<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>46966</bug_id>
          
          <creation_ts>2023-07-17 21:07:19 +0300</creation_ts>
          <short_desc>Secure channel faulty since Windows 10/11 update 07/2023</short_desc>
          <delta_ts>2023-07-28 18:40:03 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>1</classification_id>
          <classification>Unclassified</classification>
          <product>Branch p10</product>
          <component>samba-dc</component>
          <version>не указана</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P5</priority>
          <bug_severity>critical</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Олег Золотов">oleg_zolotov</reporter>
          <assigned_to name="Evgeny Sinelnikov">sin</assigned_to>
          <cc>amakeenk</cc>
    
    <cc>oleg_zolotov</cc>
          
          <qa_contact name="qa-p10@altlinux.org">qa-p10</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>229917</commentid>
    <comment_count>0</comment_count>
    <who name="Олег Золотов">oleg_zolotov</who>
    <bug_when>2023-07-17 21:07:19 +0300</bug_when>
    <thetext>После июльского обновления Microsoft Windows 10 KB5028166 (и аналогичных обновлений для Windows 7 и Windows Server 2008 R2), работающих в домене Samba 4 перестает работать NLA в RDS, печать на сетевые принтеры (виснет при попытке открыть свойства принтера). Откат обновления проблему решает. Описание ошибки https://bugzilla.samba.org/show_bug.cgi?id=15418</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>229933</commentid>
    <comment_count>1</comment_count>
    <who name="Evgeny Sinelnikov">sin</who>
    <bug_when>2023-07-18 11:07:27 +0300</bug_when>
    <thetext>Патчи в апстримной баге приложены. Можно сделать тестовую сборку для проверки.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>230200</commentid>
    <comment_count>2</comment_count>
    <who name="Олег Золотов">oleg_zolotov</who>
    <bug_when>2023-07-22 20:30:41 +0300</bug_when>
    <thetext>В апстриме появилась версия 4.16.11 в которой исправлен данный баг https://www.samba.org/samba/history/samba-4.16.11.html</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>230563</commentid>
    <comment_count>3</comment_count>
    <who name="Repository Robot">repository-robot</who>
    <bug_when>2023-07-28 18:40:03 +0300</bug_when>
    <thetext>samba-4.16.11-alt2 -&gt; c10f1:

 Sun Jul 23 2023 Evgeny Sinelnikov &lt;sin@altlinux&gt; 4.16.11-alt2
 - Add check with admx-lint for group policy templates validation.
 Sun Jul 23 2023 Evgeny Sinelnikov &lt;sin@altlinux&gt; 4.16.11-alt1
 - Update to security release of Samba 4.16 (Closes: 46966):
   + Secure channel faulty since Windows 10/11 update 07/2023 (KB5028166).
 - Security fixes (Samba#15418):
   + CVE-2022-2127:  When winbind is used for NTLM authentication, a maliciously
                     crafted request can trigger an out-of-bounds read in winbind
                     and possibly crash it.
                     https://www.samba.org/samba/security/CVE-2022-2127.html
   + CVE-2023-34966: An infinite loop bug in Samba&apos;s mdssvc RPC service for
                     Spotlight can be triggered by an unauthenticated attacker by
                     issuing a malformed RPC request.
                     https://www.samba.org/samba/security/CVE-2023-34966.html
   + CVE-2023-34967: Missing type validation in Samba&apos;s mdssvc RPC service for
                     Spotlight can be used by an unauthenticated attacker to
                     trigger a process crash in a shared RPC mdssvc worker process.
                     https://www.samba.org/samba/security/CVE-2023-34967.html
   + CVE-2023-34968: As part of the Spotlight protocol Samba discloses the server-
                     side absolute path of shares and files and directories in
                     search results.
                     https://www.samba.org/samba/security/CVE-2023-34968.html</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>