Samba 4.6.8 发布,安全修复版本

clouddyy
 clouddyy
发布于 2017年09月21日
收藏 0

Samba 4.6.8 已发布,这是一个安全版本,主要解决以下问题:

  • CVE-2017-12150 (SMB1/2/3 connections may not require signing where they should)

  • CVE-2017-12151 (SMB3 connections don't keep encryption across DFS redirects)

  • CVE-2017-12163 (Server memory information leak over SMB1)

详情

  • CVE-2017-12150: A man in the middle attack may hijack client connections.

  • CVE-2017-12151: A man in the middle attack can read and may alter confidential documents transferred via a client connection, which are reached via DFS redirect when the original connection used SMB3.

  • CVE-2017-12163: Client with write access to a share can cause server memory contents to be written into a file or printer.

有关详细信息和解决方法,请参阅安全性建议:

https://www.samba.org/samba/security/CVE-2017-12150.html

https://www.samba.org/samba/security/CVE-2017-12151.html

https://www.samba.org/samba/security/CVE-2017-12163.html

Changes since 4.6.7:Jeremy Allison <jra@samba.org>

  • BUG 12836: s3: smbd: Fix a read after free if a chained SMB1 call goes async.

  • BUG 13020: CVE-2017-12163: s3:smbd: Prevent client short SMB1 write from writing server memory to file.

Ralph Boehme <slow@samba.org>

  • BUG 12885: s3/smbd: Let non_widelink_open() chdir() to directories directly.

Stefan Metzmacher <metze@samba.org>

  • BUG 12996: CVE-2017-12151: Keep required encryption across SMB3 dfs redirects.

  • BUG 12997: CVE-2017-12150: Some code path don't enforce smb signing when they should.

本站文章除注明转载外,均为本站原创或编译。欢迎任何形式的转载,但请务必注明出处,尊重他人劳动共创开源社区。
转载请注明:文章转载自 OSCHINA 社区 [http://www.oschina.net]
本文标题:Samba 4.6.8 发布,安全修复版本
资讯来源:https://www.samba.org/
加载中

最新评论(4

clouddyy
clouddyy

引用来自“阿cat”的评论

系统默认都安装这个吧?
系统默认没有这个
MGL_TECH
MGL_TECH
系统默认都安装这个吧?
clouddyy
clouddyy

引用来自“极品渣子”的评论

蓝屏的图标。
我的板凳
极品渣子
极品渣子
蓝屏的图标。
返回顶部
顶部