search for: 45141

Displaying 7 results from an estimated 7 matches for "45141".

Did you mean: 4141
2022 Dec 15
1
[Announce] Samba 4.17.4, 4.16.8 and 4.15.13 Security Releases are available for Download
...7.html o CVE-2022-38023: The "RC4" protection of the NetLogon Secure channel uses the ????????????????? same algorithms as rc4-hmac cryptography in Kerberos, ????????????????? and so must also be assumed to be weak. https://www.samba.org/samba/security/CVE-2022-38023.html o CVE-2022-45141: Since the Windows Kerberos RC4-HMAC Elevation of Privilege ????????????????? Vulnerability was disclosed by Microsoft on Nov 8 2022 ????????????????? and per RFC8429 it is assumed that rc4-hmac is weak, ????????????????? Vulnerable Samba Active Directory DCs will issue rc4-hmac ??????????????...
2022 Dec 15
1
[Announce] Samba 4.17.4, 4.16.8 and 4.15.13 Security Releases are available for Download
...7.html o CVE-2022-38023: The "RC4" protection of the NetLogon Secure channel uses the ????????????????? same algorithms as rc4-hmac cryptography in Kerberos, ????????????????? and so must also be assumed to be weak. https://www.samba.org/samba/security/CVE-2022-38023.html o CVE-2022-45141: Since the Windows Kerberos RC4-HMAC Elevation of Privilege ????????????????? Vulnerability was disclosed by Microsoft on Nov 8 2022 ????????????????? and per RFC8429 it is assumed that rc4-hmac is weak, ????????????????? Vulnerable Samba Active Directory DCs will issue rc4-hmac ??????????????...
2023 Jan 26
1
samba 4.13.17 ubuntu 20.04
We have the same issue with Samba 4.13.17. For Ubuntu 20.04 with Samba 4.13.17 there seems to be only a workaround to solve the login problem: Modifying the Local Security Policy -> Local Policies -> Security Options -> Network security: "Configure encryption types allowed for Kerberos" Check only DES_CBC_CRC, DES_CBC_MD5 and RC4_HMAC_MD5. ? This worked for us to login again. ?
2023 Jan 26
1
samba 4.13.17 ubuntu 20.04
...atch - CVE-2022-3437 * SECURITY > UPDATE: Buffer overflow vulnerabilities on 32-bit systems - > debian/patches/CVE-2022-42898-*.patch - CVE-2022-42898 * SECURITY > UPDATE: Samba AD DC can be forced to issue rc4-hmac > encrypted Kerberos tickets - debian/patches/CVE-2022-45141- > *.patch - CVE-2022-45141 * SECURITY UPDATE: RC4/HMAC-MD5 NetLogon > Secure Channel is weak and should be avoided - > debian/patches/CVE-2022-38023-*.patch - CVE-2022-38023 * SECURITY > UPDATE: rc4-hmac Kerberos session keys issued to modern servers - > debian/patc...
2002 Dec 06
1
Unable to get proper ext3 functionality in recompiled 2.4.18-18.7.x kernel
I am trying to find out where to go in regards to problem mentioned in subject line. Maybe you can offer some advice or, if not, then maybe redirect to another organization or web site. I have been installing just about every new release of the kernel that has come out for RH 7.2. I have always recompiled these to a customized version for my Tyan s1598/K6-III system. I do this so that only
2009 Jan 21
2
Bug or other issue? Jan 22 00:02:09 argon postfix/pipe[21251]: E8126A3671: to=<mbj@seonic.net>, orig_to=<root>, relay=dovecot, delay=0.38, delays=0.03/0/0/0.35, dsn=5.3.0, status=bounced (Command died with signal 6: "/usr/libexec/dovecot/deliver")
Hi, I found the following in my logfiles: The failure is not reproducable at the moment. System is delivering mails to mailboxes with no problems at all. It is a production installation with medium load. dovecot --version: 1.1.7 OS: Linux (Gentoo/x86 stable) - grsec enabled kernel deliver.log: deliver(user at example.tld): Panic: file istream-tee.c: line 144 (i_stream_tee_read): assertion
2006 Apr 09
5
Switchroot: mount failed: 22, Kernel panic - not syncing: Attempted tp kill init!
Hi, everybody! My pxelinux.0/default file is: LABEL linux KERNEL vmlinuz-2.6.16 APPEND initrd=initrd-2.6.16.img root=192.168.4.110:/clients/192.168.4.100/root When mounting I get: switchroot: mount failed: 22 Kernel panic - not syncing: Attempted tp kill init! Before it I get some messages about: Can't find /dev/console. /clients/192.168.4.100/root/dev was empty. I've copied my