Package : gosa Version : 2.6.11-3+squeeze5 CVE ID : CVE-2015-8771 GOsa is a combination of system-administrator and end-user web interface, designed to handle LDAP based setups. GOsa upstream reported a code injection vulnerability in the Samba plugin code of GOsa. During Samba password changes it has been possible to inject malicious Perl code. This upload to Debian Squeeze LTS fixes this issues. However, if you upgrade to this fixed package revision, please note that Samba password changes will stop working until the sambaHashHook parameter in gosa.conf has been updated to accept base64 encoded password strings from the PHP code of GOsa. Please read /usr/share/doc/gosa/NEWS.gz and the gosa.conf (5) man page after you have upgraded to this package revision and adapt gosa.conf as described there. -- mike gabriel aka sunweaver (Debian Developer) fon: +49 (1520) 1976 148 GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22 0782 9AF4 6B30 2577 1B31 mail: sunweaver@debian.org, http://sunweavers.net
Attachment:
signature.asc
Description: Digital signature