Bug 37735

Summary: samba: Security issue (4.0)
Product: UCS Reporter: Moritz Muehlenhoff <jmm>
Component: Security updatesAssignee: Moritz Muehlenhoff <jmm>
Status: CLOSED FIXED QA Contact: Arvid Requate <requate>
Severity: normal    
Priority: P5 CC: gohmann, requate
Version: UCS 4.0   
Target Milestone: UCS 4.0-1-errata   
Hardware: Other   
OS: Linux   
What kind of report is it?: --- What type of bug is this?: ---
Who will be affected by this bug?: --- How will those affected feel about the bug?: ---
User Pain: Enterprise Customer affected?:
School Customer affected?: ISV affected?:
Waiting Support: Flags outvoted (downgraded) after PO Review:
Ticket number: Bug group (optional):
Max CVSS v3 score:
Attachments: YAML file

Description Moritz Muehlenhoff univentionstaff 2015-02-09 14:43:06 CET

    
Comment 1 Moritz Muehlenhoff univentionstaff 2015-02-09 14:43:15 CET
CVE-2015-0240

A malicious client could send packets that may set up the stack in
such a way that the freeing of memory in a subsequent anonymous
netlogon packet could allow execution of arbitrary code. This code
would execute with root privileges.
Comment 2 Arvid Requate univentionstaff 2015-02-12 19:43:13 CET
New release date: Monday, February 23.
Comment 3 Moritz Muehlenhoff univentionstaff 2015-02-19 12:24:56 CET
An updated package has been built. Tests went fine. The existing 2015-02-16-samba.yaml will be adapted upon embargo time.
Comment 4 Moritz Muehlenhoff univentionstaff 2015-02-23 11:57:32 CET
Created attachment 6710 [details]
YAML file
Comment 5 Moritz Muehlenhoff univentionstaff 2015-02-23 12:43:05 CET
Now public:
https://www.samba.org/samba/security/CVE-2015-0240
Comment 6 Arvid Requate univentionstaff 2015-02-23 15:20:34 CET
Verified:
* Package has been rebuilt with upstream patch
* Installation, join, kinit+smb and ucs-test (amd64)
* Advisory
Comment 7 Moritz Muehlenhoff univentionstaff 2015-02-24 08:22:29 CET
http://errata.univention.de/ucs/4.0/86.html