2015-02-25 16:00:20 by Takahiro Kambe | Files touched by this commit (39) | |
Log message:
Remove samba35 package. Samba 3.5.x was EOL Oct 2013.
|
2014-12-21 10:17:11 by OBATA Akio | Files touched by this commit (1) |
Log message:
PLIST for SunOS, same as net/samba.
|
2014-05-30 01:38:20 by Thomas Klausner | Files touched by this commit (3049) |
Log message:
Bump for perl-5.20.0.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
|
2014-03-18 04:35:23 by Takahiro Kambe | Files touched by this commit (2) |
Log message:
Add patch to build problem with newer readline.
|
2014-03-11 15:05:19 by Jonathan Perkin | Files touched by this commit (350) |
Log message:
Remove example rc.d scripts from PLISTs.
These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or
ignored otherwise.
|
2014-03-03 09:46:45 by OBATA Akio | Files touched by this commit (3) |
Log message:
Replace log dir in the default sampel config file correctly.
Bump PKGREVISION.
|
2014-03-03 09:31:02 by OBATA Akio | Files touched by this commit (1) |
Log message:
simplify with SUBST_VARS.
|
2014-02-13 00:18:57 by Matthias Scheler | Files touched by this commit (1568) |
Log message:
Recursive PKGREVISION bump for OpenSSL API version bump.
|
2014-01-28 13:17:55 by OBATA Akio | Files touched by this commit (1) |
Log message:
Use GNU_CONFIGURE_LIBDIR for --libdir.
|
2013-08-12 04:47:32 by Takahiro Kambe | Files touched by this commit (10) |
Log message:
Update samba35 to 3.5.22, security release.
==============================
Release Notes for Samba 3.5.22
August 05, 2013
==============================
This is a security release in order to address
CVE-2013-4124 (Missing integer wrap protection in EA list reading can cause
server to loop with DOS).
o CVE-2013-4124:
All current released versions of Samba are vulnerable to a denial of
service on an authenticated or guest connection. A malformed packet
can cause the smbd server to loop the CPU performing memory
allocations and preventing any further service.
A connection to a file share, or a local account is needed to exploit
this problem, either authenticated or unauthenticated if guest
connections are allowed.
This flaw is not exploitable beyond causing the code to loop
allocating memory, which may cause the machine to exceed memory
limits.
Changes since 3.5.21:
---------------------
o Jeremy Allison <jra@samba.org>
* BUG 10010: CVE-2013-4124: Missing integer wrap protection in EA list
reading can cause server to loop with DOS.
|