You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa samba

Sigurnosni nedostaci programskog paketa samba

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

SUSE Security Update: Security update for samba
______________________________________________________________________________

Announcement ID: SUSE-SU-2016:0032-1
Rating: important
References: #295284 #773464 #901813 #912457 #913304 #934299
#948244 #949022 #958582 #958583 #958584 #958586

Cross-References: CVE-2015-5252 CVE-2015-5296 CVE-2015-5299
CVE-2015-5330
Affected Products:
SUSE Linux Enterprise Server 11-SP2-LTSS
SUSE Linux Enterprise Debuginfo 11-SP2
______________________________________________________________________________

An update that solves four vulnerabilities and has 8 fixes
is now available.

Description:

This update for Samba fixes the following security issues:

– CVE-2015-5330: Remote read memory exploit in LDB (bnc#958586).
– CVE-2015-5252: Insufficient symlink verification (file access outside
the share) (bnc#958582).
– CVE-2015-5296: No man in the middle protection when forcing smb
encryption on the client side (bnc#958584).
– CVE-2015-5299: Currently the snapshot browsing is not secure thru
windows previous version (shadow_copy2) (bnc#958583).

Non-security issues fixed:

– Prevent null pointer access in samlogon fallback when security
credentials are null (bnc#949022).
– Address unrecoverable winbind failure: “key length too large”
(bnc#934299).
– Take resource group sids into account when caching netsamlogon data
(bnc#912457).
– Use domain name if search by domain SID fails to send SIDHistory lookups
to correct idmap backend (bnc#773464).
– Remove deprecated base_rid example from idmap_rid manpage (bnc#913304).
– Purge printer name cache on spoolss SetPrinter change (bnc#901813).
– Fix lookup of groups with “Local Domain” scope from Active Directory
(bnc#948244).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 11-SP2-LTSS:

zypper in -t patch slessp2-samba-12297=1

– SUSE Linux Enterprise Debuginfo 11-SP2:

zypper in -t patch dbgsp2-samba-12297=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):

ldapsmb-1.34b-45.2
libldb1-3.6.3-45.2
libsmbclient0-3.6.3-45.2
libtalloc2-3.6.3-45.2
libtdb1-3.6.3-45.2
libtevent0-3.6.3-45.2
libwbclient0-3.6.3-45.2
samba-3.6.3-45.2
samba-client-3.6.3-45.2
samba-krb-printing-3.6.3-45.2
samba-winbind-3.6.3-45.2

– SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64):

libsmbclient0-32bit-3.6.3-45.2
libtalloc2-32bit-3.6.3-45.2
libtdb1-32bit-3.6.3-45.2
libtevent0-32bit-3.6.3-45.2
libwbclient0-32bit-3.6.3-45.2
samba-32bit-3.6.3-45.2
samba-client-32bit-3.6.3-45.2
samba-winbind-32bit-3.6.3-45.2

– SUSE Linux Enterprise Server 11-SP2-LTSS (noarch):

samba-doc-3.6.3-45.2

– SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64):

samba-debuginfo-3.6.3-45.2
samba-debugsource-3.6.3-45.2

– SUSE Linux Enterprise Debuginfo 11-SP2 (s390x x86_64):

samba-debuginfo-32bit-3.6.3-45.2

References:

https://www.suse.com/security/cve/CVE-2015-5252.html
https://www.suse.com/security/cve/CVE-2015-5296.html
https://www.suse.com/security/cve/CVE-2015-5299.html
https://www.suse.com/security/cve/CVE-2015-5330.html
https://bugzilla.suse.com/295284
https://bugzilla.suse.com/773464
https://bugzilla.suse.com/901813
https://bugzilla.suse.com/912457
https://bugzilla.suse.com/913304
https://bugzilla.suse.com/934299
https://bugzilla.suse.com/948244
https://bugzilla.suse.com/949022
https://bugzilla.suse.com/958582
https://bugzilla.suse.com/958583
https://bugzilla.suse.com/958584
https://bugzilla.suse.com/958586


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorMarko Stanec
Cert idNCERT-REF-2016-01-0003-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa quassel

Otkriven je sigurnosni nedostatak u programskom paketu quassel za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim udaljenim napadačima omogućuje izvođenje napada...

Close