Path to this page:
./
net/samba33,
SMB/CIFS protocol server suite
Branch: pkgsrc-2010Q2,
Version: 3.3.14,
Package name: samba-3.3.14,
Maintainer: pkgsrc-usersRequired to run:[
devel/readline] [
devel/popt] [
lang/perl5]
Master sites: (Expand)
SHA1: 93a85b484066a9bda306d4283ee1d3e1ed7fe4a5
RMD160: 5e6cb798e35395913f57161916977f89ad4770af
Filesize: 24995.909 KB
Version history: (Expand)
- (2010-09-15) Updated to version: samba-3.3.14
- (2010-07-05) Package has been reborn
- (2010-07-04) Package added to pkgsrc.se, version samba-3.3.13 (created)
CVS history: (Expand)
2010-09-15 09:53:49 by Matthias Scheler | Files touched by this commit (2) | |
Log message:
Pullup ticket #3223 - requested by taca
net/samba33: security update
Revisions pulled up:
- net/samba33/Makefile 1.11
- net/samba33/distinfo 1.5
---
Module Name: pkgsrc
Committed By: taca
Date: Tue Sep 14 13:08:23 UTC 2010
Modified Files:
pkgsrc/net/samba33: Makefile distinfo
Log message:
Update samba33 package to 3.3.14.
==============================
Release Notes for Samba 3.3.14
September 14, 2010
==============================
This is a security release in order to address CVE-2010-3069.
o CVE-2010-3069:
All current released versions of Samba are vulnerable to
a buffer overrun vulnerability. The sid_parse() function
(and related dom_sid_parse() function in the source4 code)
do not correctly check their input lengths when reading a
binary representation of a Windows SID (Security ID). This
allows a malicious client to send a sid that can overflow
the stack variable that is being used to store the SID in the
Samba smbd server.
|