From owner-freebsd-ports-bugs@FreeBSD.ORG Sun Feb 11 14:50:04 2007 Return-Path: X-Original-To: freebsd-ports-bugs@hub.freebsd.org Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 7312C16A401 for ; Sun, 11 Feb 2007 14:50:04 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [69.147.83.40]) by mx1.freebsd.org (Postfix) with ESMTP id 4E2C913C4A5 for ; Sun, 11 Feb 2007 14:50:04 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.4/8.13.4) with ESMTP id l1BEo4Ne012132 for ; Sun, 11 Feb 2007 14:50:04 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.4/8.13.4/Submit) id l1BEo4C4012131; Sun, 11 Feb 2007 14:50:04 GMT (envelope-from gnats) Resent-Date: Sun, 11 Feb 2007 14:50:04 GMT Resent-Message-Id: <200702111450.l1BEo4C4012131@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, KOMATSU Shinichiro Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 1A49F16A46D for ; Sun, 11 Feb 2007 14:40:26 +0000 (UTC) (envelope-from nobody@FreeBSD.org) Received: from www.freebsd.org (www.freebsd.org [69.147.83.33]) by mx1.freebsd.org (Postfix) with ESMTP id 0913813C467 for ; Sun, 11 Feb 2007 14:40:26 +0000 (UTC) (envelope-from nobody@FreeBSD.org) Received: from www.freebsd.org (localhost [127.0.0.1]) by www.freebsd.org (8.13.1/8.13.1) with ESMTP id l1BEePmv024721 for ; Sun, 11 Feb 2007 14:40:25 GMT (envelope-from nobody@www.freebsd.org) Received: (from nobody@localhost) by www.freebsd.org (8.13.1/8.13.1/Submit) id l1BEeOE2024690; Sun, 11 Feb 2007 14:40:24 GMT (envelope-from nobody) Message-Id: <200702111440.l1BEeOE2024690@www.freebsd.org> Date: Sun, 11 Feb 2007 14:40:24 GMT From: KOMATSU Shinichiro To: freebsd-gnats-submit@FreeBSD.org X-Send-Pr-Version: www-3.0 Cc: Subject: ports/109049: security/vuxml: Add the entry of samba vulnerabilities fixed in samba-3.0.24, 1 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Feb 2007 14:50:04 -0000 >Number: 109049 >Category: ports >Synopsis: security/vuxml: Add the entry of samba vulnerabilities fixed in samba-3.0.24,1 >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Sun Feb 11 14:50:03 GMT 2007 >Closed-Date: >Last-Modified: >Originator: KOMATSU Shinichiro >Release: FreeBSD 6.2-RELEASE i386 >Organization: >Environment: FreeBSD 6.2-RELEASE i386 >Description: Three vulnerabilities were fixed (one of which does not affect FreeBSD, thought) in samba-3.0.24,1 and ja-samba-3.0.24,1, but they are not documented in VuXML. >How-To-Repeat: >Fix: Patch attached with submission follows: Index: security/vuxml/vuln.xml =================================================================== RCS file: /home/ncvs/ports/security/vuxml/vuln.xml,v retrieving revision 1.1270 diff -u -r1.1270 vuln.xml --- security/vuxml/vuln.xml 17 Jan 2007 22:17:49 -0000 1.1270 +++ security/vuxml/vuln.xml 11 Feb 2007 12:56:18 -0000 @@ -34,6 +34,79 @@ --> + + samba -- potential Denial of Service bug in smbd + + + samba + ja-samba + 3.0.6,13.0.24,1 + + + + +

The Samba Team reports:

+
+

Internally Samba's file server daemon, smbd, implements + support for deferred file open calls in an attempt to serve + client requests that would otherwise fail due to a share mode + violation. When renaming a file under certain circumstances + it is possible that the request is never removed from the deferred + open queue. smbd will then become stuck is a loop trying to + service the open request.

+

This bug may allow an authenticated user to exhaust resources + such as memory and CPU on the server by opening multiple CIFS + sessions, each of which will normally spawn a new smbd process, + and sending each connection into an infinite loop.

+
+ +
+ + CVE-2007-0452 + http://www.samba.org/samba/security/CVE-2007-0452.html + + + 2007-02-05 + 2007-02-11 + +
+ + + samba -- format string bug in afsacl.so VFS plugin + + + samba + ja-samba + 3.0.6,13.0.24,1 + + + + +

The Samba Team reports:

+
+

NOTE: This security advisory only impacts Samba servers + that share AFS file systems to CIFS clients and which have + been explicitly instructed in smb.conf to load the afsacl.so + VFS module.

+

The source defect results in the name of a file stored on + disk being used as the format string in a call to snprintf(). + This bug becomes exploitable only when a user is able + to write to a share which utilizes Samba's afsacl.so library + for setting Windows NT access control lists on files residing + on an AFS file system.

+
+ +
+ + CVE-2007-0454 + http://www.samba.org/samba/security/CVE-2007-0454.html + + + 2007-02-05 + 2007-02-11 + +
+ joomla -- multiple remote vulnerabilities >Release-Note: >Audit-Trail: >Unformatted: