5b82e09bef61d4f86cc
samba-client-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 992f5a17d70363297a8c13b02ab55bff47a910357566876a3ef0c842a31ce43d
samba-client-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 992f5a17d70363297a8c13b02ab55bff47a910357566876a3ef0c842a31ce43d
samba-client-libs-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 9db48baa132ee592b6619f1710c374e8a0c643343202a7f0c04181fcba5035b2
samba-client-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: a952b556115ba7128daac44c14812cc2eff7a8499fae7896c8e291e90db5f6b9
samba-client-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: a952b556115ba7128daac44c14812cc2eff7a8499fae7896c8e291e90db5f6b9
samba-common-4.10.4-107.el8_1.noarch.rpm
SHA-256: 3f4c19f35902164d6a373fef4f991f967ff8d136bebbc7d821edf0f46c7bb2a0
samba-common-libs-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: a219814210535f09adc546f172be2f9e737a8f379a720c1a0491e4f228daed76
samba-common-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 72349373bc42ea2f6b9dc27ffc7b13f1f484a936d4d77c3a221b03c3ecce54d2
samba-common-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 72349373bc42ea2f6b9dc27ffc7b13f1f484a936d4d77c3a221b03c3ecce54d2
samba-common-tools-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 2e254a231d4476a813202258cb3cca1b239ae7b92daeb1dcc287323e86e8f295
samba-common-tools-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 49c39b1a2980d2a8749fb0659064112a04c23935075943d05c03b31d7b32c0f3
samba-common-tools-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 49c39b1a2980d2a8749fb0659064112a04c23935075943d05c03b31d7b32c0f3
samba-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 700692cbeb77b4c6a680dfef5c311cf2c28dc6b9fdf0a3314be12b70ff5e0c54
samba-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 700692cbeb77b4c6a680dfef5c311cf2c28dc6b9fdf0a3314be12b70ff5e0c54
samba-debugsource-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 81803d3ea6e0b7a1631791d4487d13bb6d4b0a21cca2016b80db467b4f6e7325
samba-debugsource-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 81803d3ea6e0b7a1631791d4487d13bb6d4b0a21cca2016b80db467b4f6e7325
samba-krb5-printing-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: ee4963c74aab4bf4c834f609e4fea750be86ed756c4b7f23c98a34d7ab95c743
samba-krb5-printing-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 81d627e3fbd0730de27ec2b6d8c6d6fd8089646825df08c7717b1c35edb813c8
samba-krb5-printing-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 81d627e3fbd0730de27ec2b6d8c6d6fd8089646825df08c7717b1c35edb813c8
samba-libs-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 10ad64a5254794b9f40ccc908feb462f9677d3c8ec578c5346d18f405e4d8646
samba-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 36f35ddcf5872ea3ac91922a32aac962e1fcb77b5b559c5ae62514aa47807444
samba-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 36f35ddcf5872ea3ac91922a32aac962e1fcb77b5b559c5ae62514aa47807444
samba-pidl-4.10.4-107.el8_1.noarch.rpm
SHA-256: a2fbcfd3ad51e6f54e8f97cf91d47b80389226420150f9b8a8730c1795fb96e5
samba-test-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: dcaa6b231629a152b7c0d359834304f8bac0c42ced73dfbb846f4de6de1e120e
samba-test-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: bb018cef501d52cbcc62f138804117edf9fa639381cde9adfa7ab755bac6312e
samba-test-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: bb018cef501d52cbcc62f138804117edf9fa639381cde9adfa7ab755bac6312e
samba-test-libs-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 5a2cd78f7ba5dce5cfc9fd7fcd364716682410b7255e82d7e670da4040d72953
samba-test-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 68a84bb5be39d5dbb51521e287148516498b5ceb2091d8ebc2366fd559bceb07
samba-test-libs-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 68a84bb5be39d5dbb51521e287148516498b5ceb2091d8ebc2366fd559bceb07
samba-winbind-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 169150a7699e469562a087abc20850285922aa2ce2f15428ccf62fc9821aaf75
samba-winbind-clients-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 260eccbd673af88192ac8ffc9c49fc39dc254c6daa1915d916c7c9191ef47d98
samba-winbind-clients-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 929a1debe29dfa7250ecbb85d3d5e77401d6ffbf2918ebc36a6090f6e2ee6e79
