summaryrefslogtreecommitdiff
path: root/net
diff options
context:
space:
mode:
authorjmc <jmc@pkgsrc.org>2003-03-23 01:22:43 +0000
committerjmc <jmc@pkgsrc.org>2003-03-23 01:22:43 +0000
commit19f26e270020198ff931c7ac1cb55b30c394c42b (patch)
tree20d0b9485135f7a0b48f75510ac8b08aaa65a424 /net
parent20b80a25f584ba47767a4738beb130a81f042491 (diff)
downloadpkgsrc-19f26e270020198ff931c7ac1cb55b30c394c42b.tar.gz
Pullup rev 1.95 (requested by bouyer in ticket #1220)
Updated samba to 2.2.8 **************************************** * IMPORTANT: Security bugfix for Samba * **************************************** The SuSE security audit team, in particular Sebastian Krahmer <krahmer@suse.de>, has found a flaw in the Samba main smbd code which could allow an external attacker to remotely and anonymously gain Super User (root) privileges on a server running a Samba server. This flaw exists in previous versions of Samba from 2.0.x to 2.2.7a inclusive. This is a serious problem and all sites should either upgrade to Samba 2.2.8 immediately or prohibit access to TCP ports 139 and 445. Advice created by Andrew Tridgell, the leader of the Samba Team, on how to protect an unpatched Samba server is given at the end of this section. The SMB/CIFS protocol implemented by Samba is vulnerable to many attacks, even without specific security holes. The TCP ports 139 and the new port 445 (used by Win2k and the Samba 3.0 alpha code in particular) should never be exposed to untrusted networks.
Diffstat (limited to 'net')
-rw-r--r--net/samba/Makefile3
1 files changed, 1 insertions, 2 deletions
diff --git a/net/samba/Makefile b/net/samba/Makefile
index 60620b4010b..bdade7f3d21 100644
--- a/net/samba/Makefile
+++ b/net/samba/Makefile
@@ -1,8 +1,7 @@
-# $NetBSD: Makefile,v 1.93.2.1 2003/03/23 01:09:18 jmc Exp $
+# $NetBSD: Makefile,v 1.93.2.2 2003/03/23 01:22:43 jmc Exp $
.include "Makefile.common"
-PKGREVISION= 1
MAINTAINER= packages@netbsd.org
HOMEPAGE= http://www.samba.org/
COMMENT= SMB/CIFS protocol server suite for UNIX