Bug 37734 - samba4: Security issue (ES 3.1)
Summary: samba4: Security issue (ES 3.1)
Status: CLOSED FIXED
Alias: None
Product: UCS
Classification: Unclassified
Component: Security updates
Version: UCS 4.0
Hardware: Other Linux
: P5 normal
Target Milestone: UCS 3.1-ES
Assignee: Moritz Muehlenhoff
QA Contact: Arvid Requate
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-02-09 14:42 CET by Moritz Muehlenhoff
Modified: 2015-03-04 13:26 CET (History)
0 users

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Customer ID:
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2015-02-09 14:42:37 CET

    
Comment 1 Moritz Muehlenhoff univentionstaff 2015-02-09 14:42:46 CET
CVE-2015-0240

A malicious client could send packets that may set up the stack in
such a way that the freeing of memory in a subsequent anonymous
netlogon packet could allow execution of arbitrary code. This code
would execute with root privileges.
Comment 2 Moritz Muehlenhoff univentionstaff 2015-02-23 12:42:19 CET
Now public:
https://www.samba.org/samba/security/CVE-2015-0240
Comment 3 Moritz Muehlenhoff univentionstaff 2015-02-23 13:55:37 CET
Patches have been integrated. All tests were fine (ucs-test-samba*, joining a Windows 7 client, performing a domain logon).
Comment 4 Arvid Requate univentionstaff 2015-02-24 21:11:31 CET
Verified:
* Package built in extsec3.1 with upstream patch
* Package update
* Windows7 Client join, ddns update, Logon, PW-Change, Re-logon, DRS-Replication, UCS Memberserver kerberos auth
Comment 5 Moritz Muehlenhoff univentionstaff 2015-03-04 13:26:22 CET
These have been released.