Описание
ELSA-2012-0466: samba3x security update (CRITICAL)
[3.5.10-0.108]
- Security Release, fixes CVE-2012-1182
- resolves: #804650
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
samba3x
3.5.10-0.108.el5_8
samba3x-client
3.5.10-0.108.el5_8
samba3x-common
3.5.10-0.108.el5_8
samba3x-doc
3.5.10-0.108.el5_8
samba3x-domainjoin-gui
3.5.10-0.108.el5_8
samba3x-swat
3.5.10-0.108.el5_8
samba3x-winbind
3.5.10-0.108.el5_8
samba3x-winbind-devel
3.5.10-0.108.el5_8
Oracle Linux x86_64
samba3x
3.5.10-0.108.el5_8
samba3x-client
3.5.10-0.108.el5_8
samba3x-common
3.5.10-0.108.el5_8
samba3x-doc
3.5.10-0.108.el5_8
samba3x-domainjoin-gui
3.5.10-0.108.el5_8
samba3x-swat
3.5.10-0.108.el5_8
samba3x-winbind
3.5.10-0.108.el5_8
samba3x-winbind-devel
3.5.10-0.108.el5_8
Oracle Linux i386
samba3x
3.5.10-0.108.el5_8
samba3x-client
3.5.10-0.108.el5_8
samba3x-common
3.5.10-0.108.el5_8
samba3x-doc
3.5.10-0.108.el5_8
samba3x-domainjoin-gui
3.5.10-0.108.el5_8
samba3x-swat
3.5.10-0.108.el5_8
samba3x-winbind
3.5.10-0.108.el5_8
samba3x-winbind-devel
3.5.10-0.108.el5_8
Связанные CVE
Связанные уязвимости
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14 ...
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.