From ${URL} : It was reported that Samba 3.6.6 to 4.1.7 are affected by a vulnerability that allows an authenticated client to retrieve eight bytes of uninitialized server memory when a shadow-copy VFS module is enabled. In preparing a response to an authenticated FSCTL_GET_SHADOW_COPY_DATA or FSCTL_SRV_ENUMERATE_SNAPSHOTS client request, affected versions of Samba do not initialize 8 bytes of the 16 byte SRV_SNAPSHOT_ARRAY response field. The uninitialized buffer is sent back to the client. A non-default VFS module providing the get_shadow_copy_data_fn() hook must be explicitly enabled for Samba to process the aforementioned client requests. Therefore, only configurations with "shadow_copy" or "shadow_copy2" specified for the "vfs objects" parameter are vulnerable. To avoid the vulnerability, affected versions can be configured without "shadow_copy" or "shadow_copy2" specified for the "vfs objects" parameter. This is the default configuration. @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Samba Reference: http://www.samba.org/samba/security/CVE-2014-0178 Samba 4.1.8 Available for Download ============================= Release Notes for Samba 4.1.8 June 3, 2014 ============================= This is the latest stable release of Samba 4.1. Please note that this bug fix release also addresses two minor security issues without being a dedicated security release: o CVE-2014-0239: dns: Don't reply to replies (bug #10609). o CVE-2014-0178: Malformed FSCTL_SRV_ENUMERATE_SNAPSHOTS response (bug #10549). Please let us know when you are ready for stabilization.
CVE-2014-0178 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0178): Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.
I don't see a fix for this upstream for the 3.6 series, specifically it is not mentioned in either http://www.samba.org/samba/history/samba-3.6.24.html nor http://www.samba.org/samba/history/samba-3.6.23.html
CVE-2014-0239 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0239): The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103.
*** Bug 541182 has been marked as a duplicate of this bug. ***
+*samba-4.1.17 (23 Feb 2015) +*samba-4.0.25 (23 Feb 2015) +*samba-3.6.25 (23 Feb 2015) + + 23 Feb 2015; Lars Wendler <polynomial-c@gentoo.org> +samba-3.6.25.ebuild, + -samba-4.0.23.ebuild, -samba-4.0.24.ebuild, +samba-4.0.25.ebuild, + -samba-4.1.15.ebuild, -samba-4.1.16.ebuild, +samba-4.1.17.ebuild: + Security bump (bug #511764). Removed old. +
Added to existing GLSA request
This issue was resolved and addressed in GLSA 201502-15 at http://security.gentoo.org/glsa/glsa-201502-15.xml by GLSA coordinator Kristian Fiskerstrand (K_F).