Update samba33 package to 3.3.14.
============================== Release Notes for Samba 3.3.14 September 14, 2010 ============================== This is a security release in order to address CVE-2010-3069. o CVE-2010-3069: All current released versions of Samba are vulnerable to a buffer overrun vulnerability. The sid_parse() function (and related dom_sid_parse() function in the source4 code) do not correctly check their input lengths when reading a binary representation of a Windows SID (Security ID). This allows a malicious client to send a sid that can overflow the stack variable that is being used to store the SID in the Samba smbd server.
This commit is contained in:
parent
8af27cde45
commit
f60effea71
2 changed files with 6 additions and 6 deletions
|
@ -1,4 +1,4 @@
|
|||
# $NetBSD: Makefile,v 1.10 2010/06/16 14:34:35 taca Exp $
|
||||
# $NetBSD: Makefile,v 1.11 2010/09/14 13:08:23 taca Exp $
|
||||
|
||||
.include "../../net/samba/Makefile.mirrors"
|
||||
|
||||
|
@ -11,7 +11,7 @@ HOMEPAGE= http://www.samba.org/
|
|||
COMMENT= SMB/CIFS protocol server suite
|
||||
LICENSE= gnu-gpl-v3
|
||||
|
||||
VERSION= 3.3.13
|
||||
VERSION= 3.3.14
|
||||
CONFLICTS+= ja-samba-[0-9]* pam-smbpass-[0-9]* tdb-[0-9]* \
|
||||
winbind-[0-9]*
|
||||
MAKE_JOBS_SAFE= NO
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
$NetBSD: distinfo,v 1.4 2010/06/16 14:34:35 taca Exp $
|
||||
$NetBSD: distinfo,v 1.5 2010/09/14 13:08:23 taca Exp $
|
||||
|
||||
SHA1 (samba-3.3.13.tar.gz) = 46c7ad5d63917f81f6a135504f36c6d04eb18619
|
||||
RMD160 (samba-3.3.13.tar.gz) = 96498964ed2a29c4d49f20c787536797711022cb
|
||||
Size (samba-3.3.13.tar.gz) = 25593024 bytes
|
||||
SHA1 (samba-3.3.14.tar.gz) = 93a85b484066a9bda306d4283ee1d3e1ed7fe4a5
|
||||
RMD160 (samba-3.3.14.tar.gz) = 5e6cb798e35395913f57161916977f89ad4770af
|
||||
Size (samba-3.3.14.tar.gz) = 25595811 bytes
|
||||
SHA1 (patch-aa) = 35b1e645bd3d023cd8b6ecde383dac290509ca07
|
||||
SHA1 (patch-ab) = 0372ff2e3caca866dacd6ed25ae1d02e34a5b567
|
||||
SHA1 (patch-ac) = dfddc9fa7f76126e523c7859ac66ce9dd432d732
|
||||
|
|
Loading…
Reference in a new issue