SUSE Security Update: Security update for Samba ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0501-1 Rating: critical References: #752797 Cross-References: CVE-2012-1182 Affected Products: SUSE Linux Enterprise Server 10 SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. It includes one version update. Description: A remote code execution flaw in Samba has been fixed: * CVE-2012-1182: PIDL based autogenerated code uses client supplied size values which allows attackers to write beyond the allocated array size Security Issue reference: * CVE-2012-1182 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182
Package List: - SUSE Linux Enterprise Server 10 SP2 (i586 s390x x86_64) [New Version: 3.0.32]: cifs-mount-3.0.32-0.22.1 libmsrpc-3.0.32-0.22.1 libmsrpc-devel-3.0.32-0.22.1 libsmbclient-3.0.32-0.22.1 libsmbclient-devel-3.0.32-0.22.1 samba-3.0.32-0.22.1 samba-client-3.0.32-0.22.1 samba-krb-printing-3.0.32-0.22.1 samba-python-3.0.32-0.22.1 samba-vscan-0.3.6b-42.85.22.1 samba-winbind-3.0.32-0.22.1 - SUSE Linux Enterprise Server 10 SP2 (s390x x86_64) [New Version: 3.0.32]: libsmbclient-32bit-3.0.32-0.22.1 samba-32bit-3.0.32-0.22.1 samba-client-32bit-3.0.32-0.22.1 samba-winbind-32bit-3.0.32-0.22.1 - SUSE Linux Enterprise Server 10 SP2 (noarch) [New Version: 3.0.32]: samba-doc-3.0.32-0.22.1 References: http://support.novell.com/security/cve/CVE-2012-1182.html https://bugzilla.novell.com/752797 http://download.novell.com/patch/finder/?keywords=5b844721c4336f27fc2fd22911... -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org