This bug was fixed in the package samba - 3.0.26a-1ubuntu2.4
--------------- samba (3.0.26a-1ubuntu2.4) gutsy-security; urgency=low
* SECURITY UPDATE: heap overflow when processing crafted SMB responses * debian/patches/security-CVE-2008-1105.patch: update util_sock.c to require specifying the buffer size and update client.c, smbctool.c, smbfilter.c, and process.c for these changes * SECURITY UPDATE: buffer overrun in nmbd when processing crafted GETDC mailslot requests * debian/patches/security_CVE-2007-4572.patch: check return values and sizeof strings in charcnv.c, ntlmssp_parse.c, nmbd_processlogon.c. Backport regression fixes from upstream. * References: CVE-2008-1105 CVE-2007-4572 LP: #235912
-- Jamie Strandboge <email address hidden> Tue, 03 Jun 2008 16:29:05 -0400
This bug was fixed in the package samba - 3.0.26a-1ubuntu2.4
--------------- 1ubuntu2. 4) gutsy-security; urgency=low
samba (3.0.26a-
* SECURITY UPDATE: heap overflow when processing crafted SMB responses patches/ security- CVE-2008- 1105.patch: update util_sock.c to require patches/ security_ CVE-2007- 4572.patch: check return values and on.c.
* debian/
specifying the buffer size and update client.c, smbctool.c, smbfilter.c,
and process.c for these changes
* SECURITY UPDATE: buffer overrun in nmbd when processing crafted GETDC
mailslot requests
* debian/
sizeof strings in charcnv.c, ntlmssp_parse.c, nmbd_processlog
Backport regression fixes from upstream.
* References:
CVE-2008-1105
CVE-2007-4572
LP: #235912
-- Jamie Strandboge <email address hidden> Tue, 03 Jun 2008 16:29:05 -0400