Updated samba packages are available for Red Hat Enterprise Linux 2.1
----------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Updated samba packages fix vulnerability
Advisory ID: RHSA-2004:404-01
Issue date: 2004-07-26
Updated on: 2004-07-26
Product: Red Hat Enterprise Linux
Keywords: smb
CVE Names: CAN-2004-0686
----------------------------------------------------------------------
1. Summary:
Updated samba packages that fix a buffer overflow issue are now available.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
3. Problem description:
Samba provides file and printer sharing services to SMB/CIFS clients.
The Samba team discovered a buffer overflow in the code used to support the 'mangling method = hash' smb.conf option. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0686 to this issue.
All users of Samba should upgrade to these updated packages, which contain an upgrade to Samba-2.2.10, which is not vulnerable to this issue.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/samba-2.2.10-1.21as.1.src.rpm
1ee2bacd36e372f10b99162385299c3f samba-2.2.10-1.21as.1.src.rpm
i386:
f518e625fc9de6d34c397b09cf26d565 samba-2.2.10-1.21as.1.i386.rpm
74ce0506f42a07bc967d6e26fa23c981 samba-client-2.2.10-1.21as.1.i386.rpm
f25de670ff892be92aaa7c51d14e0eb5 samba-common-2.2.10-1.21as.1.i386.rpm
d0243bc57d8f6a76d11ee5707d1d9333 samba-swat-2.2.10-1.21as.1.i386.rpm
ia64:
d07832bf7102b64c4083472c9b965992 samba-2.2.10-1.21as.1.ia64.rpm
1ac0c3cb43cb044d1a677fcac3dc839e samba-client-2.2.10-1.21as.1.ia64.rpm
65cba5ff09bd7e0f140fce2618d19ebc samba-common-2.2.10-1.21as.1.ia64.rpm
a45106d65cd86f8ff6be66ba9604ee11 samba-swat-2.2.10-1.21as.1.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/samba-2.2.10-1.21as.1.src.rpm
1ee2bacd36e372f10b99162385299c3f samba-2.2.10-1.21as.1.src.rpm
ia64:
d07832bf7102b64c4083472c9b965992 samba-2.2.10-1.21as.1.ia64.rpm
1ac0c3cb43cb044d1a677fcac3dc839e samba-client-2.2.10-1.21as.1.ia64.rpm
65cba5ff09bd7e0f140fce2618d19ebc samba-common-2.2.10-1.21as.1.ia64.rpm
a45106d65cd86f8ff6be66ba9604ee11 samba-swat-2.2.10-1.21as.1.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/samba-2.2.10-1.21as.1.src.rpm
1ee2bacd36e372f10b99162385299c3f samba-2.2.10-1.21as.1.src.rpm
i386:
f518e625fc9de6d34c397b09cf26d565 samba-2.2.10-1.21as.1.i386.rpm
74ce0506f42a07bc967d6e26fa23c981 samba-client-2.2.10-1.21as.1.i386.rpm
f25de670ff892be92aaa7c51d14e0eb5 samba-common-2.2.10-1.21as.1.i386.rpm
d0243bc57d8f6a76d11ee5707d1d9333 samba-swat-2.2.10-1.21as.1.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/samba-2.2.10-1.21as.1.src.rpm
1ee2bacd36e372f10b99162385299c3f samba-2.2.10-1.21as.1.src.rpm
i386:
f518e625fc9de6d34c397b09cf26d565 samba-2.2.10-1.21as.1.i386.rpm
74ce0506f42a07bc967d6e26fa23c981 samba-client-2.2.10-1.21as.1.i386.rpm
f25de670ff892be92aaa7c51d14e0eb5 samba-common-2.2.10-1.21as.1.i386.rpm
d0243bc57d8f6a76d11ee5707d1d9333 samba-swat-2.2.10-1.21as.1.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package
6. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0686
7. Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact.html
Copyright 2004 Red Hat, Inc.
