Commit graph

21 commits

Author SHA1 Message Date
wiz
5a1e8b0499 Revbump for
a) tiff update to 4.0 (shlib major change)
b) glib2 update 2.30.2 (adds libffi dependency to buildlink3.mk)

Enjoy.
2012-02-06 12:40:37 +00:00
sbd
54342d6140 Move the options.mk file for net/samba30 and net/samba33 from net/samba to
net/samba33 because of up coming changes to net/samba/options.mk that are
in-compatible with 30 and 33.
2012-02-01 08:14:47 +00:00
sbd
8f05b7bfe0 Add PLIST.Linux
Bump PKGREVISION
2012-01-31 07:14:58 +00:00
sbd
0fea84f4dc Convert packages with add --libdir=* to CONFIGURE_ARGS to use
GNU_CONFIGURE_LIBDIR or GNU_CONFIGURE_LIBSUBDIR.
2012-01-17 21:43:18 +00:00
taca
b479b8f76c Add workaround for NetBSD 5.99.54 as samba35. 2011-08-02 14:05:27 +00:00
taca
5525ba13ce Update samba33 package to 3.3.16; security fix for swat.
==============================
                   Release Notes for Samba 3.3.16
		           July 26, 2011
                   ==============================


This is a security release in order to address
CVE-2011-2522 (Cross-Site Request Forgery in SWAT) and
CVE-2011-2694 (Cross-Site Scripting vulnerability in SWAT).


o  CVE-2011-2522:
   The Samba Web Administration Tool (SWAT) in Samba versions
   3.0.x to 3.5.9 are affected by a cross-site request forgery.


o  CVE-2011-2694:
   The Samba Web Administration Tool (SWAT) in Samba versions
   3.0.x to 3.5.9 are affected by a cross-site scripting
   vulnerability.

Please note that SWAT must be enabled in order for these
vulnerabilities to be exploitable. By default, SWAT
is *not* enabled on a Samba install.


Changes since 3.3.15
--------------------


o   Kai Blin <kai@samba.org>
    * BUG 8289: SWAT contains a cross-site scripting vulnerability.
    * BUG 8290: CSRF vulnerability in SWAT.
2011-07-27 00:53:37 +00:00
obache
1d9df3258a recursive bump from gettext-lib shlib bump. 2011-04-22 13:41:54 +00:00
taca
8fb6550893 Update samba33 pacakge to 3.3.15.
Release Announcements
=====================

Samba 3.5.7, 3.4.12 and 3.3.15 are security releases in order to
address CVE-2011-0719.


o  CVE-2011-0719:
   All current released versions of Samba are vulnerable to
   a denial of service caused by memory corruption. Range
   checks on file descriptors being used in the FD_SET macro
   were not present allowing stack corruption. This can cause
   the Samba code to crash or to loop attempting to select
   on a bad file descriptor set.

   A connection to a file share, or a local account is needed
   to exploit this problem, either authenticated or unauthenticated
   (guest connection).

   Currently we do not believe this flaw is exploitable
   beyond a crash or causing the code to loop, but on the
   advice of our security reviewers we are releasing fixes
   in case an exploit is discovered at a later date.


Changes
-------


o   Jeremy Allison <jra at samba.org>
    * BUG 7949: Fix DoS in Winbind and smbd with many file descriptors open.
2011-02-28 14:34:09 +00:00
jmcneill
ec32e41f13 add ads, ldap, pam, and winbind to default pkg options
bump pkg revision
2010-12-03 23:43:14 +00:00
taca
f60effea71 Update samba33 package to 3.3.14.
==============================
                   Release Notes for Samba 3.3.14
		         September 14, 2010
                   ==============================


This is a security release in order to address CVE-2010-3069.


