openbsd-ports/net/samba/distinfo
brad 3874e6995b Update to Samba 3.0.30; bug fixes and a security issue fixed,
CVE-2008-1105.

Specifically crafted SMB responses can result in a heap overflow
in the Samba client code. Because the server process, smbd, can
itself act as a client during operations such as printer
notification and domain authentication, this issue affects both
Samba client and server installations.

Feedback from sthen@
ok mbalmer@ sthen@
2008-07-11 11:40:33 +00:00

6 lines
285 B
Plaintext

MD5 (samba-3.0.30.tar.gz) = 1kfsHzRBT6hpH3RTbczPtQ==
RMD160 (samba-3.0.30.tar.gz) = SfL3cpTNq218qduHh1XbI4Tol8w=
SHA1 (samba-3.0.30.tar.gz) = YJxgLZoX6gWVT8n8Ahz9lSJ+rvs=
SHA256 (samba-3.0.30.tar.gz) = oXidO4lqqyWiDEN/Aou1a8TehlXajm9eenQ5Isgo+lM=
SIZE (samba-3.0.30.tar.gz) = 20510081