----------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Updated samba packages fix vulnerability
Advisory ID: RHSA-2004:404-01
Issue date: 2004-07-26
Updated on: 2004-07-26
Product: Red Hat Enterprise Linux
Keywords: smb
CVE Names: CAN-2004-0686
----------------------------------------------------------------------
1. Summary:
Updated samba packages that fix a buffer overflow issue are now available.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
3. Problem description:
Samba provides file and printer sharing services to SMB/CIFS clients.
The Samba team discovered a buffer overflow in the code used to support the 'mangling method = hash' smb.conf option. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0686 to this issue.
All users of Samba should upgrade to these updated packages, which contain an upgrade to Samba-2.2.10, which is not vulnerable to this issue.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/samba-2.2.10-1.21as.1.src.rpm
1ee2bacd36e372f10b99162385299c3f samba-2.2.10-1.21as.1.src.rpm
i386:
f518e625fc9de6d34c397b09cf26d565 samba-2.2.10-1.21as.1.i386.rpm
74ce0506f42a07bc967d6e26fa23c981 samba-client-2.2.10-1.21as.1.i386.rpm
f25de670ff892be92aaa7c51d14e0eb5 samba-common-2.2.10-1.21as.1.i386.rpm
d0243bc57d8f6a76d11ee5707d1d9333 samba-swat-2.2.10-1.21as.1.i386.rpm
ia64:
d07832bf7102b64c4083472c9b965992 samba-2.2.10-1.21as.1.ia64.rpm
1ac0c3cb43cb044d1a677fcac3dc839e samba-client-2.2.10-1.21as.1.ia64.rpm
65cba5ff09bd7e0f140fce2618d19ebc samba-common-2.2.10-1.21as.1.ia64.rpm
a45106d65cd86f8ff6be66ba9604ee11 samba-swat-2.2.10-1.21as.1.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/samba-2.2.10-1.21as.1.src.rpm
1ee2bacd36e372f10b99162385299c3f samba-2.2.10-1.21as.1.src.rpm
ia64:
d07832bf7102b64c4083472c9b965992 samba-2.2.10-1.21as.1.ia64.rpm
1ac0c3cb43cb044d1a677fcac3dc839e samba-client-2.2.10-1.21as.1.ia64.rpm
65cba5ff09bd7e0f140fce2618d19ebc samba-common-2.2.10-1.21as.1.ia64.rpm
a45106d65cd86f8ff6be66ba9604ee11 samba-swat-2.2.10-1.21as.1.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/samba-2.2.10-1.21as.1.src.rpm
1ee2bacd36e372f10b99162385299c3f samba-2.2.10-1.21as.1.src.rpm
i386:
f518e625fc9de6d34c397b09cf26d565 samba-2.2.10-1.21as.1.i386.rpm
74ce0506f42a07bc967d6e26fa23c981 samba-client-2.2.10-1.21as.1.i386.rpm
f25de670ff892be92aaa7c51d14e0eb5 samba-common-2.2.10-1.21as.1.i386.rpm
d0243bc57d8f6a76d11ee5707d1d9333 samba-swat-2.2.10-1.21as.1.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/samba-2.2.10-1.21as.1.src.rpm
1ee2bacd36e372f10b99162385299c3f samba-2.2.10-1.21as.1.src.rpm
i386:
f518e625fc9de6d34c397b09cf26d565 samba-2.2.10-1.21as.1.i386.rpm
74ce0506f42a07bc967d6e26fa23c981 samba-client-2.2.10-1.21as.1.i386.rpm
f25de670ff892be92aaa7c51d14e0eb5 samba-common-2.2.10-1.21as.1.i386.rpm
d0243bc57d8f6a76d11ee5707d1d9333 samba-swat-2.2.10-1.21as.1.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package
6. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0686
7. Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact.html
Copyright 2004 Red Hat, Inc.