drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in samba
Name: |
Pufferüberlauf in samba |
|
ID: |
SSA:2007-344-01 |
|
Distribution: |
Slackware |
|
Plattformen: |
Slackware -current, Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware 11.0, Slackware 12.0 |
|
Datum: |
Di, 11. Dezember 2007, 00:19 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015 |
|
Applikationen: |
Samba |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
[slackware-security] samba (SSA:2007-344-01)
New samba packages are available for Slackware 10.0, 10.1, 10.2, 11.0, 12.0, and -current to fix a security issue. A boundary failure in GETDC mailslot processing can result in a buffer overrun leading to possible code execution.
More details about the issue will become available in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015
Here are the details from the Slackware 12.0 ChangeLog: +--------------------------+ patches/packages/samba-3.0.28-i486-1_slack12.0.tgz: Upgraded to samba-3.0.28. Samba 3.0.28 is a security release in order to address a boundary failure in GETDC mailslot processing that can result in a buffer overrun leading to possible code execution. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015 http://www.samba.org/samba/history/samba-3.0.28.html http://secunia.com/secunia_research/2007-99/advisory/ (* Security fix *) +--------------------------+
Where to find the new packages: +-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com? Give slackware.osuosl.org a try. This is another primary FTP site for Slackware that can be considerably faster than downloading directly from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating additional FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 10.0: samba-3.0.28-i486-1_slack10.0.tgz
Updated package for Slackware 10.1: samba-3.0.28-i486-1_slack10.1.tgz
Updated package for Slackware 10.2: samba-3.0.28-i486-1_slack10.2.tgz
Updated package for Slackware 11.0: samba-3.0.28-i486-1_slack11.0.tgz
Updated package for Slackware 12.0: samba-3.0.28-i486-1_slack12.0.tgz
Updated package for Slackware -current: samba-3.0.28-i486-1.tgz
MD5 signatures: +-------------+
Slackware 10.0 package: 053df9ad7a4a1093312eb5a9694b608f samba-3.0.28-i486-1_slack10.0.tgz
Slackware 10.1 package: 8e71fbc64008d9a55a808207e34d0613 samba-3.0.28-i486-1_slack10.1.tgz
Slackware 10.2 package: c7a213d933e30ac464379498a1001c73 samba-3.0.28-i486-1_slack10.2.tgz
Slackware 11.0 package: e45fdf510d27d8fae340cdf5a3c958e5 samba-3.0.28-i486-1_slack11.0.tgz
Slackware 12.0 package: 16e70341053c75cc60868d13f5207abd samba-3.0.28-i486-1_slack12.0.tgz
Slackware -current package: 6ef212b0e1c058fd968c0252af63413f samba-3.0.28-i486-1.tgz
Installation instructions: +------------------------+
Upgrade the package as root: # upgradepkg samba-3.0.28-i486-1_slack12.0.tgz
Then, restart Samba: # /etc/rc.d/rc.samba restart
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFHXZYbakRjwEAQIjMRAv8wAJ9AOOMyEbOTqLaIYtDQgT+6nE3CpACeNO/T FgRXZQDN+aWzgD1dr6bhDhg= =E9iN -----END PGP SIGNATURE-----
|
|
|
|