samba-winbind-clients-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 929a1debe29dfa7250ecbb85d3d5e77401d6ffbf2918ebc36a6090f6e2ee6e79
samba-winbind-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 7297ef9f8d850b0bcd471602ddc34d3899c6f84bbce781ab44ef4e8ccecd9b44
samba-winbind-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 7297ef9f8d850b0bcd471602ddc34d3899c6f84bbce781ab44ef4e8ccecd9b44
samba-winbind-krb5-locator-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: 98530b7aa06cbae59d5d866e076bea861f30904ab0a67224f9d690ad41cd50d8
samba-winbind-krb5-locator-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: d0a70aacf28fcfe544ebfea827d74df7cc010825f858b89e5edc54a1573ea9b8
samba-winbind-krb5-locator-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: d0a70aacf28fcfe544ebfea827d74df7cc010825f858b89e5edc54a1573ea9b8
samba-winbind-modules-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: fd65472248ee57da970e049f50bbf2577448ecd1e1823add699756abfcd2fa0f
samba-winbind-modules-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: d85b0dcd8ff4aa50cb339e3b1ec809ca764300605fd707531edf3769281a5296
samba-winbind-modules-debuginfo-4.10.4-107.el8_1.ppc64le.rpm
SHA-256: d85b0dcd8ff4aa50cb339e3b1ec809ca764300605fd707531edf3769281a5296
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1
SRPM
samba-4.10.4-107.el8_1.src.rpm
SHA-256: 6a950c6b9c7dd3c47a27bab043e378e9c3c2de255eb83b8ab991ded28f244329
x86_64
ctdb-4.10.4-107.el8_1.x86_64.rpm
SHA-256: c5bcf1381adf3051f56e58917c8efe0ccbaafb4df3fbb8eb2d613c84943f5ea9
ctdb-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: bfe0675a09506690c60c3c94eeb6d9365def65dc36d4f1fcae5d12a93f23a95a
ctdb-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 2ca1feb59abaa92615115a953c34866af28c48749b2d379f196a6c9dd7908ce8
ctdb-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 2ca1feb59abaa92615115a953c34866af28c48749b2d379f196a6c9dd7908ce8
ctdb-tests-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 6345265f7874be91f8474e66d96aa078c5fd11120cb323da738ef390c0f10dc2
ctdb-tests-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: 7904933d47c1358a0efa3097ec95d159cc9a579c93f2a80016e3f3c6d3288f0e
ctdb-tests-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 4146681781d6e736c45de163b6ef77c4d6b396b515303c7bc7f6cea67294195a
ctdb-tests-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 4146681781d6e736c45de163b6ef77c4d6b396b515303c7bc7f6cea67294195a
libsmbclient-4.10.4-107.el8_1.i686.rpm
SHA-256: a3ee035e7a7fb2cb5d017d31433ee81d649adada80c682190f52c37c392ba30f
libsmbclient-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 40e2b8769073961f0988b987391b700c69b9953e8f7bb5defbdcf30f3a97aada
libsmbclient-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: 4bf1fa1c8afa219676be9de2196e4c395e607e1d41ee14f1540c75bab7f698d2
libsmbclient-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: bdae2768a23b7085eb386b5f988f5297ba7f3f5bf1439ca5d7fa75e75dd30208
libsmbclient-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: bdae2768a23b7085eb386b5f988f5297ba7f3f5bf1439ca5d7fa75e75dd30208
libwbclient-4.10.4-107.el8_1.i686.rpm
SHA-256: 693efc3ffbad422662ecb0661804e2f45fa062e70f2c7d07eb91f6aab9007b78
libwbclient-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 158c121d260e5d5a0e5f66716b1740f43253260361e0ced22f4913e3d49f0f94
libwbclient-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: fb91e12c7ee7f33770cc00a12cc38581ddbfe4f008c62cfe2fadfc5f66695b48
libwbclient-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 97bc8297c8ea23e0fa876d96febdb762e0091e8c734b752caf46512737f1450a
libwbclient-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 97bc8297c8ea23e0fa876d96febdb762e0091e8c734b752caf46512737f1450a
python3-samba-4.10.4-107.el8_1.i686.rpm
SHA-256: 5889b148d106aea8cec45855da8b747d98984250ef7881678b7489f745c8209a
python3-samba-4.10.4-107.el8_1.x86_64.rpm
SHA-256: d41c6a8a164188ebc9ca29018ef4c555187eaee141348306f1be6bb3aa3fabfd
python3-samba-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: d722e451cb8bb14f6266a7e4fdf7bc7c621eeb764572751361f2a846c72ccfd8
python3-samba-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: ffed58765f59a17de01923e69467ed37dfe0eef9ddc87b6ef2e63c4861c11825
python3-samba-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: ffed58765f59a17de01923e69467ed37dfe0eef9ddc87b6ef2e63c4861c11825
