lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 14 Aug 2018 10:16:04 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4271-1] samba security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4271-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
August 14, 2018                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : samba
CVE ID         : CVE-2018-10858 CVE-2018-10919

Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following issues:

CVE-2018-10858

    Svyatoslav Phirsov discovered that insufficient input validation in
    libsmbclient allowed a malicious Samba server to write to the
    client's heap memory.

CVE-2018-10919

    Phillip Kuhrt discovered that Samba when acting as an Active Domain
    controller disclosed some sensitive attributes.

For the stable distribution (stretch), these problems have been fixed in
version 2:4.5.12+dfsg-2+deb9u3.

We recommend that you upgrade your samba packages.

For the detailed security status of samba please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/samba

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAltyqgxfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0Qigg//Zteq0rjPoRFziKxzZ4xT5vHYGEDWjt+EckUkNqyk1bPPWQAZON+bmS0L
X295kRL+EFKlzUFc1l0LiFE+7bsoQQtcToFxgeHM9YZ2F0eAaUYlCaGeIPl7pW/U
0ewB1kT1ZsWaM0XGZjUgiFYvmAAcSN6EqMMkFDRW5On+SpitzRDe0QKdAlNZ/RdP
69IJFM3nBdB4JTLhmD4uOD7di+QLdyvQu5AmksjJ0r/+NNeHSyrtOq0TQTdr8nBP
/RVtHZQXM7LaILgTfRXpSpcoEk6RMPIiSts3AjivLotYqyUMfmzrvcft0eG3wUYZ
5JgV0i6xypKt1Xb9v7itW/mJa7RFjuAeODOUdqCU3Mp6g2yh+k33ViH4lAGiAiWb
7gVUxZOmNjZ2PXgUjesZj2UdNssOTH7P61A7vvoMGFPg7xzgAIAqo5DIZaGPkRZq
HcQYNjBa7aZsG+8spYlitXBwlm5/fYnniEAKHZY56N/kuJdZzAKf/QiIyNPX87wi
N1AxFjdh8S8cbp66PmuZ1vo7n/FG+bcO5QKG121m2znk8pr4R04vN7/37PE/Mxo1
rzXqwxz1iVLBb2mW0P6N3b6e8YqVnGl0R/w26kX6cK3+qhOPgH43WpYyBt2yt+Vb
XwfAv2B9Gdx6VM2Zy3833HXiKtw66RB6cAg3rXyWU5lVPydt8zU=
=jcl0
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