cifs-utils: upgrade to 6.4

6.4 fixed a CVE defect:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2830
Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils
before 6.4, as used in pam_cifscreds, allows remote attackers to have
unspecified impact via unknown vectors.

Signed-off-by: Roy Li <rongqing.li@windriver.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
This commit is contained in:
Roy Li 2015-05-06 14:25:33 +08:00 committed by Joe MacDonald
parent 4f8bf53a4b
commit 2cb54ed8a1

View File

@ -4,10 +4,9 @@ HOMEPAGE = "http://wiki.samba.org/index.php/LinuxCIFS_utils"
LICENSE = "GPLv3 & LGPLv3"
LIC_FILES_CHKSUM = "file://COPYING;md5=d32239bcb673463ab874e80d47fae504"
PV = "5.9"
PR = "r1"
PV = "6.4"
SRCREV = "353d491dcb5d69d31434abeb962c8e9a49c36867"
SRCREV = "487f46da737291877867cbd3acb40fea087d3863"
SRC_URI = "git://git.samba.org/cifs-utils.git"
S = "${WORKDIR}/git"