head 1.4; access; symbols pkgsrc-2026Q1:1.4.0.116 pkgsrc-2026Q1-base:1.4 pkgsrc-2025Q4:1.4.0.114 pkgsrc-2025Q4-base:1.4 pkgsrc-2025Q3:1.4.0.112 pkgsrc-2025Q3-base:1.4 pkgsrc-2025Q2:1.4.0.110 pkgsrc-2025Q2-base:1.4 pkgsrc-2025Q1:1.4.0.108 pkgsrc-2025Q1-base:1.4 pkgsrc-2024Q4:1.4.0.106 pkgsrc-2024Q4-base:1.4 pkgsrc-2024Q3:1.4.0.104 pkgsrc-2024Q3-base:1.4 pkgsrc-2024Q2:1.4.0.102 pkgsrc-2024Q2-base:1.4 pkgsrc-2024Q1:1.4.0.100 pkgsrc-2024Q1-base:1.4 pkgsrc-2023Q4:1.4.0.98 pkgsrc-2023Q4-base:1.4 pkgsrc-2023Q3:1.4.0.96 pkgsrc-2023Q3-base:1.4 pkgsrc-2023Q2:1.4.0.94 pkgsrc-2023Q2-base:1.4 pkgsrc-2023Q1:1.4.0.92 pkgsrc-2023Q1-base:1.4 pkgsrc-2022Q4:1.4.0.90 pkgsrc-2022Q4-base:1.4 pkgsrc-2022Q3:1.4.0.88 pkgsrc-2022Q3-base:1.4 pkgsrc-2022Q2:1.4.0.86 pkgsrc-2022Q2-base:1.4 pkgsrc-2022Q1:1.4.0.84 pkgsrc-2022Q1-base:1.4 pkgsrc-2021Q4:1.4.0.82 pkgsrc-2021Q4-base:1.4 pkgsrc-2021Q3:1.4.0.80 pkgsrc-2021Q3-base:1.4 pkgsrc-2021Q2:1.4.0.78 pkgsrc-2021Q2-base:1.4 pkgsrc-2021Q1:1.4.0.76 pkgsrc-2021Q1-base:1.4 pkgsrc-2020Q4:1.4.0.74 pkgsrc-2020Q4-base:1.4 pkgsrc-2020Q3:1.4.0.72 pkgsrc-2020Q3-base:1.4 pkgsrc-2020Q2:1.4.0.68 pkgsrc-2020Q2-base:1.4 pkgsrc-2020Q1:1.4.0.48 pkgsrc-2020Q1-base:1.4 pkgsrc-2019Q4:1.4.0.70 pkgsrc-2019Q4-base:1.4 pkgsrc-2019Q3:1.4.0.66 pkgsrc-2019Q3-base:1.4 pkgsrc-2019Q2:1.4.0.64 pkgsrc-2019Q2-base:1.4 pkgsrc-2019Q1:1.4.0.62 pkgsrc-2019Q1-base:1.4 pkgsrc-2018Q4:1.4.0.60 pkgsrc-2018Q4-base:1.4 pkgsrc-2018Q3:1.4.0.58 pkgsrc-2018Q3-base:1.4 pkgsrc-2018Q2:1.4.0.56 pkgsrc-2018Q2-base:1.4 pkgsrc-2018Q1:1.4.0.54 pkgsrc-2018Q1-base:1.4 pkgsrc-2017Q4:1.4.0.52 pkgsrc-2017Q4-base:1.4 pkgsrc-2017Q3:1.4.0.50 pkgsrc-2017Q3-base:1.4 pkgsrc-2017Q2:1.4.0.46 pkgsrc-2017Q2-base:1.4 pkgsrc-2017Q1:1.4.0.44 pkgsrc-2017Q1-base:1.4 pkgsrc-2016Q4:1.4.0.42 pkgsrc-2016Q4-base:1.4 pkgsrc-2016Q3:1.4.0.40 pkgsrc-2016Q3-base:1.4 pkgsrc-2016Q2:1.4.0.38 