python3-samba-test-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 75b4ea306d6ab51ebb51af71c8a51963fe18e2eba75db4dead0ee0373a55866d
samba-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 7cb7aaebe3f848157d7bd043e1862218f4695b9fd9654dababd2219163c978e7
samba-client-4.10.4-107.el8_1.x86_64.rpm
SHA-256: a0d4fc99522eaabeb7bfea30f089706886723fd96c1d98c2fe3831613ec83226
samba-client-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: d019e2f278ead6a32510e1a6c3bf60f67eafd31ca5cc160a842a8448ad96242f
samba-client-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 4120c5de9460cbb39e7e43c9be4d27f216c854c5b860007f41afec2d3b8023f1
samba-client-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 4120c5de9460cbb39e7e43c9be4d27f216c854c5b860007f41afec2d3b8023f1
samba-client-libs-4.10.4-107.el8_1.i686.rpm
SHA-256: 5f3f3f4810fff9582d440a25b57133f287d791b7fd975c3293d2900520a53267
samba-client-libs-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 3e9ffd5dfd1dae3f1987d1f652164bf0796cf836705f0288500f19e493fddb09
samba-client-libs-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: ecea8bf228ae9da2fbdb153bc396c3c56b81c751d794ce78377b1afe94c15e28
samba-client-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: d76a63b73776312529cfbeb034f5dc5bda589bea162ea04587f18f76a48d1bfa
samba-client-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: d76a63b73776312529cfbeb034f5dc5bda589bea162ea04587f18f76a48d1bfa
samba-common-4.10.4-107.el8_1.noarch.rpm
SHA-256: 3f4c19f35902164d6a373fef4f991f967ff8d136bebbc7d821edf0f46c7bb2a0
samba-common-libs-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 831c47427c942f68932a8adc450accc4a02609ba04d0435b761ac1e2bcea471a
samba-common-libs-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: a9d1c9c85130cb54081a9b51bcc1735efae5e1fd666ffd5b448b94298f6b349d
samba-common-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: ef2bf8a1766d2356ee7615060937675ad175c136fabbcbe797fd79dcc15345cc
samba-common-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: ef2bf8a1766d2356ee7615060937675ad175c136fabbcbe797fd79dcc15345cc
samba-common-tools-4.10.4-107.el8_1.x86_64.rpm
SHA-256: b42d3b8aef0a9d7d9f35cf62314489ef44d1e60dd3becf49584fc84d3edb3a82
samba-common-tools-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: 64d2ffc0b1c890741d6658b005f1cc54b911a813a5fcaaff7a3b16534eca2e37
samba-common-tools-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: f0351667a106ccbdc4e8e2b27d896b84c724248c2eb0d432bf765893596efabf
samba-common-tools-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: f0351667a106ccbdc4e8e2b27d896b84c724248c2eb0d432bf765893596efabf
samba-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: 76d22faa58f6dbf512893cc51d7e5765f01b4633edd03309c33ddb0a86b98c20
samba-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 35eb4ab01b0667896ff0095cf174e66f77dc88f4a1e94db1e5f2ca823a063f45
samba-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 35eb4ab01b0667896ff0095cf174e66f77dc88f4a1e94db1e5f2ca823a063f45
samba-debugsource-4.10.4-107.el8_1.i686.rpm
SHA-256: 680e8d50964b0fd5de8dd524ec02d439659e9061eda30f2762867a33b4f2794f
samba-debugsource-4.10.4-107.el8_1.x86_64.rpm
SHA-256: a1e2f5c5d17d81bd1ba7c9917701806e3d30b5c9ca29cade75e739ee7413c8c2
samba-debugsource-4.10.4-107.el8_1.x86_64.rpm
SHA-256: a1e2f5c5d17d81bd1ba7c9917701806e3d30b5c9ca29cade75e739ee7413c8c2
samba-krb5-printing-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 28917f48cb160b10761eafb9a674c64b7bd2c635460cebdeabb9601c1ab71975
samba-krb5-printing-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: eedfa2c81804603237da3f6a281cebb8bbcc73b9828c3b9e38c14c332b18dc96
samba-krb5-printing-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: cc1e75f0a66265acb027b0cecbc8c975197f48a5c856fe720090595abfa8dd44
samba-krb5-printing-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: cc1e75f0a66265acb027b0cecbc8c975197f48a5c856fe720090595abfa8dd44
samba-libs-4.10.4-107.el8_1.i686.rpm
SHA-256: d998e51db430cbbaa9e1fd487df3514dfb3a70ccb26eeb2759f0d8a3eeb6eb10
samba-libs-4.10.4-107.el8_1.x86_64.rpm
SHA-256: a6d14ad6a3f413689d7887ca2ac2526319aabde0177f0c9f70b673ec6b444974
