Slackware: 2023-334-01: samba Security Update
Summary
Here are the details from the Slackware 15.0 ChangeLog: patches/packages/samba-4.18.9-i586-1_slack15.0.txz: Upgraded. This is a security release in order to address the following defect: An information leak vulnerability was discovered in Samba's LDAP server. Due to missing access control checks, an authenticated but unprivileged attacker could discover the names and preserved attributes of deleted objects in the LDAP store. Upgrading to this package will not prevent this information leak - if you are using Samba as an Active Directory Domain Controller, you will need to follow the instructions in the samba.org link given below. For more information, see: https://www.samba.org/samba/security/CVE-2018-14628.html https://www.cve.org/CVERecord?id=CVE-2018-14628 (* Security fix *)
Where Find New Packages
Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.
Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/samba-4.18.9-i586-1_slack15.0.txz
Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/samba-4.18.9-x86_64-1_slack15.0.txz
Updated package for Slackware -current:
Updated package for Slackware x86_64 -current:
MD5 Signatures
Slackware 15.0 package:
f73bf7dc7dc0ac254840a236d609bda2 samba-4.18.9-i586-1_slack15.0.txz
Slackware x86_64 15.0 package:
152b8d8fcc261ae89effaf5181b54243 samba-4.18.9-x86_64-1_slack15.0.txz
Slackware -current package:
f9874a7129f05b59febd0c85a61488c3 n/samba-4.19.3-i586-1.txz
Slackware x86_64 -current package:
e91fa8957a4400c3218f309a22a2e8eb n/samba-4.19.3-x86_64-1.txz
Installation Instructions
Installation instructions: Upgrade the package as root: # upgradepkg samba-4.18.9-i586-1_slack15.0.txz If you are concerned about the information leak, please follow the additional instructions found at this link: https://www.samba.org/samba/security/CVE-2018-14628.html