-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2019.2229.2
               SUSE-SU-2019:1574-1 Security update for samba
                               25 June 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           samba
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-12435  

Reference:         ESB-2019.2197

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2019/suse-su-20191574-1.html

Revision History:  June 25 2019: Updated Patch instructions and Package list
                   June 21 2019: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for samba

______________________________________________________________________________

Announcement ID:   SUSE-SU-2019:1574-2
Rating:            important
References:        #1125601 #1130245 #1134452 #1134697 #1137815
Cross-References:  CVE-2019-12435
Affected Products:
                   SUSE Enterprise Storage 6
______________________________________________________________________________

An update that solves one vulnerability and has four fixes is now available.

Description:

This update for samba fixes the following issues:
Security issues fixed:

  o CVE-2019-12435: zone operations can crash rpc server; (bso#13922); (bsc#
    1137815).


Other issues fixed:

  o Fix cephwrap_flistxattr() debug message; (bso#13940); (bsc#1134697).
  o Add ceph_snapshots VFS module; (jsc#SES-183).
  o Fix vfs_ceph realpath; (bso#13918); (bsc#1134452).
  o MacOS credit accounting breaks with async SESSION SETUP; (bsc#1125601);
    (bso#13796).
  o Mac OS X SMB2 implmenetation sees Input/output error or Resource
    temporarily unavailable and drops connection; (bso#13698)
  o Explicitly enable libcephfs POSIX ACL support; (bso#13896); (bsc#1130245).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Enterprise Storage 6:
    zypper in -t patch SUSE-Storage-6-2019-1574=1

Package List:

  o SUSE Enterprise Storage 6 (aarch64 x86_64):
       samba-ceph-4.9.5+git.176.375e1f05788-3.6.1
       samba-ceph-debuginfo-4.9.5+git.176.375e1f05788-3.6.1
       samba-debuginfo-4.9.5+git.176.375e1f05788-3.6.1
       samba-debugsource-4.9.5+git.176.375e1f05788-3.6.1


References:

  o https://www.suse.com/security/cve/CVE-2019-12435.html
  o https://bugzilla.suse.com/1125601
  o https://bugzilla.suse.com/1130245
  o https://bugzilla.suse.com/1134452
  o https://bugzilla.suse.com/1134697
  o https://bugzilla.suse.com/1137815

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=8hIH
-----END PGP SIGNATURE-----