User: Password:
|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2004:670-01 (samba)

From:  bugzilla@redhat.com
To:  enterprise-watch-list@redhat.com
Subject:  [RHSA-2004:670-01] Updated samba packages fix security issue
Date:  Thu, 16 Dec 2004 16:13 -0500

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated samba packages fix security issue Advisory ID: RHSA-2004:670-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2004-670.html Issue date: 2004-12-16 Updated on: 2004-12-16 Product: Red Hat Enterprise Linux CVE Names: CAN-2004-1154 - --------------------------------------------------------------------- 1. Summary: Updated samba packages that fix an integer overflow vulnerability are now available for Red Hat Enterprise Linux 3. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, ppc64, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Problem description: Samba provides file and printer sharing services to SMB/CIFS clients. Greg MacManus of iDEFENSE Labs has discovered an integer overflow bug in Samba versions prior to 3.0.10. An authenticated remote user could exploit this bug which may lead to arbitrary code execution on the Samba server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1154 to this issue. Users of Samba should upgrade to these updated packages, which contain backported security patches, and are not vulnerable to these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info): 142472 - CAN-2004-1154 Samba authenticated remote root 6. RPMs required: Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/samba... ae50e78fa90f404c8d9dad1746946ab9 samba-3.0.9-1.3E.1.src.rpm i386: cd169c44ab8d232dd11bf082a7325d53 samba-3.0.9-1.3E.1.i386.rpm 4a0b50c0c4264563258c5723d5194ef5 samba-client-3.0.9-1.3E.1.i386.rpm 312410d480a450c332af18fa66d04caa samba-common-3.0.9-1.3E.1.i386.rpm 4130a07354c51c6c4875e5fd4a1ca6c2 samba-swat-3.0.9-1.3E.1.i386.rpm ia64: ba52218771269f05f847b356b680c161 samba-3.0.9-1.3E.1.ia64.rpm cd169c44ab8d232dd11bf082a7325d53 samba-3.0.9-1.3E.1.i386.rpm c4922543608a85a4309317953d4dbcd2 samba-client-3.0.9-1.3E.1.ia64.rpm d5c60527db39738029bbe66cf4cec5e9 samba-common-3.0.9-1.3E.1.ia64.rpm 312410d480a450c332af18fa66d04caa samba-common-3.0.9-1.3E.1.i386.rpm 2551b11025a2f53a4d508396b2a41bca samba-swat-3.0.9-1.3E.1.ia64.rpm ppc: 9e0dee0285ce2f0c5507077822e4b015 samba-3.0.9-1.3E.1.ppc.rpm 1fac768c276051dd5c6ca60ee70e1f83 samba-client-3.0.9-1.3E.1.ppc.rpm 447ee04a97a37e31c643cef0ab180bf4 samba-common-3.0.9-1.3E.1.ppc.rpm 547c2cb1de65b215e33580b4871c7ed1 samba-swat-3.0.9-1.3E.1.ppc.rpm ppc64: 626a0c8698663dc1fe812402d1874b20 samba-3.0.9-1.3E.1.ppc64.rpm 5513a43f98a2797258ce4fa4f79fcb86 samba-common-3.0.9-1.3E.1.ppc64.rpm s390: 5b373fb4b5da288f03b37fb75870860f samba-3.0.9-1.3E.1.s390.rpm 7cae2416579a1efafaf4baa127ae65e6 samba-client-3.0.9-1.3E.1.s390.rpm 53205bbd529cb24297cac89728c38ec0 samba-common-3.0.9-1.3E.1.s390.rpm ad2b7ea7cacedf8b3a0779ef92dc07d2 samba-swat-3.0.9-1.3E.1.s390.rpm s390x: 3436beed69976e53992340a1ecf34398 samba-3.0.9-1.3E.1.s390x.rpm 5b373fb4b5da288f03b37fb75870860f samba-3.0.9-1.3E.1.s390.rpm 62453debe0428f1e78b61e466d124db5 samba-client-3.0.9-1.3E.1.s390x.rpm f0dbce9da2cd7d41b6366dde862659fa samba-common-3.0.9-1.3E.1.s390x.rpm 53205bbd529cb24297cac89728c38ec0 samba-common-3.0.9-1.3E.1.s390.rpm ac6874146494829a7ca3349f1e237ee5 samba-swat-3.0.9-1.3E.1.s390x.rpm x86_64: c6b9d4e23808e90eeeda7335e6b59752 samba-3.0.9-1.3E.1.x86_64.rpm cd169c44ab8d232dd11bf082a7325d53 samba-3.0.9-1.3E.1.i386.rpm c308f8c72d17d4283e0c7dae9e76ba35 samba-client-3.0.9-1.3E.1.x86_64.rpm 5f4314c703118a2afa161fc2988495eb samba-common-3.0.9-1.3E.1.x86_64.rpm 312410d480a450c332af18fa66d04caa samba-common-3.0.9-1.3E.1.i386.rpm 8d12d3b1fdac910e25c05a72cbc3b237 samba-swat-3.0.9-1.3E.1.