User: Password:
|
|
Subscribe / Log in / New account

Slackware alert SSA:2007-038-01 (samba)

From:  Slackware Security Team <security@slackware.com>
To:  slackware-security@slackware.com
Subject:  [slackware-security] samba (SSA:2007-038-01)
Date:  Wed, 7 Feb 2007 13:58:37 -0800 (PST)

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] samba (SSA:2007-038-01) New samba packages are available for Slackware 10.0, 10.1, 10.2, and 11.0 to fix a denial-of-service security issue. More details about the issues fixed in Samba 3.0.24 may be found in the Common Vulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454 Here are the details from the Slackware 11.0 ChangeLog: +--------------------------+ patches/packages/samba-3.0.24-i486-1_slack11.0.tgz: Upgraded to samba-3.0.24. From the WHATSNEW.txt file: "Important issues addressed in 3.0.24 include: o Fixes for the following security advisories: - CVE-2007-0452 (Potential Denial of Service bug in smbd) - CVE-2007-0453 (Buffer overrun in NSS host lookup Winbind NSS library on Solaris) - CVE-2007-0454 (Format string bug in afsacl.so VFS plugin)" Samba is Slackware is vulnerable to the first issue, which can cause smbd to enter into an infinite loop, disrupting Samba services. Linux is not vulnerable to the second issue, and Slackware does not ship the afsacl.so VFS plugin (but it's something to be aware of if you build Samba with custom options). For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ HINT: Getting slow download speeds from ftp.slackware.com? Give slackware.osuosl.org a try. This is another primary FTP site for Slackware that can be considerably faster than downloading from ftp.slackware.com. Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating additional FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 10.0: ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patc... Updated package for Slackware 10.1: ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patc... Updated package for Slackware 10.2: ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patc... Updated package for Slackware 11.0: ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patc... MD5 signatures: +-------------+ Slackware 10.0 package: e845effc7048393b56069a09350eda68 samba-3.0.24-i486-1_slack10.0.tgz Slackware 10.1 package: 907e0f0351a362381afd9dd627970e11 samba-3.0.24-i486-1_slack10.1.tgz Slackware 10.2 package: 3b72e21a7e43ea9726e0147560b5f077 samba-3.0.24-i486-1_slack10.2.tgz Slackware 11.0 package: c17312f0537f36098f23351366b10a09 samba-3.0.24-i486-1_slack11.0.tgz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg samba-3.0.24-i486-1_slack11.0.tgz Restart Samba: sh /etc/rc.d/rc.samba restart +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFFyh+takRjwEAQIjMRAnK9AJ0ZItWfRH8Or4Ch8WlZOp8404E5EACglDim 4RmGZG4w/+UlAA+CmycReR8= =K/lS -----END PGP SIGNATURE-----


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds