Displaying 20 results from an estimated 20000 matches similar to: "[Announce] Samba 4.7.6, 4.6.14 and 4.5.16 Security Releases Available for Download"
2018 Mar 13
0
[Announce] Samba 4.7.6, 4.6.14 and 4.5.16 Security Releases Available for Download
Under what conditions are "server services = -ldap" an acceptable
workaround? would it work with a standalone AD with file sharing done
by other Samba servers?
On Tue, Mar 13, 2018 at 5:20 AM, Karolin Seeger via samba-technical
<samba-technical at lists.samba.org> wrote:
> Release Announcements
> ---------------------
>
> These are security release in order to address
2018 Mar 13
10
[Announce] Samba 4.8.0 Available for Download
========================================================
"It is time that we all see gender as a
spectrum instead of two sets of
opposing ideals. We should stop
defining each other by what we are not
and start defining ourselves by who we
are."
Emma Watson
========================================================
Release Announcements
---------------------
This is
2018 Mar 13
10
[Announce] Samba 4.8.0 Available for Download
========================================================
"It is time that we all see gender as a
spectrum instead of two sets of
opposing ideals. We should stop
defining each other by what we are not
and start defining ourselves by who we
are."
Emma Watson
========================================================
Release Announcements
---------------------
This is
2011 Sep 22
1
New CVE for Xen
There''s few CVE for Xen, are we affected, and are fixes planned for
Lenny, Squeeze and Unstable?
* A denial of service (Host Crash) in the XEN
hypervisor. (CVE-2011-2901)
* A bug was found in the way Xen handles CPUID
instruction emulation during VM exits. An unprivileged
guest user can potentially use this flaw to crash the
guest. (CVE-2011-1936)
* A 64-bit guest can get one
2019 Oct 01
1
Re: [NBDKIT SECURITY] Denial of Service / Amplification Attack in nbdkit
On 9/20/19 8:58 AM, Eric Blake wrote:
> On 9/12/19 12:41 PM, Richard W.M. Jones wrote:
>> We have discovered a potential Denial of Service / Amplification Attack
>> in nbdkit.
>
> Unfortunately, our fix for this issue cause another potential Denial of
> Service attack:
>
>>
>> Lifecycle
>> ---------
>>
>> Reported: 2019-09-11 Fixed:
2018 Mar 13
0
Samba 4.8.0 and Schema 69 support (including replication)
Hey folks,
Has anything changed with 4.8.0 with respect to replication with a Win2KR2 server?
In particular, can Samba 4.8 join a Windows 2012R2 domain (schema 69) as a DC? Will replication work properly?
Thank You!
----- Mail original -----
De: "Karolin Seeger via samba" <samba at lists.samba.org>
À: samba-announce at lists.samba.org, samba at lists.samba.org, samba-technical
2011 Feb 28
5
[Announce] Samba 3.5.7, 3.4.12 and 3.3.15 Security Releases Available
Release Announcements
=====================
Samba 3.5.7, 3.4.12 and 3.3.15 are security releases in order to
address CVE-2011-0719.
o CVE-2011-0719:
All current released versions of Samba are vulnerable to
a denial of service caused by memory corruption. Range
checks on file descriptors being used in the FD_SET macro
were not present allowing stack corruption. This can cause
the
2011 Feb 28
5
[Announce] Samba 3.5.7, 3.4.12 and 3.3.15 Security Releases Available
Release Announcements
=====================
Samba 3.5.7, 3.4.12 and 3.3.15 are security releases in order to
address CVE-2011-0719.
o CVE-2011-0719:
All current released versions of Samba are vulnerable to
a denial of service caused by memory corruption. Range
checks on file descriptors being used in the FD_SET macro
were not present allowing stack corruption. This can cause
the
2007 Nov 17
1
Bug#451626: CVE-2007-5907, CVE-2007-5906 possible denial of service vulnerability
Package: xen-3
Version: 3.1.0-1
Severity: grave
Tags: security patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xen-3.
CVE-2007-5907[0]:
| Xen 3.1.1 does not prevent modification of the CR4 TSC from
| applications, which allows pv guests to cause a denial of service
| (crash).
