ALT-PU-2021-1580-1
Closed vulnerabilities
BDU:2021-02099
Уязвимость программного обеспечения Samba, связанная со считыванием данных за пределами заданного буфера, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2022-05695
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с непроверенным состоянием ошибки, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05767
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05769
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с некорректным присваиванием привилегий, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2023-00716
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2020-14318
A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.
- https://bugzilla.redhat.com/show_bug.cgi?id=1892631
- https://bugzilla.redhat.com/show_bug.cgi?id=1892631
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- GLSA-202012-24
- GLSA-202012-24
- https://www.samba.org/samba/security/CVE-2020-14318.html
- https://www.samba.org/samba/security/CVE-2020-14318.html
Modified: 2024-11-21
CVE-2020-14323
A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.
- openSUSE-SU-2020:1811
- openSUSE-SU-2020:1811
- openSUSE-SU-2020:1819
- openSUSE-SU-2020:1819
- https://bugzilla.redhat.com/show_bug.cgi?id=1891685
- https://bugzilla.redhat.com/show_bug.cgi?id=1891685
- [debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update
- [debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- FEDORA-2020-c1e9ae02d2
- FEDORA-2020-c1e9ae02d2
- FEDORA-2020-2e1a1489be
- FEDORA-2020-2e1a1489be
- GLSA-202012-24
- GLSA-202012-24
- https://security.netapp.com/advisory/ntap-20201103-0001/
- https://security.netapp.com/advisory/ntap-20201103-0001/
- https://www.samba.org/samba/security/CVE-2020-14323.html
- https://www.samba.org/samba/security/CVE-2020-14323.html
Modified: 2024-11-21
CVE-2020-14383
A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
- https://bugzilla.redhat.com/show_bug.cgi?id=1892636
- https://bugzilla.redhat.com/show_bug.cgi?id=1892636
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- GLSA-202012-24
- GLSA-202012-24
- https://www.samba.org/samba/security/CVE-2020-14383.html
- https://www.samba.org/samba/security/CVE-2020-14383.html
Modified: 2024-11-21
CVE-2020-27840
A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1941400
- https://bugzilla.redhat.com/show_bug.cgi?id=1941400
- [debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update
- [debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update
- FEDORA-2021-c93a3a5d3f
- FEDORA-2021-c93a3a5d3f
- FEDORA-2021-c2d8628d33
- FEDORA-2021-c2d8628d33
- FEDORA-2021-1a8e93a285
- FEDORA-2021-1a8e93a285
- GLSA-202105-22
- GLSA-202105-22
- https://security.netapp.com/advisory/ntap-20210326-0007/
- https://security.netapp.com/advisory/ntap-20210326-0007/
- DSA-4884
- DSA-4884
- https://www.samba.org/samba/security/CVE-2020-27840.html
- https://www.samba.org/samba/security/CVE-2020-27840.html
Modified: 2024-11-21
CVE-2021-20251
A flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met.
- https://bugzilla.redhat.com/show_bug.cgi?id=1929800
- https://bugzilla.redhat.com/show_bug.cgi?id=1929800
- https://bugzilla.samba.org/show_bug.cgi?id=14611
- https://bugzilla.samba.org/show_bug.cgi?id=14611
- GLSA-202309-06
- GLSA-202309-06
- https://security.netapp.com/advisory/ntap-20230331-0005/
- https://security.netapp.com/advisory/ntap-20230331-0005/
Modified: 2024-11-21
CVE-2021-20277
A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1941402
- https://bugzilla.redhat.com/show_bug.cgi?id=1941402
- [debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update
- [debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update
- FEDORA-2021-c93a3a5d3f
- FEDORA-2021-c93a3a5d3f
- FEDORA-2021-c2d8628d33
- FEDORA-2021-c2d8628d33
- FEDORA-2021-1a8e93a285
- FEDORA-2021-1a8e93a285
- GLSA-202105-22
- GLSA-202105-22
- https://security.netapp.com/advisory/ntap-20210326-0007/
- https://security.netapp.com/advisory/ntap-20210326-0007/
- DSA-4884
- DSA-4884
- https://www.samba.org/samba/security/CVE-2021-20277.html
- https://www.samba.org/samba/security/CVE-2021-20277.html
Closed bugs
Файловые конфликты с пакетом gnustep-gworkspace