Solution
Please Install the Updated Packages.
Insight
This update of samba fixed the following issues:
- The pam_winbind require_membership_of option allows for a list of SID, but currently only provides buffer space for ~20 (bnc#806501).
- Samba 3.0.x to 4.0.7 are affected by a denial of service attack on authenticated or guest connections
CVE-2013-4124 (bnc#829969).
- PIDL: fix parsing linemarkers in preprocessor output (bso#9636).
- build:autoconf: fix output of syslog-facility check (bso#9983).
- libreplace: add a missing 'eval' to the
AC_VERIFY_C_PROTOTYPE macro.
- Remove ldapsmb from the main spec file.
- Don't bzip2 the main tar ball, use the upstream gziped one instead.
- Fix crash bug during Win8 sync (bso#9822).
- Check for system libtevent and link dbwrap_tool and dbwrap_torture against it (bso#9881).
- errno gets overwritten in call to check_parent_exists() (bso#9927).
- Fix a bug of drvupgrade of smbcontrol (bso#9941).
- Document idmap_ad rfc2307 attribute requirements (bso#9880) (bnc#820531).
- Don't package the SWAT man page while its build is disabled (bnc#816647).
- Don't install the tdb utilities man pages on post-12.1 systems (bnc#823549).
- Fix libreplace license ambiguity (bso#8997)
(bnc#765270).
- s3-docs: Remove 'experimental' label on 'max
protocol=SMB2' parameter (bso#9688).
- Remove the compound_related_in_progress state from the smb2 global state (bso#9722).
- Makefile: Don't know how to make LIBNDR_PREG_OBJ (bso#9868).
- Fix is_printer_published GUID retrieval (bso#9900) (bnc#798856).
- Fix 'map untrusted to domain' with NTLMv2 (bso#9817) (bnc#817919).
- Don't modify the pidfile name when a custom config file path is used (bnc#812929).
- Add extra attributes for AD printer publishing
(bso#9378) (bnc#798856).
- Fix vfs_catia module (bso#9701) (bnc#824833). systems (bnc#804822) (bnc#821889).
- Fix AD printer publishing (bso#9378) (bnc#798856).
Affected
update on openSUSE 12.3
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-4124 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities