SUSE Security Update: Security update for Samba ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0501-2 Rating: critical References: #752797 Cross-References: CVE-2012-1182 Affected Products: SUSE CORE 9 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: A remote code execution flaw in Samba has been fixed: * CVE-2012-1182: PIDL based autogenerated code uses client supplied size values which allows attackers to write beyond the allocated array size Security Issue reference: * CVE-2012-1182 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182
Package List: - SUSE CORE 9 (i586 s390 s390x x86_64): libsmbclient-3.0.26a-0.23 libsmbclient-devel-3.0.26a-0.23 samba-3.0.26a-0.23 samba-client-3.0.26a-0.23 samba-doc-3.0.26a-0.23 samba-pdb-3.0.26a-0.23 samba-python-3.0.26a-0.23 samba-vscan-0.3.6b-0.51 samba-winbind-3.0.26a-0.23 - SUSE CORE 9 (x86_64): libsmbclient-32bit-9-201204111235 samba-32bit-9-201204111235 samba-client-32bit-9-201204111235 samba-winbind-32bit-9-201204111235 - SUSE CORE 9 (s390x): libsmbclient-32bit-9-201204111252 samba-32bit-9-201204111252 samba-client-32bit-9-201204111252 samba-winbind-32bit-9-201204111252 References: http://support.novell.com/security/cve/CVE-2012-1182.html https://bugzilla.novell.com/752797 http://download.novell.com/patch/finder/?keywords=a2cf0eaa66df512b4acca53cc9... -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org