Displaying 20 results from an estimated 20000 matches similar to: "[Announce] Samba 4.7.6, 4.6.14 and 4.5.16 Security Releases Available for Download"
2018 Mar 13
0
[Announce] Samba 4.7.6, 4.6.14 and 4.5.16 Security Releases Available for Download
Under what conditions are "server services = -ldap" an acceptable
workaround? would it work with a standalone AD with file sharing done
by other Samba servers?
On Tue, Mar 13, 2018 at 5:20 AM, Karolin Seeger via samba-technical
<samba-technical at lists.samba.org> wrote:
> Release Announcements
> ---------------------
>
> These are security release in order to address
2011 Sep 22
1
New CVE for Xen
There''s few CVE for Xen, are we affected, and are fixes planned for
Lenny, Squeeze and Unstable?
* A denial of service (Host Crash) in the XEN
hypervisor. (CVE-2011-2901)
* A bug was found in the way Xen handles CPUID
instruction emulation during VM exits. An unprivileged
guest user can potentially use this flaw to crash the
guest. (CVE-2011-1936)
* A 64-bit guest can get one
2018 Mar 13
10
[Announce] Samba 4.8.0 Available for Download
========================================================
"It is time that we all see gender as a
spectrum instead of two sets of
opposing ideals. We should stop
defining each other by what we are not
and start defining ourselves by who we
are."
Emma Watson
========================================================
Release Announcements
---------------------
This is
2018 Mar 13
10
[Announce] Samba 4.8.0 Available for Download
========================================================
"It is time that we all see gender as a
spectrum instead of two sets of
opposing ideals. We should stop
defining each other by what we are not
and start defining ourselves by who we
are."
Emma Watson
========================================================
Release Announcements
---------------------
This is
2019 Oct 01
1
Re: [NBDKIT SECURITY] Denial of Service / Amplification Attack in nbdkit
On 9/20/19 8:58 AM, Eric Blake wrote:
> On 9/12/19 12:41 PM, Richard W.M. Jones wrote:
>> We have discovered a potential Denial of Service / Amplification Attack
>> in nbdkit.
>
> Unfortunately, our fix for this issue cause another potential Denial of
> Service attack:
>
>>
>> Lifecycle
>> ---------
>>
>> Reported: 2019-09-11 Fixed:
2007 Nov 17
1
Bug#451626: CVE-2007-5907, CVE-2007-5906 possible denial of service vulnerability
Package: xen-3
Version: 3.1.0-1
Severity: grave
Tags: security patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xen-3.
CVE-2007-5907[0]:
| Xen 3.1.1 does not prevent modification of the CR4 TSC from
| applications, which allows pv guests to cause a denial of service
| (crash).
CVE-2007-5906[1]:
| Xen 3.1.1 allows virtual guest system users to cause a
|
2011 Feb 28
5
[Announce] Samba 3.5.7, 3.4.12 and 3.3.15 Security Releases Available
Release Announcements
=====================
Samba 3.5.7, 3.4.12 and 3.3.15 are security releases in order to
address CVE-2011-0719.
o CVE-2011-0719:
All current released versions of Samba are vulnerable to
a denial of service caused by memory corruption. Range
checks on file descriptors being used in the FD_SET macro
were not present allowing stack corruption. This can cause
the
2011 Feb 28
5
[Announce] Samba 3.5.7, 3.4.12 and 3.3.15 Security Releases Available
Release Announcements
=====================
Samba 3.5.7, 3.4.12 and 3.3.15 are security releases in order to
address CVE-2011-0719.
