Commit graph

23 commits

Author SHA1 Message Date
asau
1957dc0bbd Apply official patch to address CVE-2012-1182 ("root" credential remote code execution). 2012-04-11 10:03:37 +00:00
taca
b7bf75b1c4 Add patch for CVE-2012-0870.
Bump PKGREVISION.
2012-03-13 13:22:24 +00:00
wiz
5a1e8b0499 Revbump for
a) tiff update to 4.0 (shlib major change)
b) glib2 update 2.30.2 (adds libffi dependency to buildlink3.mk)

Enjoy.
2012-02-06 12:40:37 +00:00
sbd
54342d6140 Move the options.mk file for net/samba30 and net/samba33 from net/samba to
net/samba33 because of up coming changes to net/samba/options.mk that are
in-compatible with 30 and 33.
2012-02-01 08:14:47 +00:00
sbd
8f05b7bfe0 Add PLIST.Linux
Bump PKGREVISION
2012-01-31 07:14:58 +00:00
sbd
0fea84f4dc Convert packages with add --libdir=* to CONFIGURE_ARGS to use
GNU_CONFIGURE_LIBDIR or GNU_CONFIGURE_LIBSUBDIR.
2012-01-17 21:43:18 +00:00
taca
b479b8f76c Add workaround for NetBSD 5.99.54 as samba35. 2011-08-02 14:05:27 +00:00
taca
5525ba13ce Update samba33 package to 3.3.16; security fix for swat.
==============================
                   Release Notes for Samba 3.3.16
		           July 26, 2011
                   ==============================


This is a security release in order to address
CVE-2011-2522 (Cross-Site Request Forgery in SWAT) and
CVE-2011-2694 (Cross-Site Scripting vulnerability in SWAT).


o  CVE-2011-2522:
   The Samba Web Administration Tool (SWAT) in Samba versions
   3.0.x to 3.5.9 are affected by a cross-site request forgery.


o  CVE-2011-2694:
   The Samba Web Administration Tool (SWAT) in Samba versions
   3.0.x to 3.5.9 are affected by a cross-site scripting
   vulnerability.

Please note that SWAT must be enabled in order for these
vulnerabilities to be exploitable. By default, SWAT
is *not* enabled on a Samba install.


Changes since 3.3.15
--------------------


o   Kai Blin <kai@samba.org>
    * BUG 8289: SWAT contains a cross-site scripting vulnerability.
    * BUG 8290: CSRF vulnerability in SWAT.
2011-07-27 00:53:37 +00:00
obache
1d9df3258a recursive bump from gettext-lib shlib bump. 2011-04-22 13:41:54 +00:00
taca
8fb6550893 Update samba33 pacakge to 3.3.15.
Release Announcements
=====================

Samba 3.5.7, 3.4.12 and 3.3.15 are security releases in order to
address CVE-2011-0719.


o  CVE-2011-0719:
   All current released versions of Samba are vulnerable to
   a denial of service caused by memory corruption. Range
   checks on file descriptors being used in the FD_SET macro
   were not present allowing stack corruption. This can cause
   the Samba code to crash or to loop attempting to select
   on a bad file descriptor set.

   A connection to a file share, or a local account is needed
   to exploit this problem, either authenticated or unauthenticated
   (guest connection).

   Currently we do not believe this flaw is exploitable
   beyond a crash or causing the code to loop, but on the
   advice of our security reviewers we are releasing fixes
   in case an exploit is discovered at a later date.


Changes
-------


o   Jeremy Allison <jra at samba.org>
    * BUG 7949: Fix DoS in Winbind and smbd with many file descriptors open.
2011-02-28 14:34:09 +00:00
jmcneill
ec32e41f13 add ads, ldap, pam, and winbind to default pkg options
bump pkg revision
2010-12-03 23:43:14 +00:00
taca
f60effea71 Update samba33 package to 3.3.14.
==============================
                   Release Notes for Samba 3.3.14
		         September 14, 2010
                   ==============================


This is a security release in order to address CVE-2010-3069.


