Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory for samba (SUSE-SU-2015:0353-1)
Summary:The remote host is missing an update for the 'samba'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'samba'
package(s) announced via the referenced advisory.

Vulnerability Insight:
samba was updated to fix one security issue.

This security issue was fixed:

- CVE-2015-0240: Don't call talloc_free on an uninitialized pointer

These non-security issues were fixed:

- Fix vfs_snapper DBus string handling (bso#11055, bnc#913238).

- Fix libsmbclient DFS referral handling.
+ Reuse connections derived from DFS referrals (bso#10123).
+ Set domain/workgroup based on authentication callback value

- pam_winbind: Fix warn_pwd_expire implementation (bso#9056).

- nsswitch: Fix soname of linux nss_*.so.2 modules (bso#9299).

- Fix profiles tool (bso#9629).

- s3-lib: Do not require a password with --use-ccache (bso#10279).

- s4:dsdb/rootdse: Expand extended dn values with the AS_SYSTEM control

- s4-rpc: dnsserver: Fix enumeration of IPv4 and IPv6 addresses

- s3:smb2_server: Allow reauthentication without signing (bso#10958).

- s3-smbclient: Return success if we listed the shares (bso#10960).

- s3-smbstatus: Fix exit code of profile output (bso#10961).

- libcli: SMB2: Pure SMB2-only negprot fix to make us behave as a Windows
client does (bso#10966).

- s3: smbd/modules: Fix *allocate* calls to follow POSIX error return
convention (bso#10982).

- Fix 'domain join' by adding 'drsuapi.DsBindInfoFallBack' attribute
'supported_extensions' (bso#11006).

- idl:drsuapi: Manage all possible lengths of drsuapi_DsBindInfo

- winbind: Retry LogonControl RPC in ping-dc after session expiration

- yast2-samba-client should be able to specify osName and osVer on AD
domain join (bnc#873922).

- Lookup FSRVP share snums at runtime rather than storing them
persistently (bnc#908627).

- Specify soft dependency for in Winbind systemd
service file (bnc#889175).

- Fix spoolss error response marshalling (bso#10984).

- pidl/wscript: Remove --with-perl-* options revert buildtools/wafadmin/
Tools/ back to upstream state (bso#10472).

- s4-dns: Add support for BIND 9.10 (bso#10620).

- nmbd fails to accept '--piddir' option (bso#10711).

- S3: source3/smbd/process.c::srv_send_smb() returns true on the error
path (bso#10880).

- vfs_glusterfs: Remove 'integer fd' code and store the glfs pointers

- s3-nmbd: Fix netbios name truncation (bso#10896).

- spoolss: Fix handling of bad EnumJobs levels (bso#10898).

- spoolss: Fix jobid in level 3 EnumJobs response (bso#10905).

- s3: nmbd: Ensure NetBIOS names are only 15 characters stored

- s3:smb ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
samba on SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Desktop 12

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-0240
BugTraq ID: 72711
Debian Security Information: DSA-3171 (Google Search)
HPdes Security Advisory: HPSBGN03288
HPdes Security Advisory: HPSBUX03320
HPdes Security Advisory: SSRT101952
HPdes Security Advisory: SSRT101979
RedHat Security Advisories: RHSA-2015:0249
RedHat Security Advisories: RHSA-2015:0250
RedHat Security Advisories: RHSA-2015:0251
RedHat Security Advisories: RHSA-2015:0252
RedHat Security Advisories: RHSA-2015:0253
RedHat Security Advisories: RHSA-2015:0254
RedHat Security Advisories: RHSA-2015:0255
RedHat Security Advisories: RHSA-2015:0256
RedHat Security Advisories: RHSA-2015:0257
SuSE Security Announcement: SUSE-SU-2015:0353 (Google Search)
SuSE Security Announcement: SUSE-SU-2015:0371 (Google Search)
SuSE Security Announcement: SUSE-SU-2015:0386 (Google Search)
SuSE Security Announcement: openSUSE-SU-2015:0375 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1064 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1106 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1107 (Google Search)
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2022 E-Soft Inc. All rights reserved.