Subject: CVS commit: pkgsrc/net/samba
From: Takahiro Kambe
Date: 2015-02-24 10:54:47
Message id: 20150224095448.06BFB98@cvs.netbsd.org

Log Message:
Update samba package to 3.6.25.

                   ==============================
                   Release Notes for Samba 3.6.25
                          February 23, 2015
                   ==============================

This is a security release in order to address CVE-2015-0240 (Unexpected
code execution in smbd).

o  CVE-2015-0240:
   All versions of Samba from 3.5.0 to 4.2.0rc4 are vulnerable to an
   unexpected code execution vulnerability in the smbd file server
   daemon.

   A malicious client could send packets that may set up the stack in
   such a way that the freeing of memory in a subsequent anonymous
   netlogon packet could allow execution of arbitrary code. This code
   would execute with root privileges.

o  CVE-2014-0178:
   In preparing a response to an authenticated FSCTL_GET_SHADOW_COPY_DATA
   or FSCTL_SRV_ENUMERATE_SNAPSHOTS client request, affected versions of
   Samba do not initialize 8 bytes of the 16 byte SRV_SNAPSHOT_ARRAY
   response field. The uninitialized buffer is sent back to the client.

   A non-default VFS module providing the get_shadow_copy_data_fn() hook
   must be explicitly enabled for Samba to process the aforementioned
   client requests. Therefore, only configurations with "shadow_copy" or
   "shadow_copy2" specified for the "vfs objects" parameter \ 
are vulnerable.

Files:
RevisionActionfile
1.253modifypkgsrc/net/samba/Makefile
1.102modifypkgsrc/net/samba/distinfo