similar to: Error running CVE-2018-1057_helper on 4.5

Displaying 20 results from an estimated 200 matches similar to: "Error running CVE-2018-1057_helper on 4.5"

2018 Mar 14
0
Error running CVE-2018-1057_helper on 4.5
Am Mittwoch, 14. März 2018, 08:35:53 CET schrieb Brian Candler via samba: > I tried to run this script on a system running 4.5.15 built from > source under Ubuntu 16.04, but I get the following exception: > > # PYTHONPATH="/usr/local/samba/lib/python2.7/site-packages/" > ./samba_CVE-2018-1057_helper --lock-pwchange > Temporarily overriding 'dsdb:schema update
2009 Jan 07
1
[PATCH 1/5] cpumask: update irq_desc to use cpumask_var_t
An embedded and charset-unspecified text was scrubbed... Name: cpumask:update-irq_desc-to-use-cpumask_var_t.patch Url: http://lists.linux-foundation.org/pipermail/virtualization/attachments/20090107/8ebe5843/attachment.txt
2009 Jan 07
1
[PATCH 1/5] cpumask: update irq_desc to use cpumask_var_t
An embedded and charset-unspecified text was scrubbed... Name: cpumask:update-irq_desc-to-use-cpumask_var_t.patch Url: http://lists.linux-foundation.org/pipermail/virtualization/attachments/20090107/8ebe5843/attachment.txt
2009 Jan 07
1
[PATCH 1/5] cpumask: update irq_desc to use cpumask_var_t
An embedded and charset-unspecified text was scrubbed... Name: cpumask:update-irq_desc-to-use-cpumask_var_t.patch Url: http://lists.linux-foundation.org/pipermail/virtualization/attachments/20090107/8ebe5843/attachment.txt
2023 Nov 05
2
LDAP_MATCHING_RULE_IN_CHAIN no longer working after upgrade?
I'm quite confused by this one, as I can't see how this would happen.. but after upgrading my DCs from 4.11.10 to 4.18.5, LDAP searches don't seem to work if they use the :1.2.840.113556.1.4.1941: modifier, aka LDAP_MATCHING_RULE_IN_CHAIN. (Yes, it was a fairly big version jump.. Yes, I should have upgraded much earlier.. Yes, I know 4.19.x is out now as well) Here's a search that
2015 Sep 01
2
ldapcmp issue
Hi all, It seems "samba-tool ldapcmp" does not support too much items in Samba's database. Playing for a while with DB I was never able to run ldapcmp successfully. So yesterday I installed a platform to fill piece by piece my two small DCs and to run ldapcmp. The process follows. Test platform: 2 DCs using Debian 8.1 "net install" with only system tools, up to date,
2020 Jul 22
1
Failed to modify SPNs
Adam, you already tried my suggestions? What do you see here: > Failed to modify SPNs on CN=SEC-CON03,CN=Computers,DC=domain,DC=com: > acl: spn validation failed for ... ^^^^^^ So read the links below and post your results The event id you showed, for now can be ignored. Inrelevant (for now). And mostlikly wil disapear when you added/fixed the "correct" spn's On
2003 Jul 30
1
[PATCH] Password expiry merge (AIX parts)
Hi All. Attached is a patch introduces password expiry handling for AIX (other platforms to follow). It is more or less the same as the previous patch but has been updated to reflect recent changes to auth-passwd.c I'm wondering if the AIX parts of auth.c should be moved to port-aix.c and if the generic password change functions (currently at the end of auth-passwd.c) belong in a separate
2011 Apr 15
11
[Bug 1891] New: selinux policy does not like to exec passwd from sshd directly
https://bugzilla.mindrot.org/show_bug.cgi?id=1891 Summary: selinux policy does not like to exec passwd from sshd directly Product: Portable OpenSSH Version: 5.8p1 Platform: All OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo:
2017 Nov 21
1
[Announce] Samba 4.7.3, 4.6.11 and 4.5.15 Security Releases Available for Download
Release Announcements --------------------- These are a security releases in order to address the following defects: o CVE-2017-14746 (Use-after-free vulnerability.) o CVE-2017-15275 (Server heap memory information leak.) ======= Details ======= o CVE-2017-14746: All versions of Samba from 4.0.0 onwards are vulnerable to a use after free vulnerability, where a malicious SMB1 request
2017 Nov 21
1
[Announce] Samba 4.7.3, 4.6.11 and 4.5.15 Security Releases Available for Download
Release Announcements --------------------- These are a security releases in order to address the following defects: o CVE-2017-14746 (Use-after-free vulnerability.) o CVE-2017-15275 (Server heap memory information leak.) ======= Details ======= o CVE-2017-14746: All versions of Samba from 4.0.0 onwards are vulnerable to a use after free vulnerability, where a malicious SMB1 request
2018 Apr 03
0
Issues with RPC, SID resolving; cannot use RSAT
Hello, I'm running a setup with 3 DCs, all Samba 4.5.12, Debian Stretch (is patched for CVE-2018-1057, "samba_CVE-2018-1057_helper" been used). Probably unrelated to the upgrade and patch for CVE-2018-1057, there's a new problem coming up. RSAT fails to start/connect, complaining about RPC-Server unavailablility. On the DCs I've tried with smbclient and get the following:
2018 Apr 03
0
Issues with RPC, SID resolving; cannot use RSAT
seems removing idmap settings from smb.conf on both DCs having them has fixed it. smbclient and ADUC work as expected, now. Thank you! > I'm running a setup with 3 DCs, all Samba 4.5.12, Debian Stretch (is > patched for CVE-2018-1057, "samba_CVE-2018-1057_helper" been used). > > Probably unrelated to the upgrade and patch for CVE-2018-1057, there's > a new
2018 Sep 14
3
let NT domain "fade out" ?
