Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.2229.2 SUSE-SU-2019:1574-1 Security update for samba 25 June 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: samba Publisher: SUSE Operating System: SUSE Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-12435 Reference: ESB-2019.2197 Original Bulletin: https://www.suse.com/support/update/announcement/2019/suse-su-20191574-1.html Revision History: June 25 2019: Updated Patch instructions and Package list June 21 2019: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for samba ______________________________________________________________________________ Announcement ID: SUSE-SU-2019:1574-2 Rating: important References: #1125601 #1130245 #1134452 #1134697 #1137815 Cross-References: CVE-2019-12435 Affected Products: SUSE Enterprise Storage 6 ______________________________________________________________________________ An update that solves one vulnerability and has four fixes is now available. Description: This update for samba fixes the following issues: Security issues fixed: o CVE-2019-12435: zone operations can crash rpc server; (bso#13922); (bsc# 1137815). Other issues fixed: o Fix cephwrap_flistxattr() debug message; (bso#13940); (bsc#1134697). o Add ceph_snapshots VFS module; (jsc#SES-183). o Fix vfs_ceph realpath; (bso#13918); (bsc#1134452). o MacOS credit accounting breaks with async SESSION SETUP; (bsc#1125601); (bso#13796). o Mac OS X SMB2 implmenetation sees Input/output error or Resource temporarily unavailable and drops connection; (bso#13698) o Explicitly enable libcephfs POSIX ACL support; (bso#13896); (bsc#1130245). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Enterprise Storage 6: zypper in -t patch SUSE-Storage-6-2019-1574=1 Package List: o SUSE Enterprise Storage 6 (aarch64 x86_64): samba-ceph-4.9.5+git.176.375e1f05788-3.6.1 samba-ceph-debuginfo-4.9.5+git.176.375e1f05788-3.6.1 samba-debuginfo-4.9.5+git.176.375e1f05788-3.6.1 samba-debugsource-4.9.5+git.176.375e1f05788-3.6.1 References: o https://www.suse.com/security/cve/CVE-2019-12435.html o https://bugzilla.suse.com/1125601 o https://bugzilla.suse.com/1130245 o https://bugzilla.suse.com/1134452 o https://bugzilla.suse.com/1134697 o https://bugzilla.suse.com/1137815 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXRFzzGaOgq3Tt24GAQhn+Q/+JB2VAEVLIyfE7TARj81ydv8VbC1aKVGT LNyhw17Ew5VgnDEicROJQmeDU2hs0BZ12Gz4pONGfMNztHCrD1BTfuEBNVZ2cwmL rgzpkxk0e4EwfKMoAxhMBH2euIx+IeRHlwCEI+7Oo5As+HUckG/NqYoGj5w9oW2x UuK6BugH6IYrUVhraqiIpvFmb0zeey1cK05WPHlBde2qI/9YwnFLQClPKzZy4lvf gju+SyRhlp6r71twA+UARuNuGpXjVFjjqGBBNdcig/LZfkb4y40l0ELZ78qLaFl4 +m9zChbnOURJ+9PyEU70FPAmC5WRjQPmSwsW6VQzfi9gh0Ww8RZuUq+lt2c11TKx vjfDlgEFMuVr80WrdN5fqVg8K1zodOiagSJMSQLTs6Cxa/uv49ne536djR7gmi4I 2ylPnnHmMGiszXqgWiPcs4+6xyOqXIBIRm/76WkSqLebaYx3tMgpJNA3RwM5XNeE f81bQA3cQjScXYhVQgTE7iwQxwhWsKF7UUJ6u0Dz55XmuAAASFhUk/bcwFEXKOcx a82v2Fmdh3Wm6ogh1aarhD+usw6BMvBhLKxm9QOMULasCq3PABfCBO3H9yN5OAS6 GyrFrqsZzEgEhWnHH04aKFgbfPJNzryHtE7lDtvtrK/S3spGBjwTG3qdMXxOnVRj elz59tEAwfg= =8hIH -----END PGP SIGNATURE-----