SuSE: 2015:0353-1: important: samba
Summary
samba was updated to fix one security issue. This security issue was fixed: - CVE-2015-0240: Don't call talloc_free on an uninitialized pointer (bnc#917376). These non-security issues were fixed: - Fix vfs_snapper DBus string handling (bso#11055, bnc#913238). - Fix libsmbclient DFS referral handling. + Reuse connections derived from DFS referrals (bso#10123). + Set domain/workgroup based on authentication callback value (bso#11059). - pam_winbind: Fix warn_pwd_expire implementation (bso#9056). - nsswitch: Fix soname of linux nss_*.so.2 modules (bso#9299). - Fix profiles tool (bso#9629). - s3-lib: Do not require a password with --use-ccache (bso#10279). - s4:dsdb/rootdse: Expand extended dn values with the AS_SYSTEM control (bso#10949). - s4-rpc: dnsserver: Fix enumeration of IPv4 and IPv6 addresses (bso#10952). - s3:smb2_server: Allow reauthentication without signing (bso#10958). - s3-smbclient: Return suc...
Read the Full AdvisoryReferences
#872912 #873922 #876312 #889175 #898031 #908627
#913238 #917376
Cross- CVE-2015-0240
Affected Products:
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
https://www.suse.com/security/cve/CVE-2015-0240.html
https://bugzilla.suse.com/872912
https://bugzilla.suse.com/873922
https://bugzilla.suse.com/876312
https://bugzilla.suse.com/889175
https://bugzilla.suse.com/898031
https://bugzilla.suse.com/908627
https://bugzilla.suse.com/913238
https://bugzilla.suse.com/917376