"The security update addresses a memory leak which consumes a small amount of memory when the smbd daemon is handling connection requests," The H Security reports. "If an attacker made repeated connection requests, this flaw could be exploited to cause a denial of service."
"The flaw exists in Samba versions 3.6.0 to 3.6.2 -- the fix for this flaw is the only difference in 3.6.3 compared to 3.6.2," the article states. "A patch for Samba 3.6.2 has also been posted to Samba's security releases page, while the full source code for Samba 3.6.3 is available to download from the Samba download page."
Go to "Samba update closes DoS hole" to read the details.https://o1.qnsr.com/log/p.gif?;n=203;c=204650394;s=9477;x=7936;f=201801171506010;u=j;z=TIMESTAMP;a=20392931;e=i
For regular security news updates, follow eSecurityPlanet on Twitter: @eSecurityP.