Security update for Samba
SUSE Security Update: Security update for Samba
The Samba Web Administration Tool (SWAT) in Samba versions
3.0.x to 4.0.1 was affected by a cross-site request
forgery (CVE-2013-0214) and a click-jacking attack
(CVE-2013-0213). This has been fixed.
Additionally a bug in mount.cifs has been fixed which could
have lead to file disclosure (CVE-2012-1586).
Also a uninitialized memory read bug in talloc_free() has
been fixed. (bnc#764577).
Security Issue references:
* CVE-2013-0213
>
* CVE-2013-0214
>
Announcement ID: | SUSE-SU-2013:0325-1 |
Rating: | important |
References: | #754443 #764577 #783384 #799641 #800982 |
Affected Products: |
An update that solves two vulnerabilities and has three fixes is now available.
Description:
The Samba Web Administration Tool (SWAT) in Samba versions
3.0.x to 4.0.1 was affected by a cross-site request
forgery (CVE-2013-0214) and a click-jacking attack
(CVE-2013-0213). This has been fixed.
Additionally a bug in mount.cifs has been fixed which could
have lead to file disclosure (CVE-2012-1586).
Also a uninitialized memory read bug in talloc_free() has
been fixed. (bnc#764577).
Security Issue references:
* CVE-2013-0213
* CVE-2013-0214
Package List:
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
- cifs-mount-3.0.36-0.13.24.1
- ldapsmb-1.34b-25.13.24.1
- libmsrpc-3.0.36-0.13.24.1
- libmsrpc-devel-3.0.36-0.13.24.1
- libsmbclient-3.0.36-0.13.24.1
- libsmbclient-devel-3.0.36-0.13.24.1
- samba-3.0.36-0.13.24.1
- samba-client-3.0.36-0.13.24.1
- samba-krb-printing-3.0.36-0.13.24.1
- samba-python-3.0.36-0.13.24.1
- samba-vscan-0.3.6b-43.13.24.1
- samba-winbind-3.0.36-0.13.24.1
- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
- libsmbclient-32bit-3.0.36-0.13.24.1
- samba-32bit-3.0.36-0.13.24.1
- samba-client-32bit-3.0.36-0.13.24.1
- samba-winbind-32bit-3.0.36-0.13.24.1
- SUSE Linux Enterprise Server 10 SP4 (noarch):
- samba-doc-3.0.36-0.12.24.1
- SUSE Linux Enterprise Server 10 SP4 (ia64):
- libsmbclient-x86-3.0.36-0.13.24.1
- samba-client-x86-3.0.36-0.13.24.1
- samba-winbind-x86-3.0.36-0.13.24.1
- samba-x86-3.0.36-0.13.24.1
- SUSE Linux Enterprise Server 10 SP4 (ppc):
- libsmbclient-64bit-3.0.36-0.13.24.1
- samba-64bit-3.0.36-0.13.24.1
- samba-client-64bit-3.0.36-0.13.24.1
- samba-winbind-64bit-3.0.36-0.13.24.1
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
- cifs-mount-3.0.36-0.13.24.1
- ldapsmb-1.34b-25.13.24.1
- libsmbclient-3.0.36-0.13.24.1
- libsmbclient-devel-3.0.36-0.13.24.1
- samba-3.0.36-0.13.24.1
- samba-client-3.0.36-0.13.24.1
- samba-krb-printing-3.0.36-0.13.24.1
- samba-vscan-0.3.6b-43.13.24.1
- samba-winbind-3.0.36-0.13.24.1
- SUSE Linux Enterprise Desktop 10 SP4 (x86_64):
- libsmbclient-32bit-3.0.36-0.13.24.1
- samba-32bit-3.0.36-0.13.24.1
- samba-client-32bit-3.0.36-0.13.24.1
- samba-winbind-32bit-3.0.36-0.13.24.1
- SUSE Linux Enterprise Desktop 10 SP4 (noarch):
- samba-doc-3.0.36-0.12.24.1
- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
- libmsrpc-3.0.36-0.13.24.1
- libmsrpc-devel-3.0.36-0.13.24.1
- libsmbclient-devel-3.0.36-0.13.24.1
- libsmbsharemodes-3.0.36-0.13.24.1
- libsmbsharemodes-devel-3.0.36-0.13.24.1
- samba-python-3.0.36-0.13.24.1
References:
- http://support.novell.com/security/cve/CVE-2013-0213.html
- http://support.novell.com/security/cve/CVE-2013-0214.html
- https://bugzilla.novell.com/754443
- https://bugzilla.novell.com/764577
- https://bugzilla.novell.com/783384
- https://bugzilla.novell.com/799641
- https://bugzilla.novell.com/800982
- http://download.suse.com/patch/finder/?keywords=1d50d01aa74b22f0c8645692c12273df