summaryrefslogtreecommitdiff
path: root/net/samba/patches/patch-aw
diff options
context:
space:
mode:
authortaca <taca@pkgsrc.org>2013-08-12 02:45:55 +0000
committertaca <taca@pkgsrc.org>2013-08-12 02:45:55 +0000
commitb6344c34ad08a8574711ac6f22060b93c6b1267d (patch)
tree0c2d275be3a199694e2e84225f8b4bd041ace9b6 /net/samba/patches/patch-aw
parent7883cc0b7ac26eae1aff29c001676c0cd7e8b76b (diff)
downloadpkgsrc-b6344c34ad08a8574711ac6f22060b93c6b1267d.tar.gz
Update samba to 3.6.17, security release.
============================== Release Notes for Samba 3.6.17 August 05, 2013 ============================== This is a security release in order to address CVE-2013-4124 (Missing integer wrap protection in EA list reading can cause server to loop with DOS). o CVE-2013-4124: All current released versions of Samba are vulnerable to a denial of service on an authenticated or guest connection. A malformed packet can cause the smbd server to loop the CPU performing memory allocations and preventing any further service. A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated if guest connections are allowed. This flaw is not exploitable beyond causing the code to loop allocating memory, which may cause the machine to exceed memory limits. Changes since 3.6.16: --------------------- o Jeremy Allison <jra@samba.org> * BUG 10010: CVE-2013-4124: Missing integer wrap protection in EA list reading can cause server to loop with DOS.
Diffstat (limited to 'net/samba/patches/patch-aw')
-rw-r--r--net/samba/patches/patch-aw6
1 files changed, 3 insertions, 3 deletions
diff --git a/net/samba/patches/patch-aw b/net/samba/patches/patch-aw
index 2f193f451e4..987327ea0a9 100644
--- a/net/samba/patches/patch-aw
+++ b/net/samba/patches/patch-aw
@@ -1,8 +1,8 @@
-$NetBSD: patch-aw,v 1.3 2011/12/16 11:05:24 asau Exp $
+$NetBSD: patch-aw,v 1.4 2013/08/12 02:45:55 taca Exp $
---- winbindd/winbindd_cache.c.orig 2010-12-05 21:02:29.000000000 +0000
+--- winbindd/winbindd_cache.c.orig 2013-07-29 18:55:18.000000000 +0000
+++ winbindd/winbindd_cache.c
-@@ -4438,7 +4438,7 @@ struct winbindd_tdc_domain * wcache_tdc_
+@@ -4623,7 +4623,7 @@ struct winbindd_tdc_domain * wcache_tdc_
DEBUG(10,("wcache_tdc_fetch_domain: Searching for domain %s\n", name));
if ( !init_wcache() ) {