similar to: [SAMBA-SECURITY] CVE-2007-0454: Format string bug in afsacl.so VFS plugin

Displaying 20 results from an estimated 200 matches similar to: "[SAMBA-SECURITY] CVE-2007-0454: Format string bug in afsacl.so VFS plugin"

2007 Feb 05
0
[SAMBA-SECURITY] CVE-2007-0454: Format string bug in afsacl.so VFS plugin
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ========================================================== == == Subject: Format string bug in afsacl.so VFS plugin. == CVE ID#: CVE-2007-0454 == == Versions: The AFS ACL mapping VFS plugin distributed == in Samba 3.0.6 - 3.0.23d (inclusive) == == Summary: The name of a file on the server's share == is used as the format string
2006 Jun 19
2
3.0.23 + afsacl build problem
Hi! I've tried to compile samba 3.0.23rc2 --with-vfs-afsacl --fake-kaserver, but I've got errors. The first error and its solution is: I've to add -lssl to the LIBS line in the top level Makefile. Then I've got this: Compiling modules/vfs_afsacl.c with -fPIC modules/vfs_afsacl.c: In function `new_afs_ace': modules/vfs_afsacl.c:145: warning: passing arg 2 of
2008 Mar 03
1
fun with compiling samba
Hi Guys, Please look at this when making after configuring on SLES9 make: *** No rule to make target `modules/vfs_afsacl.po', needed by `bin/afsacl.so'. Stop. samba-3.0.28/source ./configure --with-smbmount --with-cifsmount --with-acl-support --with-winbind --with-vfs-afsacl --with-quotas --with-ldap this is the only other reference I have to it.. :|
2007 Feb 05
2
Samba 3.0.24 Available for Download
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================== I can say 'no' in 4 different languages. -- Jeremy Allison ============================================================== Release Announcements ===================== This is the latest stable release of Samba. This
2007 Feb 08
1
Announcement Sernet Samba 3.0.24 packages
With a little delay, here's the announcement for out 3.0.24 packages. English version below. Samba 3.0.24 ist soeben ver?ffentlicht worden. RPM-Pakete f?r diverse SUSE und RedHat-Versionen sowie f?r Debian GNU/Linux k?nnen von http://ftp.sernet.de/pub/samba/ heruntergeladen werden. Pakete f?r S390 folgen in K?rze. Dieses Samba-Release behebt einige Fehler, darunter: * einen
2007 Feb 05
0
Samba 3.0.24 Available for Download
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================== I can say 'no' in 4 different languages. -- Jeremy Allison ============================================================== Release Announcements ===================== This is the latest stable release of Samba. This
2016 Aug 26
2
Issue with acl_xattr:ignore system acls in 4.5rc2
On Fri, Aug 26, 2016 at 06:44:05PM +0200, Ralph Böhme wrote: > > Cheerio! > -slow Still reviewing this - but a few things that will need changing: When adding the validate_nt_acl_blob() function in [PATCH 06/12] vfs_acl_common: move the ACL blob validation to a helper function this makes some of the existing function names in debug statements incorrect. Eg. validate_nt_acl_blob()
2016 Aug 29
1
Issue with acl_xattr:ignore system acls in 4.5rc2
On Sat, Aug 27, 2016 at 12:46:12PM +0200, Ralph Böhme via samba wrote: > > ...and this one even has bug urls in all commit messages. Sorry for > forgetting this in the previous version. Juuuusttt *one* leetle change, sorry :-). I was following the changes to the talloc heirarchy in the code and realized that adding the following change made it much clearer (at least to me). diff --git
2005 May 17
3
Linux integration with AD
Hi All, I extended my AD schema (SFU 3.5) and migrated the users and groups from my NIS domain. The groups migrated from the NIS have the same GID like on the NIS. I added linux machines to my AD domain using windbind, and define on the smb.conf "idmap gid = 10000-20000". I logged in using my AD user account, and when I'm doing "id", I see that all the AD groups
2013 Apr 09
0
[Announce] Samba 4.0.5 Available for Download
===================================================================== "Well it takes a certain kind of girl to wear a backless dress with a Beretta 70 strapped to her thigh." James Bond, Skyfall ===================================================================== Release Announcements --------------------- This is is the latest stable release of Samba 4.0. Major
