Subject: | |
From: | |
Reply To: | |
Date: | Fri, 4 Mar 2011 14:59:02 -0600 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Critical: samba security update
Issue date: 2010-11-10
CVE Names: CVE-2010-3069
A missing array boundary checking flaw was found in the way Samba parsed
the binary representation of Windows security identifiers (SIDs). A
malicious client could send a specially-crafted SMB request to the Samba
server, resulting in arbitrary code execution with the privileges of the
Samba server (smbd). (CVE-2010-3069)
After installing this update, the smb service will be restarted
automatically.
SL 6.x
SRPMS:
samba-3.5.4-68.el6_0.1.src.rpm
i386:
libsmbclient-3.5.4-68.el6_0.1.i686.rpm
libsmbclient-devel-3.5.4-68.el6_0.1.i686.rpm
samba-3.5.4-68.el6_0.1.i686.rpm
samba-client-3.5.4-68.el6_0.1.i686.rpm
samba-common-3.5.4-68.el6_0.1.i686.rpm
samba-doc-3.5.4-68.el6_0.1.i686.rpm
samba-domainjoin-gui-3.5.4-68.el6_0.1.i686.rpm
samba-swat-3.5.4-68.el6_0.1.i686.rpm
samba-winbind-3.5.4-68.el6_0.1.i686.rpm
samba-winbind-clients-3.5.4-68.el6_0.1.i686.rpm
samba-winbind-devel-3.5.4-68.el6_0.1.i686.rpm
x86_64:
libsmbclient-3.5.4-68.el6_0.1.i686.rpm
libsmbclient-3.5.4-68.el6_0.1.x86_64.rpm
libsmbclient-devel-3.5.4-68.el6_0.1.i686.rpm
libsmbclient-devel-3.5.4-68.el6_0.1.x86_64.rpm
samba-3.5.4-68.el6_0.1.x86_64.rpm
samba-client-3.5.4-68.el6_0.1.x86_64.rpm
samba-common-3.5.4-68.el6_0.1.i686.rpm
samba-common-3.5.4-68.el6_0.1.x86_64.rpm
samba-doc-3.5.4-68.el6_0.1.x86_64.rpm
samba-domainjoin-gui-3.5.4-68.el6_0.1.x86_64.rpm
samba-swat-3.5.4-68.el6_0.1.x86_64.rpm
samba-winbind-3.5.4-68.el6_0.1.x86_64.rpm
samba-winbind-clients-3.5.4-68.el6_0.1.i686.rpm
samba-winbind-clients-3.5.4-68.el6_0.1.x86_64.rpm
samba-winbind-devel-3.5.4-68.el6_0.1.i686.rpm
samba-winbind-devel-3.5.4-68.el6_0.1.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|