o CVE-2011-0719:
All current released versions of Samba are vulnerable to
a denial of service caused by memory corruption. Range
checks on file descriptors being used in the FD_SET macro
were not present allowing stack corruption. This can cause
the
2018 Nov 27
0
[Announce] Samba 4.9.3, 4.8.7 and 4.7.12 Security Releases Available
Release Announcements
---------------------
These are security releases in order to address the following defects:
o CVE-2018-14629 (Unprivileged adding of CNAME record causing loop in AD
Internal DNS server)
o CVE-2018-16841 (Double-free in Samba AD DC KDC with PKINIT)
o CVE-2018-16851 (NULL pointer de-reference in Samba AD DC LDAP server)
o CVE-2018-16852 (NULL pointer
2018 Nov 27
0
[Samba] [Announce] Samba 4.9.3, 4.8.7 and 4.7.12 Security Releases Available
Release Announcements
---------------------
These are security releases in order to address the following defects:
o CVE-2018-14629 (Unprivileged adding of CNAME record causing loop in AD
Internal DNS server)
o CVE-2018-16841 (Double-free in Samba AD DC KDC with PKINIT)
o CVE-2018-16851 (NULL pointer de-reference in Samba AD DC LDAP server)
o CVE-2018-16852 (NULL pointer
2018 Mar 13
0
Samba 4.8.0 and Schema 69 support (including replication)
Hey folks,
Has anything changed with 4.8.0 with respect to replication with a Win2KR2 server?
In particular, can Samba 4.8 join a Windows 2012R2 domain (schema 69) as a DC? Will replication work properly?
Thank You!
----- Mail original -----
De: "Karolin Seeger via samba" <samba at lists.samba.org>
À: samba-announce at lists.samba.org, samba at lists.samba.org, samba-technical
2006 Sep 30
9
FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-06:22.openssh Security Advisory
The FreeBSD Project
Topic: Multiple vulnerabilities in OpenSSH
Category: contrib
Module: openssh
Announced:
2006 Sep 30
9
FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-06:22.openssh Security Advisory
The FreeBSD Project
Topic: Multiple vulnerabilities in OpenSSH
Category: contrib
Module: openssh
Announced:
2019 Sep 12
2
[NBDKIT SECURITY] Denial of Service / Amplification Attack in nbdkit
We have discovered a potential Denial of Service / Amplification Attack
in nbdkit.
Lifecycle
---------
Reported: 2019-09-11 Fixed: 2019-09-11 Published: 2019-09-12
There is no CVE number assigned for this issue yet, but the bug is
being categorized and processed by Red Hat's security team which may
result in a CVE being published later.
Credit
------
Reported and patched by Richard W.M.
2011 Mar 04
2
remote DoS in sftp via crafted glob expressions (CVE-2010-4755)
Hi folks.
We were made aware of a MITRE CVE assignment on OpenSSH for a remote DoS
in sftp, described as:
The (1) remote_glob function in sftp-glob.c and the (2) process_put
function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3
and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote
authenticated users to cause a denial of service (CPU and memory
consumption) via
2007 Feb 05
2
Samba 3.0.24 Available for Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
==============================================================
I can say 'no' in 4 different languages.
-- Jeremy Allison
==============================================================
Release Announcements
=====================
This is the latest stable release of Samba. This
2006 Sep 28
1
FreeBSD Security Advisory FreeBSD-SA-06:23.openssl
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-06:23.openssl Security Advisory
The FreeBSD Project
Topic: Multiple problems in crypto(3)
Category: contrib
Module: openssl
Announced:
2013 Feb 05
1
Xen Security Advisory 36 (CVE-2013-0153) - interrupt remap entries shared and old ones not cleared on AMD IOMMUs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Xen Security Advisory CVE-2013-0153 / XSA-36
version 3
interrupt remap entries shared and old ones not cleared on AMD IOMMUs
UPDATES IN VERSION 3
====================
Public release.
ISSUE DESCRIPTION
=================
To avoid an erratum in early hardware, the Xen AMD IOMMU code by
default chooses to use a single interrupt
2004 Mar 02
7
FreeBSD Security Advisory FreeBSD-SA-04:04.tcp
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:04.tcp Security Advisory
The FreeBSD Project
Topic: many out-of-sequence TCP packets denial-of-service
Category: core
Module: kernel
2011 Aug 03
3
openssh rpm version greater than 4.3
Hello Team,
We ship our own software own top of Centos 5.2 OS and install other
applications and rpms on top of rpms available in 5.2 Centos.
We are in the process of upgrading to a later version of openssh (5.8
version of openssh is already available), however the latest src.rpm version
of openssh available on Centos site is still