Update samba33 package to 3.3.14.

==============================
                   Release Notes for Samba 3.3.14
		         September 14, 2010
                   ==============================


This is a security release in order to address CVE-2010-3069.


o  CVE-2010-3069:
   All current released versions of Samba are vulnerable to
   a buffer overrun vulnerability. The sid_parse() function
   (and related dom_sid_parse() function in the source4 code)
   do not correctly check their input lengths when reading a
   binary representation of a Windows SID (Security ID). This
   allows a malicious client to send a sid that can overflow
   the stack variable that is being used to store the SID in the
   Samba smbd server.
This commit is contained in:
taca 2010-09-14 13:08:23 +00:00
parent 8af27cde45
commit f60effea71
2 changed files with 6 additions and 6 deletions

View file

@ -1,4 +1,4 @@
# $NetBSD: Makefile,v 1.10 2010/06/16 14:34:35 taca Exp $
# $NetBSD: Makefile,v 1.11 2010/09/14 13:08:23 taca Exp $
.include "../../net/samba/Makefile.mirrors"
@ -11,7 +11,7 @@ HOMEPAGE= http://www.samba.org/
COMMENT= SMB/CIFS protocol server suite
LICENSE= gnu-gpl-v3
VERSION= 3.3.13
VERSION= 3.3.14
CONFLICTS+= ja-samba-[0-9]* pam-smbpass-[0-9]* tdb-[0-9]* \
winbind-[0-9]*
MAKE_JOBS_SAFE= NO

View file

@ -1,8 +1,8 @@
$NetBSD: distinfo,v 1.4 2010/06/16 14:34:35 taca Exp $
$NetBSD: distinfo,v 1.5 2010/09/14 13:08:23 taca Exp $
SHA1 (samba-3.3.13.tar.gz) = 46c7ad5d63917f81f6a135504f36c6d04eb18619
RMD160 (samba-3.3.13.tar.gz) = 96498964ed2a29c4d49f20c787536797711022cb
Size (samba-3.3.13.tar.gz) = 25593024 bytes
SHA1 (samba-3.3.14.tar.gz) = 93a85b484066a9bda306d4283ee1d3e1ed7fe4a5
RMD160 (samba-3.3.14.tar.gz) = 5e6cb798e35395913f57161916977f89ad4770af
Size (samba-3.3.14.tar.gz) = 25595811 bytes
SHA1 (patch-aa) = 35b1e645bd3d023cd8b6ecde383dac290509ca07
SHA1 (patch-ab) = 0372ff2e3caca866dacd6ed25ae1d02e34a5b567
SHA1 (patch-ac) = dfddc9fa7f76126e523c7859ac66ce9dd432d732