Hide Forgot
The "RC4" protection of the NetLogon Secure channel uses the same algorithms as rc4-hmac cryptography in Kerberos, and so must also be assumed to be weak.
Created samba tracking bugs for this issue: Affects: fedora-all [bug 2154363]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:0637 https://access.redhat.com/errata/RHSA-2023:0637
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:0638 https://access.redhat.com/errata/RHSA-2023:0638
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:0639 https://access.redhat.com/errata/RHSA-2023:0639
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0838 https://access.redhat.com/errata/RHSA-2023:0838
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:1090 https://access.redhat.com/errata/RHSA-2023:1090
Doesn't this issue impact RHEL 8.6? If it does not, shouldn't the CVE page(https://access.redhat.com/security/cve/cve-2022-38023) explicitly state that? I have a customer who is complaining about this CVE in CoreOS 4.11.28 (shipped with their ARO cluster). CoreOS 4.11.28 is built with RHEL 8.6 EUS (https://access.redhat.com/articles/6907891)
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2127 https://access.redhat.com/errata/RHSA-2023:2127
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:2136 https://access.redhat.com/errata/RHSA-2023:2136
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:2137 https://access.redhat.com/errata/RHSA-2023:2137
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-38023