Описание
ELSA-2012-0465: samba security update (CRITICAL)
[3.5.10-115]
- Security Release, fixes CVE-2012-1182
- resolves: #804644
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
libsmbclient
3.0.33-3.39.el5_8
libsmbclient-devel
3.0.33-3.39.el5_8
samba
3.0.33-3.39.el5_8
samba-client
3.0.33-3.39.el5_8
samba-common
3.0.33-3.39.el5_8
samba-swat
3.0.33-3.39.el5_8
Oracle Linux x86_64
libsmbclient
3.0.33-3.39.el5_8
libsmbclient-devel
3.0.33-3.39.el5_8
samba
3.0.33-3.39.el5_8
samba-client
3.0.33-3.39.el5_8
samba-common
3.0.33-3.39.el5_8
samba-swat
3.0.33-3.39.el5_8
Oracle Linux i386
libsmbclient
3.0.33-3.39.el5_8
libsmbclient-devel
3.0.33-3.39.el5_8
samba
3.0.33-3.39.el5_8
samba-client
3.0.33-3.39.el5_8
samba-common
3.0.33-3.39.el5_8
samba-swat
3.0.33-3.39.el5_8
Oracle Linux 6
Oracle Linux x86_64
libsmbclient
3.5.10-115.el6_2
libsmbclient-devel
3.5.10-115.el6_2
samba
3.5.10-115.el6_2
samba-client
3.5.10-115.el6_2
samba-common
3.5.10-115.el6_2
samba-doc
3.5.10-115.el6_2
samba-domainjoin-gui
3.5.10-115.el6_2
samba-swat
3.5.10-115.el6_2
samba-winbind
3.5.10-115.el6_2
samba-winbind-clients
3.5.10-115.el6_2
samba-winbind-devel
3.5.10-115.el6_2
samba-winbind-krb5-locator
3.5.10-115.el6_2
Oracle Linux i686
libsmbclient
3.5.10-115.el6_2
libsmbclient-devel
3.5.10-115.el6_2
samba
3.5.10-115.el6_2
samba-client
3.5.10-115.el6_2
samba-common
3.5.10-115.el6_2
samba-doc
3.5.10-115.el6_2
samba-domainjoin-gui
3.5.10-115.el6_2
samba-swat
3.5.10-115.el6_2
samba-winbind
3.5.10-115.el6_2
samba-winbind-clients
3.5.10-115.el6_2
samba-winbind-devel
3.5.10-115.el6_2
samba-winbind-krb5-locator
3.5.10-115.el6_2
Связанные CVE
Связанные уязвимости
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14 ...
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.