Critical samba security update regarding buffer overflows and group ID assignment flaws
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Critical: samba security update | 4 Dec 200700:00 | – | oraclelinux |
![]() | Critical: samba security update | 23 Nov 200700:00 | – | oraclelinux |
![]() | Critical: samba security update | 16 Nov 200700:00 | – | oraclelinux |
![]() | Critical: samba security and bug fix update | 10 Dec 200700:00 | – | oraclelinux |
![]() | samba security update | 15 Nov 200718:56 | – | centos |
![]() | samba security update | 15 Nov 200719:31 | – | centos |
![]() | samba security update | 15 Nov 200723:26 | – | centos |
![]() | samba security update | 10 Dec 200719:26 | – | centos |
![]() | samba security update | 11 Dec 200701:23 | – | centos |
![]() | RHEL 5 : samba (RHSA-2007:1017) | 16 Nov 200700:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | ia64 | samba | 3.0.25b-1.el5_1.2 | samba-3.0.25b-1.el5_1.2.ia64.rpm |
RedHat | 5 | s390x | samba-swat | 3.0.25b-1.el5_1.2 | samba-swat-3.0.25b-1.el5_1.2.s390x.rpm |
RedHat | 5 | i386 | samba-common | 3.0.25b-1.el5_1.2 | samba-common-3.0.25b-1.el5_1.2.i386.rpm |
RedHat | 5 | s390x | samba-client | 3.0.25b-1.el5_1.2 | samba-client-3.0.25b-1.el5_1.2.s390x.rpm |
RedHat | 5 | s390 | samba-common | 3.0.25b-1.el5_1.2 | samba-common-3.0.25b-1.el5_1.2.s390.rpm |
RedHat | 5 | ppc | samba-swat | 3.0.25b-1.el5_1.2 | samba-swat-3.0.25b-1.el5_1.2.ppc.rpm |
RedHat | 5 | x86_64 | samba-swat | 3.0.25b-1.el5_1.2 | samba-swat-3.0.25b-1.el5_1.2.x86_64.rpm |
RedHat | 5 | src | samba | 3.0.25b-1.el5_1.2 | samba-3.0.25b-1.el5_1.2.src.rpm |
RedHat | 5 | x86_64 | samba | 3.0.25b-1.el5_1.2 | samba-3.0.25b-1.el5_1.2.x86_64.rpm |
RedHat | 5 | ppc | samba-client | 3.0.25b-1.el5_1.2 | samba-client-3.0.25b-1.el5_1.2.ppc.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo