You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa samba

Sigurnosni nedostaci programskog paketa samba

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-4271-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 14, 2018 https://www.debian.org/security/faq
– ————————————————————————-

Package : samba
CVE ID : CVE-2018-10858 CVE-2018-10919

Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following issues:

CVE-2018-10858

Svyatoslav Phirsov discovered that insufficient input validation in
libsmbclient allowed a malicious Samba server to write to the
client’s heap memory.

CVE-2018-10919

Phillip Kuhrt discovered that Samba when acting as an Active Domain
controller disclosed some sensitive attributes.

For the stable distribution (stretch), these problems have been fixed in
version 2:4.5.12+dfsg-2+deb9u3.

We recommend that you upgrade your samba packages.

For the detailed security status of samba please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/samba

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
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=jcl0
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa gdm3

Otkriven je sigurnosni nedostatak u programskom paketu gdm3 za operacijski sustav Debian. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja...

Close