Path to this page:
Subject: CVS commit: [pkgsrc-2014Q4] pkgsrc/net/samba
From: Matthias Scheler
Date: 2015-03-04 21:00:15
Message id: 20150304200015.9D67F98@cvs.netbsd.org
Log Message:
Pullup ticket #4634 - requested by taca
net/samba: security update
Revisions pulled up:
- net/samba/Makefile 1.253
- net/samba/distinfo 1.102
---
Module Name: pkgsrc
Committed By: taca
Date: Tue Feb 24 09:54:47 UTC 2015
Modified Files:
pkgsrc/net/samba: Makefile distinfo
Log Message:
Update samba package to 3.6.25.
==============================
Release Notes for Samba 3.6.25
February 23, 2015
==============================
This is a security release in order to address CVE-2015-0240 (Unexpected
code execution in smbd).
o CVE-2015-0240:
All versions of Samba from 3.5.0 to 4.2.0rc4 are vulnerable to an
unexpected code execution vulnerability in the smbd file server
daemon.
A malicious client could send packets that may set up the stack in
such a way that the freeing of memory in a subsequent anonymous
netlogon packet could allow execution of arbitrary code. This code
would execute with root privileges.
o CVE-2014-0178:
In preparing a response to an authenticated FSCTL_GET_SHADOW_COPY_DATA
or FSCTL_SRV_ENUMERATE_SNAPSHOTS client request, affected versions of
Samba do not initialize 8 bytes of the 16 byte SRV_SNAPSHOT_ARRAY
response field. The uninitialized buffer is sent back to the client.
A non-default VFS module providing the get_shadow_copy_data_fn() hook
must be explicitly enabled for Samba to process the aforementioned
client requests. Therefore, only configurations with "shadow_copy" or
"shadow_copy2" specified for the "vfs objects" \
parameter are vulnerable.
Files: