CERT mailing list archives

Samba Releases Security Updates


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Wed, 04 Sep 2019 13:14:18 -0500

Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:



Samba Releases Security Updates [ 
https://www.us-cert.gov/ncas/current-activity/2019/09/04/samba-releases-security-updates ] 09/04/2019 11:10 AM EDT 
Original release date: September 4, 2019

The Samba Team has released security updates to address a vulnerability in all versions of Samba from 4.9.0 onward. An 
attacker could exploit this vulnerability to obtain sensitive information.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Samba 
Security Announcement for CVE-2019-10197 [ https://www.samba.org/samba/security/CVE-2019-10197.html ] and apply the 
necessary updates and workarounds.

This product is provided subject to this Notification [ https://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ https://www.dhs.gov/privacy-policy ] policy.

body { font-size: 1em; font-family: Arial, Verdana, sans-serif; font-weight: normal; font-style: normal; color: 
#333333; } ________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ]  

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: