Univention Bugzilla – Full Text Bug Listing |
Summary: | samba: Security issue (4.0) | ||
---|---|---|---|
Product: | UCS | Reporter: | Moritz Muehlenhoff <jmm> |
Component: | Security updates | Assignee: | Moritz Muehlenhoff <jmm> |
Status: | CLOSED FIXED | QA Contact: | Arvid Requate <requate> |
Severity: | normal | ||
Priority: | P5 | CC: | gohmann, requate |
Version: | UCS 4.0 | ||
Target Milestone: | UCS 4.0-1-errata | ||
Hardware: | Other | ||
OS: | Linux | ||
What kind of report is it?: | --- | What type of bug is this?: | --- |
Who will be affected by this bug?: | --- | How will those affected feel about the bug?: | --- |
User Pain: | Enterprise Customer affected?: | ||
School Customer affected?: | ISV affected?: | ||
Waiting Support: | Flags outvoted (downgraded) after PO Review: | ||
Ticket number: | Bug group (optional): | ||
Max CVSS v3 score: | |||
Attachments: | YAML file |
Description
Moritz Muehlenhoff
2015-02-09 14:43:06 CET
CVE-2015-0240 A malicious client could send packets that may set up the stack in such a way that the freeing of memory in a subsequent anonymous netlogon packet could allow execution of arbitrary code. This code would execute with root privileges. New release date: Monday, February 23. An updated package has been built. Tests went fine. The existing 2015-02-16-samba.yaml will be adapted upon embargo time. Created attachment 6710 [details]
YAML file
Verified: * Package has been rebuilt with upstream patch * Installation, join, kinit+smb and ucs-test (amd64) * Advisory |