[sflack-security] samba (SFSA:2007-038-01)

[sflack-security]  samba (SFSA:2007-038-01)

In according to slackware-security a new samba packages,
are available for Sflack 11.0, to fix denial of service security issues.

More details about the issues fixed in Samba 3.0.24 may be found in the
Common Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454


Here are the details from the Sflack 11.0 ChangeLog:
+--------------------------+
2007-02-08 patches/packages/samba-3.0.24-x86_64-1_sflack11.0.tgz:

* Upgraded to samba-3.0.24. From the WHATSNEW.txt file:
"Important issues addressed in 3.0.24 include:
o Fixes for the following security advisories:
- CVE-2007-0452 (Potential Denial of Service bug in smbd)
- CVE-2007-0453 (Buffer overrun in NSS host lookup Winbind
NSS library on Solaris)
- CVE-2007-0454 (Format string bug in afsacl.so VFS plugin)"
Samba is Slackware is vulnerable to the first issue, which can
cause smbd to enter into an infinite loop, disrupting Samba services.
Linux is not vulnerable to the second issue, and Slackware does not
ship the afsacl.so VFS plugin (but it's something to be aware of
if you build Samba with custom options).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454
(* Security fix *)
+--------------------------+

Sflack Linux Security Team
http://sflack.com/gpg-key
security a sflack.com