File _patchinfo of Package patchinfo.29811

<patchinfo incident="29811">
  <issue tracker="cve" id="2022-2127"/>
  <issue tracker="cve" id="2023-34967"/>
  <issue tracker="cve" id="2023-34966"/>
  <issue tracker="cve" id="2023-34968"/>
  <issue tracker="bnc" id="1213172">VUL-0: EMBARGOED: CVE-2023-34967: samba: Samba Spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability</issue>
  <issue tracker="bnc" id="1213173">VUL-0: EMBARGOED: CVE-2023-34966: samba: Samba Spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability</issue>
  <issue tracker="bnc" id="1213174">VUL-0: EMBARGOED: CVE-2022-2127: samba: Out-Of-Bounds read in winbind AUTH_CRAP</issue>
  <issue tracker="bnc" id="1213171">VUL-0: EMBARGOED: CVE-2023-34968: samba: Spotlight server-side Share Path Disclosure</issue>
  <issue tracker="bnc" id="1213384">Jul-2023 update of windows 10/11 breaks trust relationship</issue>
  <packager>npower</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for samba</summary>
  <description>This update for samba fixes the following issues:

  - CVE-2022-2127: Fixed issue where lm_resp_len was not checked properly in winbindd_pam_auth_crap_send (bsc#1213174).
  - CVE-2023-34966: Fixed samba spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability (bsc#1213173).
  - CVE-2023-34967: Fixed samba spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability (bsc#1213172).
  - CVE-2023-34968: Fixed spotlight server-side Share Path Disclosure (bsc#1213171).

  Bugfixes:

  - Fixed trust relationship failure (bsc#1213384).

</description>
</patchinfo>
openSUSE Build Service is sponsored by