Package "samba-common-bin"
| Name: |
samba-common-bin
|
Description: |
Samba common files used by both the server and the client
|
| Latest version: |
2:4.15.13+dfsg-0ubuntu1.10 |
| Release: |
jammy (22.04) |
| Level: |
security |
| Repository: |
main |
| Head package: |
samba |
| Homepage: |
http://www.samba.org |
Links
Download "samba-common-bin"
Other versions of "samba-common-bin" in Jammy
Changelog
|
samba (2:4.15.9+dfsg-0ubuntu0.2) jammy-security; urgency=medium
* Updated to 2.15.9 to fix multiple security issues.
- debian/control: require ldb 2.4.4.
- debian/*install: install libsmbconf.so*.
- debian/libwbclient0.symbols: updated symbols for new version.
- CVE-2022-2031, CVE-2022-32742, CVE-2022-32744, CVE-2022-32745,
CVE-2022-32746
* Removed patches included in new version:
- lp-1951490-fix-printing-KB5006743.patch
- add-support-for-bind-918.patch
- add-support-for-bind-918-2.patch
- lp1977491-dont-crash-on-vfs_fruit-resource-stream-01.patch
- lp1977491-dont-crash-on-vfs_fruit-resource-stream-02.patch
-- Marc Deslauriers <email address hidden> Thu, 28 Jul 2022 08:07:32 -0400
|
| CVE-2022-2031 |
Samba AD users can bypass certain restrictions associated with changing passwords |
| CVE-2022-32742 |
Server memory information leak via SMB1 |
| CVE-2022-32744 |
Samba AD users can forge password change requests for any user |
| CVE-2022-32745 |
Samba AD users can crash the server process with an LDAP add or modify request |
| CVE-2022-32746 |
Samba AD users can induce a use-after-free in the server process with an LDAP add or modify request |
|
About
-
Send Feedback to @ubuntu_updates