From: Roy Li <[email protected]> 6.4 fixed a CVE defect: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2830 Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.
Signed-off-by: Roy Li <[email protected]> --- meta-networking/recipes-support/cifs/cifs-utils_git.bb | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/meta-networking/recipes-support/cifs/cifs-utils_git.bb b/meta-networking/recipes-support/cifs/cifs-utils_git.bb index 2b7a0dd..66ec7b8 100644 --- a/meta-networking/recipes-support/cifs/cifs-utils_git.bb +++ b/meta-networking/recipes-support/cifs/cifs-utils_git.bb @@ -4,10 +4,9 @@ HOMEPAGE = "http://wiki.samba.org/index.php/LinuxCIFS_utils" LICENSE = "GPLv3 & LGPLv3" LIC_FILES_CHKSUM = "file://COPYING;md5=d32239bcb673463ab874e80d47fae504" -PV = "5.9" -PR = "r1" +PV = "6.4" -SRCREV = "353d491dcb5d69d31434abeb962c8e9a49c36867" +SRCREV = "487f46da737291877867cbd3acb40fea087d3863" SRC_URI = "git://git.samba.org/cifs-utils.git" S = "${WORKDIR}/git" -- 2.1.0 -- _______________________________________________ Openembedded-devel mailing list [email protected] http://lists.openembedded.org/mailman/listinfo/openembedded-devel
