Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2015:0353-1)
Summary:The remote host is missing an update for the 'samba' package(s) announced via the SUSE-SU-2015:0353-1 advisory.
The remote host is missing an update for the 'samba' package(s) announced via the SUSE-SU-2015:0353-1 advisory.

Vulnerability Insight:
samba was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-0240: Don't call talloc_free on an uninitialized pointer

These non-security issues were fixed:
- Fix vfs_snapper DBus string handling (bso#11055, bnc#913238).
- Fix libsmbclient DFS referral handling.
+ Reuse connections derived from DFS referrals (bso#10123).
+ Set domain/workgroup based on authentication callback value
- pam_winbind: Fix warn_pwd_expire implementation (bso#9056).
- nsswitch: Fix soname of linux nss_*.so.2 modules (bso#9299).
- Fix profiles tool (bso#9629).
- s3-lib: Do not require a password with --use-ccache (bso#10279).
- s4:dsdb/rootdse: Expand extended dn values with the AS_SYSTEM control
- s4-rpc: dnsserver: Fix enumeration of IPv4 and IPv6 addresses
- s3:smb2_server: Allow reauthentication without signing (bso#10958).
- s3-smbclient: Return success if we listed the shares (bso#10960).
- s3-smbstatus: Fix exit code of profile output (bso#10961).
- libcli: SMB2: Pure SMB2-only negprot fix to make us behave as a Windows
client does (bso#10966).
- s3: smbd/modules: Fix *allocate* calls to follow POSIX error return
convention (bso#10982).
- Fix 'domain join' by adding 'drsuapi.DsBindInfoFallBack' attribute
'supported_extensions' (bso#11006).
- idl:drsuapi: Manage all possible lengths of drsuapi_DsBindInfo
- winbind: Retry LogonControl RPC in ping-dc after session expiration
- yast2-samba-client should be able to specify osName and osVer on AD
domain join (bnc#873922).
- Lookup FSRVP share snums at runtime rather than storing them
persistently (bnc#908627).
- Specify soft dependency for in Winbind systemd
service file (bnc#889175).
- Fix spoolss error response marshalling, (bso#10984).
- pidl/wscript: Remove --with-perl-* options, revert buildtools/wafadmin/
Tools/ back to upstream state (bso#10472).
- s4-dns: Add support for BIND 9.10 (bso#10620).
- nmbd fails to accept '--piddir' option, (bso#10711).
- S3: source3/smbd/process.c::srv_send_smb() returns true on the error
path (bso#10880).
- vfs_glusterfs: Remove 'integer fd' code and store the glfs pointers
- s3-nmbd: Fix netbios name truncation (bso#10896).
- spoolss: Fix handling of bad EnumJobs levels (bso#10898).
- spoolss: Fix jobid in level 3 EnumJobs response, (bso#10905).
- s3: nmbd: Ensure NetBIOS names are only 15 characters stored,
- s3:smbd: Fix file corruption using 'write cache size != 0', (bso#10921).
- pdb_tdb: Fix a TALLOC/SAFE_FREE mixup, (bso#10932).
- s3-keytab: Fix keytab array NULL termination, (bso#10933).
- Cleanup add_string_to_array and usage, (bso#10942).
- Remove and cleanup shares and registry state associated with externally
deleted snaphots exposed as shadow copies, (bnc#876312).
- Use the upstream tar ball, as signature verification ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'samba' package(s) on SUSE Linux Enterprise Desktop 12, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Software Development Kit 12.

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-0240
BugTraq ID: 72711
Debian Security Information: DSA-3171 (Google Search)
HPdes Security Advisory: HPSBGN03288
HPdes Security Advisory: HPSBUX03320
HPdes Security Advisory: SSRT101952
HPdes Security Advisory: SSRT101979
RedHat Security Advisories: RHSA-2015:0249
RedHat Security Advisories: RHSA-2015:0250
RedHat Security Advisories: RHSA-2015:0251
RedHat Security Advisories: RHSA-2015:0252
RedHat Security Advisories: RHSA-2015:0253
RedHat Security Advisories: RHSA-2015:0254
RedHat Security Advisories: RHSA-2015:0255
RedHat Security Advisories: RHSA-2015:0256
RedHat Security Advisories: RHSA-2015:0257
SuSE Security Announcement: SUSE-SU-2015:0353 (Google Search)
SuSE Security Announcement: SUSE-SU-2015:0371 (Google Search)
SuSE Security Announcement: SUSE-SU-2015:0386 (Google Search)
SuSE Security Announcement: openSUSE-SU-2015:0375 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1064 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1106 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1107 (Google Search)
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2022 E-Soft Inc. All rights reserved.