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/... ae50e78fa90f404c8d9dad1746946ab9 samba-3.0.9-1.3E.1.src.rpm i386: cd169c44ab8d232dd11bf082a7325d53 samba-3.0.9-1.3E.1.i386.rpm 4a0b50c0c4264563258c5723d5194ef5 samba-client-3.0.9-1.3E.1.i386.rpm 312410d480a450c332af18fa66d04caa samba-common-3.0.9-1.3E.1.i386.rpm 4130a07354c51c6c4875e5fd4a1ca6c2 samba-swat-3.0.9-1.3E.1.i386.rpm x86_64: c6b9d4e23808e90eeeda7335e6b59752 samba-3.0.9-1.3E.1.x86_64.rpm cd169c44ab8d232dd11bf082a7325d53 samba-3.0.9-1.3E.1.i386.rpm c308f8c72d17d4283e0c7dae9e76ba35 samba-client-3.0.9-1.3E.1.x86_64.rpm 5f4314c703118a2afa161fc2988495eb samba-common-3.0.9-1.3E.1.x86_64.rpm 312410d480a450c332af18fa66d04caa samba-common-3.0.9-1.3E.1.i386.rpm 8d12d3b1fdac910e25c05a72cbc3b237 samba-swat-3.0.9-1.3E.1.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/samba... ae50e78fa90f404c8d9dad1746946ab9 samba-3.0.9-1.3E.1.src.rpm i386: cd169c44ab8d232dd11bf082a7325d53 samba-3.0.9-1.3E.1.i386.rpm 4a0b50c0c4264563258c5723d5194ef5 samba-client-3.0.9-1.3E.1.i386.rpm 312410d480a450c332af18fa66d04caa samba-common-3.0.9-1.3E.1.i386.rpm 4130a07354c51c6c4875e5fd4a1ca6c2 samba-swat-3.0.9-1.3E.1.i386.rpm ia64: ba52218771269f05f847b356b680c161 samba-3.0.9-1.3E.1.ia64.rpm cd169c44ab8d232dd11bf082a7325d53 samba-3.0.9-1.3E.1.i386.rpm c4922543608a85a4309317953d4dbcd2 samba-client-3.0.9-1.3E.1.ia64.rpm d5c60527db39738029bbe66cf4cec5e9 samba-common-3.0.9-1.3E.1.ia64.rpm 312410d480a450c332af18fa66d04caa samba-common-3.0.9-1.3E.1.i386.rpm 2551b11025a2f53a4d508396b2a41bca samba-swat-3.0.9-1.3E.1.ia64.rpm x86_64: c6b9d4e23808e90eeeda7335e6b59752 samba-3.0.9-1.3E.1.x86_64.rpm cd169c44ab8d232dd11bf082a7325d53 samba-3.0.9-1.3E.1.i386.rpm c308f8c72d17d4283e0c7dae9e76ba35 samba-client-3.0.9-1.3E.1.x86_64.rpm 5f4314c703118a2afa161fc2988495eb samba-common-3.0.9-1.3E.1.x86_64.rpm 312410d480a450c332af18fa66d04caa samba-common-3.0.9-1.3E.1.i386.rpm 8d12d3b1fdac910e25c05a72cbc3b237 samba-swat-3.0.9-1.3E.1.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/samba... ae50e78fa90f404c8d9dad1746946ab9 samba-3.0.9-1.3E.1.src.rpm i386: cd169c44ab8d232dd11bf082a7325d53 samba-3.0.9-1.3E.1.i386.rpm 4a0b50c0c4264563258c5723d5194ef5 samba-client-3.0.9-1.3E.1.i386.rpm 312410d480a450c332af18fa66d04caa samba-common-3.0.9-1.3E.1.i386.rpm 4130a07354c51c6c4875e5fd4a1ca6c2 samba-swat-3.0.9-1.3E.1.i386.rpm ia64: ba52218771269f05f847b356b680c161 samba-3.0.9-1.3E.1.ia64.rpm cd169c44ab8d232dd11bf082a7325d53 samba-3.0.9-1.3E.1.i386.rpm c4922543608a85a4309317953d4dbcd2 samba-client-3.0.9-1.3E.1.ia64.rpm d5c60527db39738029bbe66cf4cec5e9 samba-common-3.0.9-1.3E.1.ia64.rpm 312410d480a450c332af18fa66d04caa samba-common-3.0.9-1.3E.1.i386.rpm 2551b11025a2f53a4d508396b2a41bca samba-swat-3.0.9-1.3E.1.ia64.rpm x86_64: c6b9d4e23808e90eeeda7335e6b59752 samba-3.0.9-1.3E.1.x86_64.rpm cd169c44ab8d232dd11bf082a7325d53 samba-3.0.9-1.3E.1.i386.rpm c308f8c72d17d4283e0c7dae9e76ba35 samba-client-3.0.9-1.3E.1.x86_64.rpm 5f4314c703118a2afa161fc2988495eb samba-common-3.0.9-1.3E.1.x86_64.rpm 312410d480a450c332af18fa66d04caa samba-common-3.0.9-1.3E.1.i386.rpm 8d12d3b1fdac910e25c05a72cbc3b237 samba-swat-3.0.9-1.3E.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact.html Copyright 2004 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFBwfpmXlSAg2UNWIIRAiN4AKCTbZK916KuOWUfHjzel0iLt1j9EgCgxKVC HOvD4tStIamX2johYZbhzWQ= =2IZu -----END PGP SIGNATURE----- -- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-...


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds