--- - branch: MAIN date: Tue Jan 21 14:12:36 UTC 2020 files: - new: '1.88' old: '1.87' path: pkgsrc/net/samba4/Makefile pathrev: pkgsrc/net/samba4/Makefile@1.88 type: modified - new: '1.41' old: '1.40' path: pkgsrc/net/samba4/distinfo pathrev: pkgsrc/net/samba4/distinfo@1.41 type: modified id: 20200121T141236Z.ad831643e03a3daf9c4ceb34f5b490dfac3de593 log: "net/samba4: update to 4.11.5\n\nUpdate samba4 to 4.11.5.\n\n ==============================\n \ Release Notes for Samba 4.11.5\n January 21, 2020\n\t\t ==============================\n\nThis is a security release in order to address the following defects:\n\no CVE-2019-14902: Replication of ACLs set to inherit down a subtree on AD\n\t\t Directory not automatic.\no CVE-2019-14907: Crash after failed character conversion at log level 3 or\n\t\t above.\no CVE-2019-19344: Use after free during DNS zone scavenging in Samba AD DC.\n\n=======\nDetails\n=======\n\no \ CVE-2019-14902:\n The implementation of ACL inheritance in the Samba AD DC was not complete,\n and so absent a 'full-sync' replication, ACLs could get out of sync between\n domain controllers.\n\no CVE-2019-14907:\n When processing untrusted string input Samba can read past the end of the\n allocated buffer when printing a \"Conversion error\" message to the logs.\n\no CVE-2019-19344:\n \ During DNS zone scavenging (of expired dynamic entries) there is a read of\n \ memory after it has been freed.\n" module: pkgsrc subject: 'CVS commit: pkgsrc/net/samba4' unixtime: '1579615956' user: taca