samba-libs-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: 008a2a6e97e144b9a91ce3cddc8e92e60e8349b47083cc4af60ca8d771680748
samba-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 5008674aa8bb9031e0a121aa489c2dcc32032ccef19643e69485e818ad158ca6
samba-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 5008674aa8bb9031e0a121aa489c2dcc32032ccef19643e69485e818ad158ca6
samba-pidl-4.10.4-107.el8_1.noarch.rpm
SHA-256: a2fbcfd3ad51e6f54e8f97cf91d47b80389226420150f9b8a8730c1795fb96e5
samba-test-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 14504527bb556489990ba9d098b3a83be2d904e59cff6532dfa1eb17bc98d4b8
samba-test-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: 257554afb2dd13f28eb04767bdd45e3e31b8ab58f9ccd5fef3b0d1fc51027d51
samba-test-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 9592ad053b47266a2f850289916fc0189a5bbed6e769f54914674c4dc7636d1f
samba-test-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 9592ad053b47266a2f850289916fc0189a5bbed6e769f54914674c4dc7636d1f
samba-test-libs-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 3f439da6cd8b0ce21bd6d1b245f8cce96a5dee0c3dd5210ac638fb9978afcec6
samba-test-libs-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: c3c17db8dae7761f90d05100501fd6231e977b4d0e2c805af042a96dfbe77784
samba-test-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: f1dbf134c8f4fd6e7b3ab122b7785539e7cf226df8df250231b2f4d2157983fd
samba-test-libs-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: f1dbf134c8f4fd6e7b3ab122b7785539e7cf226df8df250231b2f4d2157983fd
samba-vfs-glusterfs-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: e3c0311a58ff1d76a182c67c21e37022581d153ceacb77fde3caccdbd7ef839f
samba-vfs-glusterfs-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: e3c0311a58ff1d76a182c67c21e37022581d153ceacb77fde3caccdbd7ef839f
samba-winbind-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 42d138c2254b9bf9161fc58da3d84533f1ca73e1e3d3d32ab9927f105305c1e5
samba-winbind-clients-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 8d6c7e2a5ca7669bd39bf1c520fcaecb13d4a2b6c8b74fb50ba92e394680823e
samba-winbind-clients-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: 2d52f2f30d08ace2f965ffa4123d426d12b863f06ee2a5ceb6fbc1655be8e5f7
samba-winbind-clients-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 9ddde1e534dfc15a0092c28f3c46cd56aca47e623bd37a63cec41e35a3f4d4ae
samba-winbind-clients-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 9ddde1e534dfc15a0092c28f3c46cd56aca47e623bd37a63cec41e35a3f4d4ae
samba-winbind-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: ad940daab7678b00ecc81821dc1428fd5988b97795963280e9d8801f9e636588
samba-winbind-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 47e76adc34495da9e3580c2587092a7303b591ff0fe9306eda509bc20c21bb9c
samba-winbind-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 47e76adc34495da9e3580c2587092a7303b591ff0fe9306eda509bc20c21bb9c
samba-winbind-krb5-locator-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 5d35c3680642b2bfa3ae67197d20ea3b2fe7bd0b4527189d7f1e6b82f69c5dea
samba-winbind-krb5-locator-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: 2c997af37db35dfafdda5ad6440734132d5133aeebc67dc2261fc61c51e554c3
samba-winbind-krb5-locator-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 9521719c30b5c9130211fe25c9718711ecf7843d086a6966b00406b683d87018
samba-winbind-krb5-locator-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 9521719c30b5c9130211fe25c9718711ecf7843d086a6966b00406b683d87018
samba-winbind-modules-4.10.4-107.el8_1.i686.rpm
SHA-256: 91c346445a89765beea971a639351e035f2a0cff2944207b8ff5ea4016feb61d
samba-winbind-modules-4.10.4-107.el8_1.x86_64.rpm
SHA-256: 431513815fbcbaa441769490e2492cd0caae82cc2e35908b33438ee546140aae
samba-winbind-modules-debuginfo-4.10.4-107.el8_1.i686.rpm
SHA-256: b37dd977a08e806bb3d454c46f3e7354840ef9ca544fbc23d23b8a0d85dd375d
samba-winbind-modules-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: a17d26d8ff71a11593f3cdbb7448be464e60cf7d90f1f13aec0a80b2130b5c71
samba-winbind-modules-debuginfo-4.10.4-107.el8_1.x86_64.rpm
SHA-256: a17d26d8ff71a11593f3cdbb7448be464e60cf7d90f1f13aec0a80b2130b5c71
Related news
Gentoo Linux Security Advisory 202309-6 - Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution. Versions greater than or equal to 4.18.4 are affected.
