A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
www.securityfocus.com/bid/105085
www.securitytracker.com/id/1042002
access.redhat.com/errata/RHSA-2018:2612
access.redhat.com/errata/RHSA-2018:2613
access.redhat.com/errata/RHSA-2018:3056
access.redhat.com/errata/RHSA-2018:3470
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858
kc.mcafee.com/corporate/index?page=content&id=SB10284
security.gentoo.org/glsa/202003-52
security.netapp.com/advisory/ntap-20180814-0001/
usn.ubuntu.com/3738-1/
www.debian.org/security/2018/dsa-4271
www.samba.org/samba/security/CVE-2018-10858.html