2013 Apr 09
0
[Announce] Samba 4.0.5 Available for Download
===================================================================== "Well it takes a certain kind of girl to wear a backless dress with a Beretta 70 strapped to her thigh." James Bond, Skyfall ===================================================================== Release Announcements --------------------- This is is the latest stable release of Samba 4.0. Major
2012 Apr 05
0
CEBA-2012:0454 CentOS 6 vim FASTTRACK Update
CentOS Errata and Bugfix Advisory 2012:0454 Upstream details at : https://rhn.redhat.com/errata/RHBA-2012-0454.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: f5fb381c68dac283a214458c704c4bce8eba4a6c636f9d1b7672f54912e18bc9 vim-common-7.2.411-1.8.el6.i686.rpm
2011 Apr 19
0
CEBA-2011:0454 CentOS 5 i386 xorg-x11-server-utils Update
CentOS Errata and Bugfix Advisory 2011:0454 Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-0454.html The following updated files have been uploaded and are currently syncing to the mirrors: ( md5sum Filename ) i386: 0d84f1cddd122e4acd07ff97d6aa77b6 xorg-x11-server-utils-7.1-5.el5_6.2.i386.rpm Source: 31e595799f2a3c6350bd606f11720ec2
2011 Apr 19
0
CEBA-2011:0454 CentOS 5 x86_64 xorg-x11-server-utils Update
CentOS Errata and Bugfix Advisory 2011:0454 Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-0454.html The following updated files have been uploaded and are currently syncing to the mirrors: ( md5sum Filename ) x86_64: a53d9622b017125cd7750fdb4ba831fa xorg-x11-server-utils-7.1-5.el5_6.2.x86_64.rpm Source: 31e595799f2a3c6350bd606f11720ec2
2017 Mar 08
0
CESA-2017:0454 Important CentOS 5 kvm Security Update
CentOS Errata and Security Advisory 2017:0454 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0454.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 0e34501fb214585a504064e6aa4e92d8c6324981104fd7a29edc6f918e5cb238 kmod-kvm-83-277.el5.centos.x86_64.rpm
2016 Mar 09
0
mkdir-dup test flapping
On Wed, Mar 09, 2016 at 04:11:05PM +1300, Douglas Bagnall wrote: > We looked at this some more, and Andrew seemed to understand and wrote > the attached patch. Great catch you guys ! Thanks for taking a look, I've been busy on other stuff for the past few weeks. Let me go through the issue and proposed code *really* carefully :-). The open code can be really tricky (as you've
2002 May 09
1
patch to configure.in for Solaris/gcc (-KPIC vs. -fPIC)
To Solaris admins.... Here's a patch for 2.2.4 for building on Solaris using GCC. You'll need to rerun autoconf after applying.... The second patch removes compiler warnings about redefinitions of ZERO_STRUCT. Now winbind should compile on solaris quietly. cheers, jerry --------------------------------------------------------------------- Hewlett-Packard
2007 Feb 05
0
[SAMBA-SECURITY] CVE-2007-0453: Buffer overrun in nss_winbind.so.1 on Solaris
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ========================================================== == == Subject: Buffer overrun in NSS host lookup Winbind == library on Solaris == CVE ID#: CVE-2007-0453 == == Versions: Samba 3.0.21 - 3.0.23d (inclusive) running on == Sun Solaris == == Summary: A potential overrun in the gethostbyname() == and getipnodebyname() in the
2007 Feb 05
0
[SAMBA-SECURITY] CVE-2007-0453: Buffer overrun in nss_winbind.so.1 on Solaris
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ========================================================== == == Subject: Buffer overrun in NSS host lookup Winbind == library on Solaris == CVE ID#: CVE-2007-0453 == == Versions: Samba 3.0.21 - 3.0.23d (inclusive) running on == Sun Solaris == == Summary: A potential overrun in the gethostbyname() == and getipnodebyname() in the
2016 Mar 09
4
mkdir-dup test flapping
We looked at this some more, and Andrew seemed to understand and wrote the attached patch. > > We got the logs by forcing smbd to run with -d10 by patching > file_server/fileserver.c. The issue appears to be in this call: 3638 /* Ensure there was no race condition. */ 3639 if (!check_same_stat(&smb_dname->st, &fsp->fsp_name->st)) { 3640