Your message dated Thu, 12 Apr 2012 08:18:27 +0200
with message-id <20120412061827.gj21...@mykerinos.kheops.frmug.org>
and subject line Re: [Pkg-samba-maint] Bug#668309: Bug#668309: samba: remote 
code execution (CVE-2012-1182)
has caused the Debian Bug report #668309,
regarding samba: remote code execution (CVE-2012-1182)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
668309: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668309
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: samba
Version: 3.6.3-2
Severity: critical
Tags: security
Justification: root security hole

Hey,

samba team just released an advisory for a remote code execution (as
root) : https://www.samba.org/samba/security/CVE-2012-1182

Please package 3.6.4 for sid/testing and backport 3.5.14 fixes to
squeeze when possible.

Thanks in advance,
-- 
Yves-Alexis

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 
'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



--- End Message ---
--- Begin Message ---
Version: 2:3.6.4-1


Jelmer fixed that issue in unstable with the upload of samba 3.6.4

Attachment: signature.asc
Description: Digital signature


--- End Message ---

Reply via email to