Bug 37734 - samba4: Security issue (ES 3.1)
samba4: Security issue (ES 3.1)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.0
Other Linux
: P5 normal (vote)
: UCS 3.1-ES
Assigned To: Moritz Muehlenhoff
Arvid Requate
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2015-02-09 14:42 CET by Moritz Muehlenhoff
Modified: 2015-03-04 13:26 CET (History)
0 users

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2015-02-09 14:42:37 CET

    
Comment 1 Moritz Muehlenhoff univentionstaff 2015-02-09 14:42:46 CET
CVE-2015-0240

A malicious client could send packets that may set up the stack in
such a way that the freeing of memory in a subsequent anonymous
netlogon packet could allow execution of arbitrary code. This code
would execute with root privileges.
Comment 2 Moritz Muehlenhoff univentionstaff 2015-02-23 12:42:19 CET
Now public:
https://www.samba.org/samba/security/CVE-2015-0240
Comment 3 Moritz Muehlenhoff univentionstaff 2015-02-23 13:55:37 CET
Patches have been integrated. All tests were fine (ucs-test-samba*, joining a Windows 7 client, performing a domain logon).
Comment 4 Arvid Requate univentionstaff 2015-02-24 21:11:31 CET
Verified:
* Package built in extsec3.1 with upstream patch
* Package update
* Windows7 Client join, ddns update, Logon, PW-Change, Re-logon, DRS-Replication, UCS Memberserver kerberos auth
Comment 5 Moritz Muehlenhoff univentionstaff 2015-03-04 13:26:22 CET
These have been released.