CVE-2007-5906[1]:
| Xen 3.1.1 allows virtual guest system users to cause a
|
2006 Sep 30
9
FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-06:22.openssh Security Advisory
The FreeBSD Project
Topic: Multiple vulnerabilities in OpenSSH
Category: contrib
Module: openssh
Announced:
2006 Sep 30
9
FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-06:22.openssh Security Advisory
The FreeBSD Project
Topic: Multiple vulnerabilities in OpenSSH
Category: contrib
Module: openssh
Announced:
2018 Nov 27
0
[Announce] Samba 4.9.3, 4.8.7 and 4.7.12 Security Releases Available
Release Announcements
---------------------
These are security releases in order to address the following defects:
o CVE-2018-14629 (Unprivileged adding of CNAME record causing loop in AD
Internal DNS server)
o CVE-2018-16841 (Double-free in Samba AD DC KDC with PKINIT)
o CVE-2018-16851 (NULL pointer de-reference in Samba AD DC LDAP server)
o CVE-2018-16852 (NULL pointer
2018 Nov 27
0
[Samba] [Announce] Samba 4.9.3, 4.8.7 and 4.7.12 Security Releases Available
Release Announcements
---------------------
These are security releases in order to address the following defects:
o CVE-2018-14629 (Unprivileged adding of CNAME record causing loop in AD
Internal DNS server)
o CVE-2018-16841 (Double-free in Samba AD DC KDC with PKINIT)
o CVE-2018-16851 (NULL pointer de-reference in Samba AD DC LDAP server)
o CVE-2018-16852 (NULL pointer
2019 Sep 12
2
[NBDKIT SECURITY] Denial of Service / Amplification Attack in nbdkit
We have discovered a potential Denial of Service / Amplification Attack
in nbdkit.
Lifecycle
---------
Reported: 2019-09-11 Fixed: 2019-09-11 Published: 2019-09-12
There is no CVE number assigned for this issue yet, but the bug is
being categorized and processed by Red Hat's security team which may
result in a CVE being published later.
Credit
------
Reported and patched by Richard W.M.
2011 Mar 04
2
remote DoS in sftp via crafted glob expressions (CVE-2010-4755)
Hi folks.
We were made aware of a MITRE CVE assignment on OpenSSH for a remote DoS
in sftp, described as:
The (1) remote_glob function in sftp-glob.c and the (2) process_put
function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3
and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote
authenticated users to cause a denial of service (CPU and memory
consumption) via
2007 Feb 05
2
Samba 3.0.24 Available for Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
==============================================================
I can say 'no' in 4 different languages.
-- Jeremy Allison
==============================================================
Release Announcements
=====================
This is the latest stable release of Samba. This
2006 Sep 28
1
FreeBSD Security Advisory FreeBSD-SA-06:23.openssl
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-06:23.openssl Security Advisory
The FreeBSD Project
Topic: Multiple problems in crypto(3)
Category: contrib
Module: openssl
Announced:
2013 Feb 05
1
Xen Security Advisory 36 (CVE-2013-0153) - interrupt remap entries shared and old ones not cleared on AMD IOMMUs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Xen Security Advisory CVE-2013-0153 / XSA-36
version 3
interrupt remap entries shared and old ones not cleared on AMD IOMMUs
UPDATES IN VERSION 3
====================
Public release.
ISSUE DESCRIPTION
=================
To avoid an erratum in early hardware, the Xen AMD IOMMU code by
default chooses to use a single interrupt
2004 Mar 02
7
FreeBSD Security Advisory FreeBSD-SA-04:04.tcp
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:04.tcp Security Advisory
The FreeBSD Project
Topic: many out-of-sequence TCP packets denial-of-service
Category: core
Module: kernel
2017 Jan 12
1
[Security Advisory] RHSA-2017:0036 Important: kernel security and bug fix update
Any word on this update for CentOS 6? This one seems pretty bad if it's a
remote exploit.
--
Matt Phelps
System Administrator, Computation Facility
Harvard - Smithsonian Center for Astrophysics
mphelps at cfa.harvard.edu, http://www.cfa.harvard.edu
---------- Forwarded message ----------
From: Red Hat Errata Notifications <errata at redhat.com>
Date: Tue, Jan 10, 2017 at 5:19 PM