ALT-BU-2018-3466-1
Branch p8 update bulletin.
Closed vulnerabilities
BDU:2019-01639
Уязвимость программного обеспечения Samba, связанная c переполнением буфера динамической памяти, позволяющая нарушителю выполнить произвольный код
BDU:2020-00691
Уязвимость пакета программ для сетевого взаимодействия Samba, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00692
Уязвимость компонента Active Directory LDAP-сервера программ сетевого взаимодействия Samba, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2020-00693
Уязвимость компонента аутентификации NTLMv1 программ сетевого взаимодействия Samba, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2018-10858
A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
- 105085
- 105085
- 1042002
- 1042002
- RHSA-2018:2612
- RHSA-2018:2612
- RHSA-2018:2613
- RHSA-2018:2613
- RHSA-2018:3056
- RHSA-2018:3056
- RHSA-2018:3470
- RHSA-2018:3470
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- DSA-4271
- DSA-4271
- https://www.samba.org/samba/security/CVE-2018-10858.html
- https://www.samba.org/samba/security/CVE-2018-10858.html
Modified: 2024-11-21
CVE-2018-10918
A null pointer dereference flaw was found in the way samba checked database outputs from the LDB database layer. An authenticated attacker could use this flaw to crash a samba server in an Active Directory Domain Controller configuration. Samba versions before 4.7.9 and 4.8.4 are vulnerable.
- 105083
- 105083
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- https://www.samba.org/samba/security/CVE-2018-10918.html
- https://www.samba.org/samba/security/CVE-2018-10918.html
Modified: 2024-11-21
CVE-2018-10919
The Samba Active Directory LDAP server was vulnerable to an information disclosure flaw because of missing access control checks. An authenticated attacker could use this flaw to extract confidential attribute values using LDAP search expressions. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
- 105081
- 105081
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- DSA-4271
- DSA-4271
- https://www.samba.org/samba/security/CVE-2018-10919.html
- https://www.samba.org/samba/security/CVE-2018-10919.html
Modified: 2024-11-21
CVE-2018-1139
A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.
- 105084
- 105084
- RHSA-2018:2612
- RHSA-2018:2612
- RHSA-2018:2613
- RHSA-2018:2613
- RHSA-2018:3056
- RHSA-2018:3056
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- https://www.samba.org/samba/security/CVE-2018-1139.html
- https://www.samba.org/samba/security/CVE-2018-1139.html
Closed vulnerabilities
BDU:2019-01639
Уязвимость программного обеспечения Samba, связанная c переполнением буфера динамической памяти, позволяющая нарушителю выполнить произвольный код
BDU:2020-00691
Уязвимость пакета программ для сетевого взаимодействия Samba, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00692
Уязвимость компонента Active Directory LDAP-сервера программ сетевого взаимодействия Samba, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2020-00693
Уязвимость компонента аутентификации NTLMv1 программ сетевого взаимодействия Samba, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2018-10858
A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
- 105085
- 105085
- 1042002
- 1042002
- RHSA-2018:2612
- RHSA-2018:2612
- RHSA-2018:2613
- RHSA-2018:2613
- RHSA-2018:3056
- RHSA-2018:3056
- RHSA-2018:3470
- RHSA-2018:3470
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- DSA-4271
- DSA-4271
- https://www.samba.org/samba/security/CVE-2018-10858.html
- https://www.samba.org/samba/security/CVE-2018-10858.html
Modified: 2024-11-21
CVE-2018-10918
A null pointer dereference flaw was found in the way samba checked database outputs from the LDB database layer. An authenticated attacker could use this flaw to crash a samba server in an Active Directory Domain Controller configuration. Samba versions before 4.7.9 and 4.8.4 are vulnerable.
- 105083
- 105083
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- https://www.samba.org/samba/security/CVE-2018-10918.html
- https://www.samba.org/samba/security/CVE-2018-10918.html
Modified: 2024-11-21
CVE-2018-10919
The Samba Active Directory LDAP server was vulnerable to an information disclosure flaw because of missing access control checks. An authenticated attacker could use this flaw to extract confidential attribute values using LDAP search expressions. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
- 105081
- 105081
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- DSA-4271
- DSA-4271
- https://www.samba.org/samba/security/CVE-2018-10919.html
- https://www.samba.org/samba/security/CVE-2018-10919.html
Modified: 2024-11-21
CVE-2018-1139
A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.
- 105084
- 105084
- RHSA-2018:2612
- RHSA-2018:2612
- RHSA-2018:2613
- RHSA-2018:2613
- RHSA-2018:3056
- RHSA-2018:3056
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- https://www.samba.org/samba/security/CVE-2018-1139.html
- https://www.samba.org/samba/security/CVE-2018-1139.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-10852
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.
- 104547
- 104547
- RHSA-2018:3158
- RHSA-2018:3158
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10852
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10852
- [debian-lts-announce] 20180716 [SECURITY] [DLA 1429-1] sssd security update
- [debian-lts-announce] 20180716 [SECURITY] [DLA 1429-1] sssd security update
Package cinnamon-control-center updated to version 3.4.0-alt1.M80P.1 for branch p8 in task 212977.
Closed bugs
Неисправный значок запуска "Регион и язык"