Login
Newsletter
Werbung

Sicherheit: Pufferüberläufe in Samba
Aktuelle Meldungen Distributionen
Name: Pufferüberläufe in Samba
ID: SUSE-SU-2012:0501-2
Distribution: SUSE
Plattformen: SUSE CORE 9
Datum: So, 15. April 2012, 00:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182
Applikationen: Samba

Originalnachricht

   SUSE Security Update: Security update for Samba
______________________________________________________________________________

Announcement ID: SUSE-SU-2012:0501-2
Rating: critical
References: #752797
Cross-References: CVE-2012-1182
Affected Products:
SUSE CORE 9
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:


A remote code execution flaw in Samba has been fixed:

* CVE-2012-1182: PIDL based autogenerated code uses
client supplied size values which allows attackers to write
beyond the allocated array size

Security Issue reference:

* CVE-2012-1182
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182
>



Package List:

- SUSE CORE 9 (i586 s390 s390x x86_64):

libsmbclient-3.0.26a-0.23
libsmbclient-devel-3.0.26a-0.23
samba-3.0.26a-0.23
samba-client-3.0.26a-0.23
samba-doc-3.0.26a-0.23
samba-pdb-3.0.26a-0.23
samba-python-3.0.26a-0.23
samba-vscan-0.3.6b-0.51
samba-winbind-3.0.26a-0.23

- SUSE CORE 9 (x86_64):

libsmbclient-32bit-9-201204111235
samba-32bit-9-201204111235
samba-client-32bit-9-201204111235
samba-winbind-32bit-9-201204111235

- SUSE CORE 9 (s390x):

libsmbclient-32bit-9-201204111252
samba-32bit-9-201204111252
samba-client-32bit-9-201204111252
samba-winbind-32bit-9-201204111252


References:

http://support.novell.com/security/cve/CVE-2012-1182.html
https://bugzilla.novell.com/752797
?keywords=a2cf0eaa66df512b4acca53cc92c9818

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung