MGASA-2014-0279

Source
https://advisories.mageia.org/MGASA-2014-0279.html
Import Source
https://advisories.mageia.org/MGASA-2014-0279.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0279
Related
Published
2014-07-04T17:57:20Z
Modified
2014-07-04T17:57:15Z
Summary
Updated samba packages fix multiple vulnerabilities
Details

Updated samba packages fix security vulnerabilities:

Information leak vulnerability in the VFS code, allowing an authenticated user to retrieve eight bytes of uninitialized memory when shadow copy is enabled (CVE-2014-0178).

Samba versions before 3.6.24, 4.0.19, and 4.1.9 are vulnerable to a denial of service on the nmbd NetBIOS name services daemon. A malformed packet can cause the nmbd server to loop the CPU and prevent any further NetBIOS name service (CVE-2014-0244).

Samba versions before 3.6.24, 4.0.19, and 4.1.9 are affected by a denial of service crash involving overwriting memory on an authenticated connection to the smbd file server (CVE-2014-3493).

References
Credits

Affected packages

Mageia:4 / samba

Package

Name
samba
Purl
pkg:rpm/mageia/samba?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.24-1.1.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / samba

Package

Name
samba
Purl
pkg:rpm/mageia/samba?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.15-1.6.mga3

Ecosystem specific

{
    "section": "core"
}