ALT-PU-2020-2444-1
Closed vulnerabilities
BDU:2021-01740
Уязвимость AD DC пакета программ сетевого взаимодействия Samba, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01741
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01765
Уязвимость LDAP-сервера пакета программ сетевого взаимодействия Samba, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01766
Уязвимость LDAP-сервера пакета программ сетевого взаимодействия Samba, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01768
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-10730
A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.
- openSUSE-SU-2020:0984
- openSUSE-SU-2020:1023
- openSUSE-SU-2020:1121
- openSUSE-SU-2020:1313
- https://bugzilla.redhat.com/show_bug.cgi?id=1849489%3B
- [debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update
- FEDORA-2020-5131d30947
- GLSA-202007-15
- DSA-4884
- https://www.samba.org/samba/security/CVE-2020-10730.html
- openSUSE-SU-2020:0984
- https://www.samba.org/samba/security/CVE-2020-10730.html
- DSA-4884
- GLSA-202007-15
- FEDORA-2020-5131d30947
- [debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update
- https://bugzilla.redhat.com/show_bug.cgi?id=1849489%3B
- openSUSE-SU-2020:1313
- openSUSE-SU-2020:1121
- openSUSE-SU-2020:1023
Modified: 2024-11-21
CVE-2020-10745
A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.
- openSUSE-SU-2020:0984
- openSUSE-SU-2020:1023
- openSUSE-SU-2020:1313
- https://bugzilla.redhat.com/show_bug.cgi?id=1849491%3B
- [debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update
- FEDORA-2020-5131d30947
- GLSA-202007-15
- https://www.samba.org/samba/security/CVE-2020-10745.html
- openSUSE-SU-2020:0984
- https://www.samba.org/samba/security/CVE-2020-10745.html
- GLSA-202007-15
- FEDORA-2020-5131d30947
- [debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update
- https://bugzilla.redhat.com/show_bug.cgi?id=1849491%3B
- openSUSE-SU-2020:1313
- openSUSE-SU-2020:1023
Modified: 2024-11-21
CVE-2020-10760
A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba.
- openSUSE-SU-2020:0984
- openSUSE-SU-2020:1023
- openSUSE-SU-2020:1313
- https://bugzilla.redhat.com/show_bug.cgi?id=1849509%3B
- [debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update
- FEDORA-2020-5131d30947
- GLSA-202007-15
- USN-4409-1
- https://www.samba.org/samba/security/CVE-2020-10760.html
- openSUSE-SU-2020:0984
- https://www.samba.org/samba/security/CVE-2020-10760.html
- USN-4409-1
- GLSA-202007-15
- FEDORA-2020-5131d30947
- [debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update
- https://bugzilla.redhat.com/show_bug.cgi?id=1849509%3B
- openSUSE-SU-2020:1313
- openSUSE-SU-2020:1023
Modified: 2024-11-21
CVE-2020-14303
A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash.
- openSUSE-SU-2020:0984
- openSUSE-SU-2020:0984
- openSUSE-SU-2020:1023
- openSUSE-SU-2020:1023
- openSUSE-SU-2020:1313
- openSUSE-SU-2020:1313
- https://bugzilla.redhat.com/show_bug.cgi?id=1851298%3B
- https://bugzilla.redhat.com/show_bug.cgi?id=1851298%3B
- [debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update
- [debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update
- FEDORA-2020-5131d30947
- FEDORA-2020-5131d30947
- GLSA-202007-15
- GLSA-202007-15
- https://security.netapp.com/advisory/ntap-20200709-0003/
- https://security.netapp.com/advisory/ntap-20200709-0003/
- USN-4454-1
- USN-4454-1
- USN-4454-2
- USN-4454-2
- https://www.samba.org/samba/security/CVE-2020-14303.html
- https://www.samba.org/samba/security/CVE-2020-14303.html
Closed bugs
Исправить зависимость на glusterfs