o  CVE-2010-3069:
   All current released versions of Samba are vulnerable to
   a buffer overrun vulnerability. The sid_parse() function
   (and related dom_sid_parse() function in the source4 code)
   do not correctly check their input lengths when reading a
   binary representation of a Windows SID (Security ID). This
   allows a malicious client to send a sid that can overflow
   the stack variable that is being used to store the SID in the
   Samba smbd server.
2010-09-14 13:08:23 +00:00
taca
0fb4600529 Update samba33 package to 3.3.13.
Changes since 3.3.12
--------------------

o   Jeremy Allison <jra@samba.org>
    * BUG 7494: Fix for CVE-2010-2063.
2010-06-16 14:34:35 +00:00
sborrill
53e5383f77 Bump PKGREVISION due to removing -B flag from winbindd rc.d script 2010-04-15 09:38:09 +00:00
sborrill
95e985ba90 Add openssl bl3.mk file so that we play nicely with PREFER_PKGSRC+=openssl 2010-04-14 14:51:00 +00:00
taca
e7c402dc9f Reset PKGREVISION while updating to 3.3.12. 2010-03-09 01:33:26 +00:00
taca
799599a661 Update samba33 package to 3.3.12.
o  CVE-2010-0728:
   In Samba releases 3.5.0, 3.4.6 and 3.3.11, new code
   was added to fix a problem with Linux asynchronous IO handling.
   This code introduced a bad security flaw on Linux platforms if the
   binaries were built on Linux platforms with libcap support.
   The flaw caused all smbd processes to inherit CAP_DAC_OVERRIDE
   capabilities, allowing all file system access to be allowed
   even when permissions should have denied access.
2010-03-09 01:31:34 +00:00
jmmv
929a8fdf0b Disable PIE on NetBSD/macppc to fix use of unsupported relocation type in.
Samba 3.0 and 3.3.  They were completely broken before this.

Bump PKGREVISION for both samba and samba33.

Fix from PR pkg/38961 by Makoto Fujiwara <makoto at ki dot nu>.
2010-03-08 22:19:07 +00:00
taca
c7f8a4ecf0 Update samba33 pacakge to 3.3.11.
Changes since 3.3.10
--------------------


o   Jeremy Allison <jra@samba.org>
    * BUG 6557: Fix vfs_full_audit.
    * BUG 7036: Fix 'net rpc getsid' in hardened Windows environments.
    * BUG 7045: Fix bad (non memory copying) interfaces in smbc_setXXXX calls.
    * BUG 7067: Fix failing of smbd to respond to a read or a write caused by
      Linux asynchronous IO (aio).
    * BUG 7072: Fix unlocking of accounts from ldap.
    * BUG 7104: "wide links" and "unix extensions" are incompatible.
    * BUG 7122: Fix reading of large browselist.
    * BUG 7154: "mangling method = hash" can crash storing a name containing
      a '.'.
    * BUG 7155: Valgrind Conditional jump or move depends on uninitialised
      value(s) error when "mangling method = hash".


o   Gunther Deschner <gd@samba.org>
    * BUG 7043: Fix crash bug in "SMBC_parse_path".


o   Volker Lendecke <vl@samba.org>
    * BUG 5626: Fix build on AIX.
    * BUG 5885: Fix bogus ip address in SWAT.
    * BUG 7046: Fix a crash in libsmbclient used against the OpenSolaris CIFS
      server.


o   Stefan Metzmacher <metze@samba.org>
    * BUG 7098: Fix results of 'smbclient -L' with a large browse list.
    * BUG 7170: Fix handling of external domains in setups with one way trusts.


o   William Jojo <w.jojo@hvcc.edu>
    * BUG 7052: Fix DFS on AIX (maybe others).


o   Bo Yang <boyang@samba.org>
    * BUG 7106: Fix malformed require_membership_of_sid.
2010-03-02 14:56:22 +00:00
taca
5db5efc76d Really bump PKGREVISION. Noted by dieter roelants via private mail. 2010-02-18 01:09:01 +00:00
taca
988d63dc84 Fix a PLIST problem noted by wiz@.
This time, I won't bump PKGREVISION, hoping no binary pacakge
would be created in this small time span.
2010-02-17 16:02:17 +00:00
taca
66ffac297f Fix PLIST problem when winbind PKG_OPTION isn't enabled.
Bump PKGREVISION to prevent broken binary package.
2010-02-17 15:11:10 +00:00
taca
0a54216b4e Importing Samba 3.3.10 as net/samba33.
This isn't latest release, but diffrence from current package is minimal
supported release.

Since changes are too huge to write here, please refer each release notes:

	http://www.samba.org/samba/history/

And this pacakge already contain fix for CVE-2009-3297.
2010-02-16 16:24:15 +00:00