o  CVE-2010-3069:
   All current released versions of Samba are vulnerable to
   a buffer overrun vulnerability. The sid_parse() function
   (and related dom_sid_parse() function in the source4 code)
   do not correctly check their input lengths when reading a
   binary representation of a Windows SID (Security ID). This
   allows a malicious client to send a sid that can overflow
   the stack variable that is being used to store the SID in the
   Samba smbd server.
2010-09-14 13:08:23 +00:00
taca
0fb4600529 Update samba33 package to 3.3.13.
Changes since 3.3.12
--------------------

o   Jeremy Allison <jra@samba.org>
    * BUG 7494: Fix for CVE-2010-2063.
2010-06-16 14:34:35 +00:00
sborrill
53e5383f77 Bump PKGREVISION due to removing -B flag from winbindd rc.d script 2010-04-15 09:38:09 +00:00
sborrill
95e985ba90 Add openssl bl3.mk file so that we play nicely with PREFER_PKGSRC+=openssl 2010-04-14 14:51:00 +00:00
taca
e7c402dc9f Reset PKGREVISION while updating to 3.3.12. 2010-03-09 01:33:26 +00:00
taca
799599a661 Update samba33 package to 3.3.12.
o  CVE-2010-0728:
   In Samba releases 3.5.0, 3.4.6 and 3.3.11, new code
   was added to fix a problem with Linux asynchronous IO handling.
   This code introduced a bad security flaw on Linux platforms if the
   binaries were built on Linux platforms with libcap support.
   The flaw caused all smbd processes to inherit CAP_DAC_OVERRIDE
   capabilities, allowing all file system access to be allowed
   even when permissions should have denied access.
2010-03-09 01:31:34 +00:00
jmmv
929a8fdf0b Disable PIE on NetBSD/macppc to fix use of unsupported relocation type in.
Samba 3.0 and 3.3.  They were completely broken before this.

Bump PKGREVISION for both samba and samba33.

Fix from PR pkg/38961 by Makoto Fujiwara <makoto at ki dot nu>.
2010-03-08 22:19:07 +00:00
taca
c7f8a4ecf0 Update samba33 pacakge to 3.3.11.
Changes since 3.3.10
--------------------


o   Jeremy Allison <jra@samba.org>
    * BUG 6557: Fix vfs_full_audit.
    * BUG 7036: Fix 'net rpc getsid' in hardened Windows environments.
    * BUG 7045: Fix bad (non memory copying) interfaces in smbc_setXXXX calls.
    * BUG 7067: Fix failing of smbd to respond to a read or a write caused by
      Linux asynchronous IO (aio).
    * BUG 7072: Fix unlocking of accounts from ldap.
    * BUG 7104: "wide links" and "unix extensions" are incompatible.
    * BUG 7122: Fix reading of large browselist.
    * BUG 7154: "mangling method = hash" can crash storing a name containing
      a '.'.
    * BUG 7155: Valgrind Conditional jump or move depends on uninitialised
      value(s) error when "mangling method = hash".


o   Gunther Deschner <gd@samba.org>
    * BUG 7043: Fix crash bug in "SMBC_parse_path".


o   Volker Lendecke <vl@samba.org>
    * BUG 5626: Fix build on AIX.
    * BUG 5885: Fix bogus ip address in SWAT.
    * BUG 7046: Fix a crash in libsmbclient used against the OpenSolaris CIFS
      server.


o   Stefan Metzmacher <metze@samba.org>
    * BUG 7098: Fix results of 'smbclient -L' with a large browse list.
    * BUG 7170: Fix handling of external domains in setups with one way trusts.


o   William Jojo <w.jojo@hvcc.edu>
    * BUG 7052: Fix DFS on AIX (maybe others).


o   Bo Yang <boyang@samba.org>
    * BUG 7106: Fix malformed require_membership_of_sid.
2010-03-02 14:56:22 +00:00
taca
5db5efc76d Really bump PKGREVISION. Noted by dieter roelants via private mail. 2010-02-18 01:09:01 +00:00
taca
988d63dc84 Fix a PLIST problem noted by wiz@.
This time, I won't bump PKGREVISION, hoping no binary pacakge
would be created in this small time span.
2010-02-17 16:02:17 +00:00
taca
66ffac297f Fix PLIST problem when winbind PKG_OPTION isn't enabled.
Bump PKGREVISION to prevent broken binary package.
2010-02-17 15:11:10 +00:00
taca
0a54216b4e Importing Samba 3.3.10 as net/samba33.
This isn't latest release, but diffrence from current package is minimal
supported release.

Since changes are too huge to write here, please refer each release notes:

	http://www.samba.org/samba/history/

And this pacakge already contain fix for CVE-2009-3297.
2010-02-16 16:24:15 +00:00