| Summary: | samba new security issue CVE-2015-0240 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | critical | ||
| Priority: | Normal | CC: | sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/634433/ | ||
| Whiteboard: | has_procedure advisory mga4-32-ok mga4-64-ok | ||
| Source RPM: | samba-3.6.24-1.1.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-02-23 19:45:55 CET
Procedure: https://bugs.mageia.org/show_bug.cgi?id=10926#c7 and following comments. Whiteboard:
(none) =>
has_procedure
David Walser
2015-02-24 18:38:00 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/634433/ This is a critical update that we need to get released like the other distros have done. Ideally it would have been done yesterday. Apparently it's received some press attention according to Claire (I've been busy all week so I haven't seen it yet). I think we need to trust that the upstream fixes are OK and just check that the packages install fine. I can confirm that they do on Mageia 4 i586. Testing complete mga4 64 Configured a test share and connected to it from mga4 32 Whiteboard:
has_procedure =>
has_procedure mga4-32-ok mga4-64-ok Validating. Advisory uploaded. Please push to 4 updates Thanks Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0084.html Status:
NEW =>
RESOLVED |