Описание
ELSA-2010-0860: samba security update (CRITICAL)
[3.5.4-68.1]
- Security Release, fixes CVE-2010-3069
- resolves: #632264
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
libsmbclient
3.5.4-68.el6_0.1
libsmbclient-devel
3.5.4-68.el6_0.1
samba
3.5.4-68.el6_0.1
samba-client
3.5.4-68.el6_0.1
samba-common
3.5.4-68.el6_0.1
samba-doc
3.5.4-68.el6_0.1
samba-domainjoin-gui
3.5.4-68.el6_0.1
samba-swat
3.5.4-68.el6_0.1
samba-winbind
3.5.4-68.el6_0.1
samba-winbind-clients
3.5.4-68.el6_0.1
samba-winbind-devel
3.5.4-68.el6_0.1
Oracle Linux i686
libsmbclient
3.5.4-68.el6_0.1
libsmbclient-devel
3.5.4-68.el6_0.1
samba
3.5.4-68.el6_0.1
samba-client
3.5.4-68.el6_0.1
samba-common
3.5.4-68.el6_0.1
samba-doc
3.5.4-68.el6_0.1
samba-domainjoin-gui
3.5.4-68.el6_0.1
samba-swat
3.5.4-68.el6_0.1
samba-winbind
3.5.4-68.el6_0.1
samba-winbind-clients
3.5.4-68.el6_0.1
samba-winbind-devel
3.5.4-68.el6_0.1
Связанные CVE
Связанные уязвимости
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse ...
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.