Red Hat Security Advisory 2023-3491-01 - An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Issues addressed include a use-after-free vulnerability.
Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...
Red Hat Security Advisory 2023-2137-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.
Red Hat Security Advisory 2023-1090-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.
An update for samba is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-38023: A flaw was found in samba. The Netlogon RPC implementations may use the rc4-hmac encryption algorithm, which is considered weak and should be avoided even if the client supports more modern encryption types. This issue could allow an attacker who knows the plain text content communicated between the samba client and server to craft data with the s...
Red Hat Security Advisory 2023-0838-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.
An update for samba is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-38023: A flaw was found in samba. The Netlogon RPC implementations may use the rc4-hmac encryption algorithm, which is considered weak and should be avoided even if the client supports more modern encryption types. This issue could allow an attacker who knows the plain text content communicated between the samba client and server to craft data with the s...
Red Hat Security Advisory 2023-0698-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.52.
Red Hat OpenShift Container Platform release 4.10.52 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3064: A flaw was found in go-yaml. This issue causes the consumption of excessive amounts of CPU or memory when attempting to parse a large or maliciously crafted YAML document.
Red Hat Security Advisory 2023-0637-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.
Red Hat Security Advisory 2023-0638-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.
Red Hat Security Advisory 2023-0639-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.
An update for samba is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-38023: A flaw was found in samba. The Netlogon RPC implementations may use the rc4-hmac encryption algorithm, which is considered weak and should be avoided even if the client supports more modern e...
An update for samba is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-38023: A flaw was found in samba. The Netlogon RPC implementations may use the rc4-hmac encryption algorithm, which is considered weak and should be avoided even if the client supports more modern encryption types. This issue could allow an attacker who knows the plain text content communicated between the samba client and serve...
Ubuntu Security Notice 5822-2 - USN-5822-1 fixed vulnerabilities in Samba. The update for Ubuntu 20.04 LTS introduced regressions in certain environments. Pending investigation of these regressions, this update temporarily reverts the security fixes. It was discovered that Samba incorrectly handled the bad password count logic. It was discovered that Samba supported weak RC4/HMAC-MD5 in NetLogon Secure Channel. Greg Hudson discovered that Samba incorrectly handled PAC parsing. Joseph Sutton discovered that Samba could be forced to issue rc4-hmac encrypted Kerberos tickets.
Ubuntu Security Notice 5822-1 - It was discovered that Samba incorrectly handled the bad password count logic. A remote attacker could possibly use this issue to bypass bad passwords lockouts. This issue was only addressed in Ubuntu 22.10. Evgeny Legerov discovered that Samba incorrectly handled buffers in certain GSSAPI routines of Heimdal. A remote attacker could possibly use this issue to cause Samba to crash, resulting in a denial of service.
Samba has released software updates to remediate multiple vulnerabilities that, if successfully exploited, could allow an attacker to take control of affected systems. The high-severity flaws, tracked as CVE-2022-38023, CVE-2022-37966, CVE-2022-37967, and CVE-2022-45141, have been patched in versions 4.17.4, 4.16.8 and 4.15.13 released on December 15, 2022. Samba is an open source Windows
Hello everyone! This episode will be about Microsoft Patch Tuesday for November 2022, including vulnerabilities that were added between October and November Patch Tuesdays. As usual, I use my open source Vulristics project to create the report. Alternative video link (for Russia): https://vk.com/video-149273431_456239107 The most important news of this Patch Tuesday was a release of patches […]