|
|
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] samba (SSA:2023-334-01)
Date: Thu, 30 Nov 2023 13:22:23 -0800 (PST) |
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] samba (SSA:2023-334-01)
New samba packages are available for Slackware 15.0 and -current to
fix a security issue.
Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/samba-4.18.9-i586-1_slack15.0.txz: Upgraded.
This is a security release in order to address the following defect:
An information leak vulnerability was discovered in Samba's LDAP server.
Due to missing access control checks, an authenticated but unprivileged
attacker could discover the names and preserved attributes of deleted objects
in the LDAP store. Upgrading to this package will not prevent this
information leak - if you are using Samba as an Active Directory Domain
Controller, you will need to follow the instructions in the samba.org link
given below.
For more information, see:
https://www.samba.org/samba/security/CVE-2018-14628.html
https://www.cve.org/CVERecord?id=CVE-2018-14628
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/samba-4.18.9-i586-1_slack15.0.txz
Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/samba-4.18.9-x86_64-1_slack15.0.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/samba-4.19.3-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/samba-4.19.3-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 15.0 package:
f73bf7dc7dc0ac254840a236d609bda2 samba-4.18.9-i586-1_slack15.0.txz
Slackware x86_64 15.0 package:
152b8d8fcc261ae89effaf5181b54243 samba-4.18.9-x86_64-1_slack15.0.txz
Slackware -current package:
f9874a7129f05b59febd0c85a61488c3 n/samba-4.19.3-i586-1.txz
Slackware x86_64 -current package:
e91fa8957a4400c3218f309a22a2e8eb n/samba-4.19.3-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg samba-4.18.9-i586-1_slack15.0.txz
If you are concerned about the information leak, please follow the additional
instructions found at this link:
https://www.samba.org/samba/security/CVE-2018-14628.html
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
iEYEARECAAYFAmVo/JAACgkQakRjwEAQIjNuDQCgi428hSu7N++t17jO/2lrLneT
Sf4AnAuw9pL9PChiF/AVAWrm3daR+i0A
=ig8a
-----END PGP SIGNATURE-----
|
| |