Well known, at least by me. RedHat, Slack and SuSE already patched their files.
On 2/9/07, JJDaNiMoTh <[EMAIL PROTECTED]> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > I'm not a security team member ( I'm not sure that exist this > 'security team' :D ) but I try :D > > - ------------------------------------------------------------ > Arch Linux Security Warning ALSW 2007-#1 > - ------------------------------------------------------------ > > Name: Samba > Date: 05/02/2007 > Severity: 2 > Warning #: 2007-#1 > > - ------------------------------------------------------------ > > Product Background > =================== > Samba is an Open Source/Free Software suite that has, since 1992, > provided file and print services to all manner of SMB/CIFS clients, > including the numerous versions of Microsoft Windows operating systems. > > > Problem Background > =================== > > CVE-2007-0452: smbd in Samba 3.0.6 through 3.0.23d allows remote > authenticated users > to cause a denial of service (memory and CPU exhaustion) by renaming a > file in a way that prevents a request from being removed from the > deferred open queue, which triggers an infinite loop. > > > CVE-2007-0453: Buffer overflow in the nss_winbind.so.1 library in > Samba 3.0.21 > through 3.0.23d, as used in the winbindd daemon on Solaris, allows > attackers to execute arbitrary code via the (1) gethostbyname and (2) > getipnodebyname functions. > > > CVE-2007-0454: Format string vulnerability in the afsacl.so VFS module > in Samba 3.0.6 > through 3.0.23d allows context-dependent attackers to execute > arbitrary code via format string specifiers in a filename on an AFS > file system, which is not properly handled during Windows ACL mapping. > > > Problem Packages > =================== > - ------------------------------------------------------------------ > Package | Repo | Group | Unsafe | Safe | > - ------------------------------------------------------------------ > samba Current Network < 3.0.23-D-3 >= 3.0.24 > > Package Fix > =================== > Rebuild package with this PKGBUILD in -current, but change version to > 3.0.24. You can find source at > http://samba.org/samba/ftp/samba-3.0.24.tar.gz > > > Reference(s) > =================== > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452 > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453 > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454 > > > > Contact > =================== > JJDaNiMoTh (jjdanimoth AT gmail DOT com) > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.6 (GNU/Linux) > Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org > > iD8DBQFFzKlqcJj0HNhER0MRAoeAAKCSwI6X+5rCHDdv/q+Rbsf+E5FGnwCglXpx > VGSVx9auggyCb0Gi+OOdG0I= > =Uolb > -----END PGP SIGNATURE----- > > > _______________________________________________ > arch mailing list > [email protected] > http://www.archlinux.org/mailman/listinfo/arch > _______________________________________________ arch mailing list [email protected] http://www.archlinux.org/mailman/listinfo/arch
