Path to this page:
./
net/samba33,
SMB/CIFS protocol server suite
Branch: pkgsrc-2010Q4,
Version: 3.3.15,
Package name: samba-3.3.15,
Maintainer: pkgsrc-usersRequired to run:[
lang/perl5] [
devel/popt] [
devel/readline]
Package options: ads, ldap, pam, winbind
Master sites: (Expand)
SHA1: b555ee27f69f943982f92de771e9e094615712c1
RMD160: af83e6c26d550d6ddc8a1000cb72ed9b8fc9d124
Filesize: 24992.073 KB
Version history: (Expand)
- (2011-03-01) Updated to version: samba-3.3.15
- (2011-01-25) Package added to pkgsrc.se, version samba-3.3.14nb1 (created)
CVS history: (Expand)
2011-03-01 10:09:03 by Steven Drake | Files touched by this commit (2) |
Log message:
Pullup ticket #3367 - requested by taca
net/samba33 security fix.
Revisions pulled up:
- net/samba33/Makefile 1.13
- net/samba33/distinfo 1.6
---
Module Name: pkgsrc
Module Name: pkgsrc
Committed By: taca
Date: Mon Feb 28 14:34:09 UTC 2011
Modified Files:
pkgsrc/net/samba33: Makefile distinfo
Log message:
Update samba33 pacakge to 3.3.15.
Release Announcements
=====================
Samba 3.5.7, 3.4.12 and 3.3.15 are security releases in order to
address CVE-2011-0719.
o CVE-2011-0719:
All current released versions of Samba are vulnerable to
a denial of service caused by memory corruption. Range
checks on file descriptors being used in the FD_SET macro
were not present allowing stack corruption. This can cause
the Samba code to crash or to loop attempting to select
on a bad file descriptor set.
A connection to a file share, or a local account is needed
to exploit this problem, either authenticated or unauthenticated
(guest connection).
Currently we do not believe this flaw is exploitable
beyond a crash or causing the code to loop, but on the
advice of our security reviewers we are releasing fixes
in case an exploit is discovered at a later date.
Changes
-------
o Jeremy Allison <jra at samba.org>
* BUG 7949: Fix DoS in Winbind and smbd with many file descriptors open.
|