Commit Graph

4 Commits

Author SHA1 Message Date
brad
3874e6995b Update to Samba 3.0.30; bug fixes and a security issue fixed,
CVE-2008-1105.

Specifically crafted SMB responses can result in a heap overflow
in the Samba client code. Because the server process, smbd, can
itself act as a client during operations such as printer
notification and domain authentication, this issue affects both
Samba client and server installations.

Feedback from sthen@
ok mbalmer@ sthen@
2008-07-11 11:40:33 +00:00
ajacoutot
84abc278d0 - don't use hardcoded paths in swat man page
- regen patches while here

"if it works for you" mbalmer@
2007-04-06 14:20:35 +00:00
mbalmer
9d1bd157c2 Update to Samba 3.0.21b.
requested by and ok brad@
2006-02-02 09:40:43 +00:00
sturm
f04acb3271 fix some NULL pointer sentinels
fix pathes in the port's Makefile
add a missing directory to PLIST

ok mbalmer@
2005-05-27 04:54:40 +00:00