Описание
ELSA-2010-0698: samba3x security update (CRITICAL)
[3.3.8-0.52.2]
- Security Release, fixes CVE-2010-3069
- resolves: #632231
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
libtalloc
1.2.0-52.el5_5.2
libtalloc-devel
1.2.0-52.el5_5.2
libtdb
1.1.2-52.el5_5.2
libtdb-devel
1.1.2-52.el5_5.2
samba3x
3.3.8-0.52.el5_5.2
samba3x-client
3.3.8-0.52.el5_5.2
samba3x-common
3.3.8-0.52.el5_5.2
samba3x-doc
3.3.8-0.52.el5_5.2
samba3x-domainjoin-gui
3.3.8-0.52.el5_5.2
samba3x-swat
3.3.8-0.52.el5_5.2
samba3x-winbind
3.3.8-0.52.el5_5.2
samba3x-winbind-devel
3.3.8-0.52.el5_5.2
tdb-tools
1.1.2-52.el5_5.2
Oracle Linux x86_64
libtalloc
1.2.0-52.el5_5.2
libtalloc-devel
1.2.0-52.el5_5.2
libtdb
1.1.2-52.el5_5.2
libtdb-devel
1.1.2-52.el5_5.2
samba3x
3.3.8-0.52.el5_5.2
samba3x-client
3.3.8-0.52.el5_5.2
samba3x-common
3.3.8-0.52.el5_5.2
samba3x-doc
3.3.8-0.52.el5_5.2
samba3x-domainjoin-gui
3.3.8-0.52.el5_5.2
samba3x-swat
3.3.8-0.52.el5_5.2
samba3x-winbind
3.3.8-0.52.el5_5.2
samba3x-winbind-devel
3.3.8-0.52.el5_5.2
tdb-tools
1.1.2-52.el5_5.2
Oracle Linux i386
libtalloc
1.2.0-52.el5_5.2
libtalloc-devel
1.2.0-52.el5_5.2
libtdb
1.1.2-52.el5_5.2
libtdb-devel
1.1.2-52.el5_5.2
samba3x
3.3.8-0.52.el5_5.2
samba3x-client
3.3.8-0.52.el5_5.2
samba3x-common
3.3.8-0.52.el5_5.2
samba3x-doc
3.3.8-0.52.el5_5.2
samba3x-domainjoin-gui
3.3.8-0.52.el5_5.2
samba3x-swat
3.3.8-0.52.el5_5.2
samba3x-winbind
3.3.8-0.52.el5_5.2
samba3x-winbind-devel
3.3.8-0.52.el5_5.2
tdb-tools
1.1.2-52.el5_5.2
Связанные CVE
Связанные уязвимости
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse ...
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.