Sebastian Krahmer, SuSE Security Team, reviewed security-critical parts of the Samba server within the scope of security audits that the SuSE Security Team conducts on a regular basis for security-critical Open Source Software. Buffer overflows and a chown race condition have been discovered and fixed during the security audit. The buffer overflow vulnerabilitiy allows a remote attacker to execute arbitrary commands as root on the system running samba. In addition to the flaws fixed in the samba server, some overflow conditions in the samba-client package have been fixed with the available update packages. It is strongly recommended to install the update packages on a system where the samba package is used.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE | 7.3 | ppc | samba | < 2.2.1a-147 | samba-2.2.1a-147.ppc.rpm |
openSUSE | 7.1 | i386 | samba | < 2.0.10-27 | samba-2.0.10-27.i386.rpm |
openSUSE | 8.0 | i386 | samba-client | < 2.2.3a-169 | samba-client-2.2.3a-169.i386.rpm |
openSUSE | 7.2 | i386 | smbclnt | < 2.2.0a-48 | smbclnt-2.2.0a-48.i386.rpm |
openSUSE | 7.1 | ppc | samba | < 2.0.10-21 | samba-2.0.10-21.ppc.rpm |
openSUSE | 7.2 | i386 | samba | < 2.2.0a-48 | samba-2.2.0a-48.i386.rpm |
openSUSE | 8.1 | i586 | samba | < 2.2.5-160 | samba-2.2.5-160.i586.rpm |
openSUSE | 7.1 | ppc | smbclnt | < 2.0.10-21 | smbclnt-2.0.10-21.ppc.rpm |
openSUSE | 7.3 | i386 | samba-client | < 2.2.1a-213 | samba-client-2.2.1a-213.i386.rpm |
openSUSE | 7.1 | alpha | smbclnt | < 2.0.10-21 | smbclnt-2.0.10-21.alpha.rpm |