-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  samba (SSA:2007-038-01)

New samba packages are available for Slackware 10.0, 10.1, 10.2,
and 11.0 to fix a denial-of-service security issue.

More details about the issues fixed in Samba 3.0.24 may be found in the
Common Vulnerabilities and Exposures (CVE) database:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454


Here are the details from the Slackware 11.0 ChangeLog:
+--------------------------+
patches/packages/samba-3.0.24-i486-1_slack11.0.tgz:
  Upgraded to samba-3.0.24.  From the WHATSNEW.txt file:
    "Important issues addressed in 3.0.24 include:
     o Fixes for the following security advisories:
       - CVE-2007-0452 (Potential Denial of Service bug in smbd)
       - CVE-2007-0453 (Buffer overrun in NSS host lookup Winbind
         NSS library on Solaris)
       - CVE-2007-0454 (Format string bug in afsacl.so VFS plugin)"
  Samba is Slackware is vulnerable to the first issue, which can cause smbd
  to enter into an infinite loop, disrupting Samba services.  Linux is not
  vulnerable to the second issue, and Slackware does not ship the afsacl.so
  VFS plugin (but it's something to be aware of if you build Samba with
  custom options).
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

HINT:  Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try.  This is another primary FTP site
for Slackware that can be considerably faster than downloading
from ftp.slackware.com.

Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating additional FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.

Updated package for Slackware 10.0:

Updated package for Slackware 10.1:

Updated package for Slackware 10.2:

Updated package for Slackware 11.0:


MD5 signatures:
+-------------+

Slackware 10.0 package:
e845effc7048393b56069a09350eda68  samba-3.0.24-i486-1_slack10.0.tgz

Slackware 10.1 package:
907e0f0351a362381afd9dd627970e11  samba-3.0.24-i486-1_slack10.1.tgz

Slackware 10.2 package:
3b72e21a7e43ea9726e0147560b5f077  samba-3.0.24-i486-1_slack10.2.tgz

Slackware 11.0 package:
c17312f0537f36098f23351366b10a09  samba-3.0.24-i486-1_slack11.0.tgz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg samba-3.0.24-i486-1_slack11.0.tgz

Restart Samba:
sh /etc/rc.d/rc.samba restart


+-----+

Slackware: 2007-038-01: samba Security Update

February 7, 2007
New samba packages are available for Slackware 10.0, 10.1, 10.2, and 11.0 to fix a denial-of-service security issue

Summary

Here are the details from the Slackware 11.0 ChangeLog: patches/packages/samba-3.0.24-i486-1_slack11.0.tgz: Upgraded to samba-3.0.24. From the WHATSNEW.txt file: "Important issues addressed in 3.0.24 include: o Fixes for the following security advisories: - CVE-2007-0452 (Potential Denial of Service bug in smbd) - CVE-2007-0453 (Buffer overrun in NSS host lookup Winbind NSS library on Solaris) - CVE-2007-0454 (Format string bug in afsacl.so VFS plugin)" Samba is Slackware is vulnerable to the first issue, which can cause smbd to enter into an infinite loop, disrupting Samba services. Linux is not vulnerable to the second issue, and Slackware does not ship the afsacl.so VFS plugin (but it's something to be aware of if you build Samba with custom options). For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454 (* Security fix *)

Where Find New Packages

HINT: Getting slow download speeds from ftp.slackware.com? Give slackware.osuosl.org a try. This is another primary FTP site for Slackware that can be considerably faster than downloading from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab (https://osuosl.org/) for donating additional FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for additional mirror sites near you.
Updated package for Slackware 10.0:
Updated package for Slackware 10.1:
Updated package for Slackware 10.2:
Updated package for Slackware 11.0:

MD5 Signatures

Slackware 10.0 package: e845effc7048393b56069a09350eda68 samba-3.0.24-i486-1_slack10.0.tgz
Slackware 10.1 package: 907e0f0351a362381afd9dd627970e11 samba-3.0.24-i486-1_slack10.1.tgz
Slackware 10.2 package: 3b72e21a7e43ea9726e0147560b5f077 samba-3.0.24-i486-1_slack10.2.tgz
Slackware 11.0 package: c17312f0537f36098f23351366b10a09 samba-3.0.24-i486-1_slack11.0.tgz

Severity
[slackware-security] samba (SSA:2007-038-01)
New samba packages are available for Slackware 10.0, 10.1, 10.2, and 11.0 to fix a denial-of-service security issue.
More details about the issues fixed in Samba 3.0.24 may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454

Installation Instructions

Installation instructions: Upgrade the package as root: # upgradepkg samba-3.0.24-i486-1_slack11.0.tgz Restart Samba: sh /etc/rc.d/rc.samba restart

Related News