Gentoo Archives: gentoo-commits

From: "Pierre-Yves Rofes (py)" <py@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-200711-29.xml
Date: Wed, 05 Dec 2007 23:17:09
Message-Id: E1J03UH-0003X1-7E@stork.gentoo.org
1 py 07/12/05 23:17:05
2
3 Modified: glsa-200711-29.xml
4 Log:
5 Version 3.0.27 fixes 2nd vulnerability.
6
7 Revision Changes Path
8 1.2 xml/htdocs/security/en/glsa/glsa-200711-29.xml
9
10 file : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/security/en/glsa/glsa-200711-29.xml?rev=1.2&view=markup
11 plain: http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/security/en/glsa/glsa-200711-29.xml?rev=1.2&content-type=text/plain
12 diff : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/security/en/glsa/glsa-200711-29.xml?r1=1.1&r2=1.2
13
14 Index: glsa-200711-29.xml
15 ===================================================================
16 RCS file: /var/cvsroot/gentoo/xml/htdocs/security/en/glsa/glsa-200711-29.xml,v
17 retrieving revision 1.1
18 retrieving revision 1.2
19 diff -u -r1.1 -r1.2
20 --- glsa-200711-29.xml 20 Nov 2007 21:15:24 -0000 1.1
21 +++ glsa-200711-29.xml 5 Dec 2007 23:17:04 -0000 1.2
22 @@ -7,17 +7,17 @@
23 <title>Samba: Execution of arbitrary code</title>
24 <synopsis>
25 Samba contains two buffer overflow vulnerabilities potentially resulting in
26 - the execution of arbitrary code, one of which is currently unfixed.
27 + the execution of arbitrary code.
28 </synopsis>
29 <product type="ebuild">samba</product>
30 <announced>November 20, 2007</announced>
31 - <revised>November 20, 2007: 01</revised>
32 + <revised>December 05, 2007: 03</revised>
33 <bug>197519</bug>
34 <access>remote</access>
35 <affected>
36 <package name="net-fs/samba" auto="yes" arch="*">
37 - <unaffected range="ge">3.0.26a-r2</unaffected>
38 - <vulnerable range="lt">3.0.26a-r2</vulnerable>
39 + <unaffected range="ge">3.0.27a</unaffected>
40 + <vulnerable range="lt">3.0.27a</vulnerable>
41 </package>
42 </affected>
43 <background>
44 @@ -37,7 +37,7 @@
45 </description>
46 <impact type="high">
47 <p>
48 - To exploit the first vulnerability a remote unauthenticated attacker
49 + To exploit the first vulnerability, a remote unauthenticated attacker
50 could send specially crafted WINS "Name Registration" requests followed
51 by a WINS "Name Query" request. This might lead to execution of
52 arbitrary code with elevated privileges. Note that this vulnerability
53 @@ -57,20 +57,14 @@
54 </workaround>
55 <resolution>
56 <p>
57 - The Samba 3.0.27 ebuild that resolves both vulnerabilities is currently
58 - masked due to a regression in the patch for the second vulnerability.
59 - </p>
60 - <p>
61 - Since no working patch exists yet, all Samba users should upgrade to
62 - 3.0.26a-r2, which contains a fix for the first vulnerability
63 - (CVE-2007-5398):
64 + All Samba users should upgrade to the latest version:
65 </p>
66 <code>
67 # emerge --sync
68 - # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.26a-r2&quot;</code>
69 + # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.27a&quot;</code>
70 <p>
71 - An update to this temporary GLSA will be sent when the second
72 - vulnerability will be fixed.
73 + The first vulnerability (CVE-2007-5398) was already fixed in Samba
74 + 3.0.26a-r2.
75 </p>
76 </resolution>
77 <references>
78
79
80
81 --
82 gentoo-commits@g.o mailing list