another special situation ;-) old server at customer runs samba-4.5.15 (not that relevant for my questions but while I am at it ...) and is a "classic PDC" -> NT4 based Yes, I know, I should upgrade/migrate that domain to ADS. But that customer basically does not have financial power ;-) and I wait for my money for months every time I write an invoice. So I want to avoid
2013 Apr 19
1
Can't connect to DSL modem on em1
Shorewall 4.5.15 3 Interface setup em1 p3p1 p4p4 ppp0 Hi, Since changing to NetworkManger on Fedora 18 I can no longer connect to the DSL Modem, which is connected to Interface em1. When the NetworkManger brings up the interfaces and ppp0, it no longer assigns an IP to em1. If I have ppp0 disabled and NetworkManger brings up the interfaces, em1 gets an IP of 192.168.1.2. Then when I get
2023 Nov 06
1
LDAP_MATCHING_RULE_IN_CHAIN no longer working after upgrade?
Op 05-11-2023 om 23:25 schreef Jonathan Hunter via samba: > I'm quite confused by this one, as I can't see how this would happen.. > but after upgrading my DCs from 4.11.10 to 4.18.5, LDAP searches don't > seem to work if they use the :1.2.840.113556.1.4.1941: modifier, aka > LDAP_MATCHING_RULE_IN_CHAIN. (Yes, it was a fairly big version jump.. > Yes, I should have
2018 Jun 27
1
Not Able to access cifs when AD connected to different network
the problem is actually, i have two networks one is 192.168.1.* and 192.168.4.* , I have my linux pc in which samba server is running and it is in 192.168.1.12 and i have a AD server GNANA.COM in 192.168.1.14. i have shares which is having permission for only local linux users. i moved my linux pc from 192.168.1.12 to 192.168.4.12, samba server is running with the same config when it was running
2019 Oct 23
2
rid backed not working
Hi All, I'd like start using 'rid' idmap backed rather than 'tdb' on my member servers to keep gidNumbers in sync across the realm INCLUDING the DC. Problem is when I execute member1# getent group "MPD1\group1" I get no output. The gidNumbers fall within the range of 30000-60000. pestparm passes nicely. No erros logged whilst executing getent. Could anyone point me
2017 Dec 12
1
failure joining a domain as a DC
in my optinion, yes, i use my own packages for years now, started with 4.1.x  ( still the same servers) started with debian wheezy and these are now debian stretch.   Start reading here, it wil help you ;-) https://github.com/thctlo/samba4/tree/master/howtos      Greetz,   Louis   Van: Taylor Hammerling [mailto:thammerling at tcsbasys.com] Verzonden: dinsdag 12 december 2017 15:13 Aan: L.P.H.
2007 May 15
0
[PATCH] Small fix to the host.get_name_description call
Signed-off-by: Stefan Berger <stefanb@us.ibm.com> diff -r 3ef0510e44d0 tools/python/xen/xend/XendAPI.py --- a/tools/python/xen/xend/XendAPI.py Tue May 08 10:21:23 2007 +0100 +++ b/tools/python/xen/xend/XendAPI.py Mon May 14 23:17:32 2007 -0400 @@ -905,7 +941,7 @@ class XendAPI(object): XendNode.instance().set_name(new_name) return