Update samba33 package to 3.3.14.
============================== Release Notes for Samba 3.3.14 September 14, 2010 ============================== This is a security release in order to address CVE-2010-3069. o CVE-2010-3069: All current released versions of Samba are vulnerable to a buffer overrun vulnerability. The sid_parse() function (and related dom_sid_parse() function in the source4 code) do not correctly check their input lengths when reading a binary representation of a Windows SID (Security ID). This allows a malicious client to send a sid that can overflow the stack variable that is being used to store the SID in the Samba smbd server.
This commit is contained in:
parent
1a5ae98b18
commit
32f24610d3
2 changed files with 6 additions and 6 deletions
|
@ -1,4 +1,4 @@
|
||||||
# $NetBSD: Makefile,v 1.10 2010/06/16 14:34:35 taca Exp $
|
# $NetBSD: Makefile,v 1.11 2010/09/14 13:08:23 taca Exp $
|
||||||
|
|
||||||
.include "../../net/samba/Makefile.mirrors"
|
.include "../../net/samba/Makefile.mirrors"
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ HOMEPAGE= http://www.samba.org/
|
||||||
COMMENT= SMB/CIFS protocol server suite
|
COMMENT= SMB/CIFS protocol server suite
|
||||||
LICENSE= gnu-gpl-v3
|
LICENSE= gnu-gpl-v3
|
||||||
|
|
||||||
VERSION= 3.3.13
|
VERSION= 3.3.14
|
||||||
CONFLICTS+= ja-samba-[0-9]* pam-smbpass-[0-9]* tdb-[0-9]* \
|
CONFLICTS+= ja-samba-[0-9]* pam-smbpass-[0-9]* tdb-[0-9]* \
|
||||||
winbind-[0-9]*
|
winbind-[0-9]*
|
||||||
MAKE_JOBS_SAFE= NO
|
MAKE_JOBS_SAFE= NO
|
||||||
|
|
|
@ -1,8 +1,8 @@
|
||||||
$NetBSD: distinfo,v 1.4 2010/06/16 14:34:35 taca Exp $
|
$NetBSD: distinfo,v 1.5 2010/09/14 13:08:23 taca Exp $
|
||||||
|
|
||||||
SHA1 (samba-3.3.13.tar.gz) = 46c7ad5d63917f81f6a135504f36c6d04eb18619
|
SHA1 (samba-3.3.14.tar.gz) = 93a85b484066a9bda306d4283ee1d3e1ed7fe4a5
|
||||||
RMD160 (samba-3.3.13.tar.gz) = 96498964ed2a29c4d49f20c787536797711022cb
|
RMD160 (samba-3.3.14.tar.gz) = 5e6cb798e35395913f57161916977f89ad4770af
|
||||||
Size (samba-3.3.13.tar.gz) = 25593024 bytes
|
Size (samba-3.3.14.tar.gz) = 25595811 bytes
|
||||||
SHA1 (patch-aa) = 35b1e645bd3d023cd8b6ecde383dac290509ca07
|
SHA1 (patch-aa) = 35b1e645bd3d023cd8b6ecde383dac290509ca07
|
||||||
SHA1 (patch-ab) = 0372ff2e3caca866dacd6ed25ae1d02e34a5b567
|
SHA1 (patch-ab) = 0372ff2e3caca866dacd6ed25ae1d02e34a5b567
|
||||||
SHA1 (patch-ac) = dfddc9fa7f76126e523c7859ac66ce9dd432d732
|
SHA1 (patch-ac) = dfddc9fa7f76126e523c7859ac66ce9dd432d732
|
||||||
|
|
Loading…
Reference in a new issue