============================== Release Notes for Samba 3.6.17 August 05, 2013 ============================== This is a security release in order to address CVE-2013-4124 (Missing integer wrap protection in EA list reading can cause server to loop with DOS). o CVE-2013-4124: All current released versions of Samba are vulnerable to a denial of service on an authenticated or guest connection. A malformed packet can cause the smbd server to loop the CPU performing memory allocations and preventing any further service. A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated if guest connections are allowed. This flaw is not exploitable beyond causing the code to loop allocating memory, which may cause the machine to exceed memory limits. Changes since 3.6.16: --------------------- o Jeremy Allison <jra@samba.org> * BUG 10010: CVE-2013-4124: Missing integer wrap protection in EA list reading can cause server to loop with DOS.
14 lines
413 B
Text
14 lines
413 B
Text
$NetBSD: patch-bb,v 1.5 2013/08/12 02:45:55 taca Exp $
|
|
|
|
--- include/config.h.in.orig 2013-07-29 18:57:13.000000000 +0000
|
|
+++ include/config.h.in
|
|
@@ -1598,6 +1598,9 @@
|
|
/* Defined if struct passwd has pw_age field */
|
|
#undef HAVE_PASSWD_PW_AGE
|
|
|
|
+/* Defined if struct passwd has pw_class field */
|
|
+#undef HAVE_PASSWD_PW_CLASS
|
|
+
|
|
/* Defined if struct passwd has pw_comment field */
|
|
#undef HAVE_PASSWD_PW_COMMENT
|
|
|