Path to this page:
./
net/samba35,
SMB/CIFS protocol server suite
Branch: pkgsrc-2013Q2,
Version: 3.5.22,
Package name: samba-3.5.22,
Maintainer: pkgsrc-usersDEINSTALL.nss_winbind [+/-]# $NetBSD: DEINSTALL.nss_winbind,v 1.1 2012/09/11 07:50:50 sbd Exp $
case ${STAGE} in
DEINSTALL)
NSS_WINBIND='@NSS_WINBIND@'
case $NSS_WINBIND in
"@comment *") ;;
*)
if ${TEST} -e /usr/lib/${NSS_WINBIND##*/} && \
target=`${LS} -l /usr/lib/${NSS_WINBIND##*/} | \
${AWK} '{print $NF;}'` && \
${TEST} x"$target" = x"${PREFIX}/${NSS_WINBIND}" ;then
${ECHO} "Removeing /usr/lib/${NSS_WINBIND##*/} symlink."
${RM} -f /usr/lib/${NSS_WINBIND##*/}
fi
;;
esac
;;
esac
Required to run:[
devel/popt] [
devel/readline] [
lang/perl5]
Package options: ads, ldap, pam, winbind
Master sites: (Expand)
SHA1: 6c807dc64c0cd02bd560c4cfc5fe485964777e49
RMD160: ed8d8f9c5c1123334773fa9d47dca1e32ce54b6b
Filesize: 34555.805 KB
Version history: (Expand)
- (2013-08-12) Updated to version: samba-3.5.22
- (2013-07-08) Package added to pkgsrc.se, version samba-3.5.21nb2 (created)
CVS history: (Expand)
2013-08-12 16:21:30 by Matthias Scheler | Files touched by this commit (10) | |
Log message:
Pullup ticket #4208 - requested by taca
net/samba35: security update
Revisions pulled up:
- net/samba35/Makefile 1.31
- net/samba35/distinfo 1.16
- net/samba35/patches/patch-af 1.6
- net/samba35/patches/patch-ah 1.3
- net/samba35/patches/patch-ap 1.2
- net/samba35/patches/patch-aq 1.4
- net/samba35/patches/patch-av 1.3
- net/samba35/patches/patch-aw 1.2
- net/samba35/patches/patch-ba 1.2
- net/samba35/patches/patch-bb 1.2
---
Module Name: pkgsrc
Committed By: taca
Date: Mon Aug 12 02:47:32 UTC 2013
Modified Files:
pkgsrc/net/samba35: Makefile distinfo
pkgsrc/net/samba35/patches: patch-af patch-ah patch-ap patch-aq
patch-av patch-aw patch-ba patch-bb
Log message:
Update samba35 to 3.5.22, security release.
==============================
Release Notes for Samba 3.5.22
August 05, 2013
==============================
This is a security release in order to address
CVE-2013-4124 (Missing integer wrap protection in EA list reading can cause
server to loop with DOS).
o CVE-2013-4124:
All current released versions of Samba are vulnerable to a denial of
service on an authenticated or guest connection. A malformed packet
can cause the smbd server to loop the CPU performing memory
allocations and preventing any further service.
A connection to a file share, or a local account is needed to exploit
this problem, either authenticated or unauthenticated if guest
connections are allowed.
This flaw is not exploitable beyond causing the code to loop
allocating memory, which may cause the machine to exceed memory
limits.
Changes since 3.5.21:
---------------------
o Jeremy Allison <jra@samba.org>
* BUG 10010: CVE-2013-4124: Missing integer wrap protection in EA list
reading can cause server to loop with DOS.
|