SCIENTIFIC-LINUX-ERRATA Archives

February 2012

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Sender:
Security Errata for Scientific Linux <[log in to unmask]>
Date:
Fri, 24 Feb 2012 08:38:47 -0600
Reply-To:
Pat Riehecky <[log in to unmask]>
Subject:
MIME-Version:
1.0
Content-Transfer-Encoding:
7bit
Content-Type:
text/plain; charset="ISO-8859-1"; format=flowed
Organization:
Fermilab
From:
Pat Riehecky <[log in to unmask]>
Parts/Attachments:
text/plain (37 lines)
Synopsis:    Critical: samba security update
Issue Date:  2012-02-23
CVE Numbers: CVE-2012-0870


Samba is a suite of programs used by machines to share files, printers, and
other information.

An input validation flaw was found in the way Samba handled Any Batched
(AndX) requests. A remote, unauthenticated attacker could send a
specially-crafted SMB packet to the Samba server, possibly resulting in
arbitrary code execution with the privileges of the Samba server (root).
(CVE-2012-0870)

Users of Samba are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue. After installing this
update, the smb service will be restarted automatically.

SL4:
   i386
      samba-3.0.33-0.35.el4.i386.rpm
      samba-client-3.0.33-0.35.el4.i386.rpm
      samba-common-3.0.33-0.35.el4.i386.rpm
      samba-debuginfo-3.0.33-0.35.el4.i386.rpm
      samba-swat-3.0.33-0.35.el4.i386.rpm
   x86_64
      samba-3.0.33-0.35.el4.x86_64.rpm
      samba-client-3.0.33-0.35.el4.x86_64.rpm
      samba-common-3.0.33-0.35.el4.i386.rpm
      samba-common-3.0.33-0.35.el4.x86_64.rpm
      samba-debuginfo-3.0.33-0.35.el4.i386.rpm
      samba-debuginfo-3.0.33-0.35.el4.x86_64.rpm
      samba-swat-3.0.33-0.35.el4.x86_64.rpm


- Scientific Linux Development Team

ATOM RSS1 RSS2