Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] SUSE-SU-2012:0501-1: critical: Security update for Samba

Recommended Posts

SUSE Security Update: Security update for Samba

______________________________________________________________________________

 

Announcement ID: SUSE-SU-2012:0501-1

Rating: critical

References: #752797

Cross-References: CVE-2012-1182

Affected Products:

SUSE Linux Enterprise Server 10 SP2

______________________________________________________________________________

 

An update that fixes one vulnerability is now available. It

includes one version update.

 

Description:

 

 

A remote code execution flaw in Samba has been fixed:

 

* CVE-2012-1182: PIDL based autogenerated code uses

client supplied size values which allows attackers to write

beyond the allocated array size

 

Security Issue reference:

 

* CVE-2012-1182

 

 

 

 

Package List:

 

- SUSE Linux Enterprise Server 10 SP2 (i586 s390x x86_64) [New Version: 3.0.32]:

 

cifs-mount-3.0.32-0.22.1

libmsrpc-3.0.32-0.22.1

libmsrpc-devel-3.0.32-0.22.1

libsmbclient-3.0.32-0.22.1

libsmbclient-devel-3.0.32-0.22.1

samba-3.0.32-0.22.1

samba-client-3.0.32-0.22.1

samba-krb-printing-3.0.32-0.22.1

samba-python-3.0.32-0.22.1

samba-vscan-0.3.6b-42.85.22.1

samba-winbind-3.0.32-0.22.1

 

- SUSE Linux Enterprise Server 10 SP2 (s390x x86_64) [New Version: 3.0.32]:

 

libsmbclient-32bit-3.0.32-0.22.1

samba-32bit-3.0.32-0.22.1

samba-client-32bit-3.0.32-0.22.1

samba-winbind-32bit-3.0.32-0.22.1

 

- SUSE Linux Enterprise Server 10 SP2 (noarch) [New Version: 3.0.32]:

 

samba-doc-3.0.32-0.22.1

 

 

References:

 

http://support.novell.com/security/cve/CVE-2012-1182.html

https://bugzilla.novell.com/752797

http://download.novell.com/patch/finder/?keywords=5b844721c4336f27fc2fd229115daaf1

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×