Debian Linux Security Advisory 4271-1 - Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix.
1cd23e688938ba7d5034395ba01b18fc3d061baf0c1802c7177355634269b102
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4271-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 14, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : samba
CVE ID : CVE-2018-10858 CVE-2018-10919
Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following issues:
CVE-2018-10858
Svyatoslav Phirsov discovered that insufficient input validation in
libsmbclient allowed a malicious Samba server to write to the
client's heap memory.
CVE-2018-10919
Phillip Kuhrt discovered that Samba when acting as an Active Domain
controller disclosed some sensitive attributes.
For the stable distribution (stretch), these problems have been fixed in
version 2:4.5.12+dfsg-2+deb9u3.
We recommend that you upgrade your samba packages.
For the detailed security status of samba please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/samba
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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jcl0
-----END PGP SIGNATURE-----