Subject: CVS commit: [pkgsrc-2013Q2] pkgsrc/net/samba35
From: Matthias Scheler
Date: 2013-08-12 16:21:30
Message id: 20130812142130.66A7296@cvs.netbsd.org

Log Message:
Pullup ticket #4208 - requested by taca
net/samba35: security update

Revisions pulled up:
- net/samba35/Makefile                                          1.31
- net/samba35/distinfo                                          1.16
- net/samba35/patches/patch-af                                  1.6
- net/samba35/patches/patch-ah                                  1.3
- net/samba35/patches/patch-ap                                  1.2
- net/samba35/patches/patch-aq                                  1.4
- net/samba35/patches/patch-av                                  1.3
- net/samba35/patches/patch-aw                                  1.2
- net/samba35/patches/patch-ba                                  1.2
- net/samba35/patches/patch-bb                                  1.2

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Mon Aug 12 02:47:32 UTC 2013

   Modified Files:
   	pkgsrc/net/samba35: Makefile distinfo
   	pkgsrc/net/samba35/patches: patch-af patch-ah patch-ap patch-aq
   	    patch-av patch-aw patch-ba patch-bb

   Log Message:
   Update samba35 to 3.5.22, security release.

                      ==============================
                      Release Notes for Samba 3.5.22
   			  August 05, 2013
                      ==============================

   This is a security release in order to address
   CVE-2013-4124 (Missing integer wrap protection in EA list reading can cause
   server to loop with DOS).

   o  CVE-2013-4124:
      All current released versions of Samba are vulnerable to a denial of
      service on an authenticated or guest connection. A malformed packet
      can cause the smbd server to loop the CPU performing memory
      allocations and preventing any further service.

      A connection to a file share, or a local account is needed to exploit
      this problem, either authenticated or unauthenticated if guest
      connections are allowed.

      This flaw is not exploitable beyond causing the code to loop
      allocating memory, which may cause the machine to exceed memory
      limits.

   Changes since 3.5.21:
   ---------------------

   o   Jeremy Allison <jra@samba.org>
       * BUG 10010: CVE-2013-4124: Missing integer wrap protection in EA list
         reading can cause server to loop with DOS.

Files:
RevisionActionfile
1.29.2.1modifypkgsrc/net/samba35/Makefile
1.15.4.1modifypkgsrc/net/samba35/distinfo
1.5.6.1modifypkgsrc/net/samba35/patches/patch-af
1.2.18.1modifypkgsrc/net/samba35/patches/patch-ah
1.1.1.1.22.1modifypkgsrc/net/samba35/patches/patch-ap
1.3.18.1modifypkgsrc/net/samba35/patches/patch-aq
1.2.18.1modifypkgsrc/net/samba35/patches/patch-av
1.1.1.1.22.1modifypkgsrc/net/samba35/patches/patch-aw
1.1.14.1modifypkgsrc/net/samba35/patches/patch-ba
1.1.14.1modifypkgsrc/net/samba35/patches/patch-bb