File _patchinfo of Package patchinfo.29811
<patchinfo incident="29811">
<issue tracker="cve" id="2022-2127"/>
<issue tracker="cve" id="2023-34967"/>
<issue tracker="cve" id="2023-34966"/>
<issue tracker="cve" id="2023-34968"/>
<issue tracker="bnc" id="1213172">VUL-0: EMBARGOED: CVE-2023-34967: samba: Samba Spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability</issue>
<issue tracker="bnc" id="1213173">VUL-0: EMBARGOED: CVE-2023-34966: samba: Samba Spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability</issue>
<issue tracker="bnc" id="1213174">VUL-0: EMBARGOED: CVE-2022-2127: samba: Out-Of-Bounds read in winbind AUTH_CRAP</issue>
<issue tracker="bnc" id="1213171">VUL-0: EMBARGOED: CVE-2023-34968: samba: Spotlight server-side Share Path Disclosure</issue>
<issue tracker="bnc" id="1213384">Jul-2023 update of windows 10/11 breaks trust relationship</issue>
<packager>npower</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for samba</summary>
<description>This update for samba fixes the following issues:
- CVE-2022-2127: Fixed issue where lm_resp_len was not checked properly in winbindd_pam_auth_crap_send (bsc#1213174).
- CVE-2023-34966: Fixed samba spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability (bsc#1213173).
- CVE-2023-34967: Fixed samba spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability (bsc#1213172).
- CVE-2023-34968: Fixed spotlight server-side Share Path Disclosure (bsc#1213171).
Bugfixes:
- Fixed trust relationship failure (bsc#1213384).
</description>
</patchinfo>