pkgsrc-2016Q2-base:1.4 pkgsrc-2016Q1:1.4.0.36 pkgsrc-2016Q1-base:1.4 pkgsrc-2015Q4:1.4.0.34 pkgsrc-2015Q4-base:1.4 pkgsrc-2015Q3:1.4.0.32 pkgsrc-2015Q3-base:1.4 pkgsrc-2015Q2:1.4.0.30 pkgsrc-2015Q2-base:1.4 pkgsrc-2015Q1:1.4.0.28 pkgsrc-2015Q1-base:1.4 pkgsrc-2014Q4:1.4.0.26 pkgsrc-2014Q4-base:1.4 pkgsrc-2014Q3:1.4.0.24 pkgsrc-2014Q3-base:1.4 pkgsrc-2014Q2:1.4.0.22 pkgsrc-2014Q2-base:1.4 pkgsrc-2014Q1:1.4.0.20 pkgsrc-2014Q1-base:1.4 pkgsrc-2013Q4:1.4.0.18 pkgsrc-2013Q4-base:1.4 pkgsrc-2013Q3:1.4.0.16 pkgsrc-2013Q3-base:1.4 pkgsrc-2013Q2:1.4.0.14 pkgsrc-2013Q2-base:1.4 pkgsrc-2013Q1:1.4.0.12 pkgsrc-2013Q1-base:1.4 pkgsrc-2012Q4:1.4.0.10 pkgsrc-2012Q4-base:1.4 pkgsrc-2012Q3:1.4.0.8 pkgsrc-2012Q3-base:1.4 pkgsrc-2012Q2:1.4.0.6 pkgsrc-2012Q2-base:1.4 pkgsrc-2012Q1:1.4.0.4 pkgsrc-2012Q1-base:1.4 pkgsrc-2011Q4:1.4.0.2 pkgsrc-2011Q4-base:1.4 pkgsrc-2011Q2:1.3.0.46 pkgsrc-2011Q2-base:1.3 pkgsrc-2009Q4:1.3.0.44 pkgsrc-2009Q4-base:1.3 pkgsrc-2008Q4:1.3.0.42 pkgsrc-2008Q4-base:1.3 pkgsrc-2008Q3:1.3.0.40 pkgsrc-2008Q3-base:1.3 cube-native-xorg:1.3.0.38 cube-native-xorg-base:1.3 pkgsrc-2008Q2:1.3.0.36 pkgsrc-2008Q2-base:1.3 pkgsrc-2008Q1:1.3.0.34 pkgsrc-2008Q1-base:1.3 pkgsrc-2007Q4:1.3.0.32 pkgsrc-2007Q4-base:1.3 pkgsrc-2007Q3:1.3.0.30 pkgsrc-2007Q3-base:1.3 pkgsrc-2007Q2:1.3.0.28 pkgsrc-2007Q2-base:1.3 pkgsrc-2007Q1:1.3.0.26 pkgsrc-2007Q1-base:1.3 pkgsrc-2006Q4:1.3.0.24 pkgsrc-2006Q4-base:1.3 pkgsrc-2006Q3:1.3.0.22 pkgsrc-2006Q3-base:1.3 pkgsrc-2006Q2:1.3.0.20 pkgsrc-2006Q2-base:1.3 pkgsrc-2006Q1:1.3.0.18 pkgsrc-2006Q1-base:1.3 pkgsrc-2005Q4:1.3.0.16 pkgsrc-2005Q4-base:1.3 pkgsrc-2005Q3:1.3.0.14 pkgsrc-2005Q3-base:1.3 pkgsrc-2005Q2:1.3.0.12 pkgsrc-2005Q2-base:1.3 pkgsrc-2005Q1:1.3.0.10 pkgsrc-2005Q1-base:1.3 pkgsrc-2004Q4:1.3.0.8 pkgsrc-2004Q4-base:1.3 pkgsrc-2004Q3:1.3.0.6 pkgsrc-2004Q3-base:1.3 pkgsrc-2004Q2:1.3.0.4 pkgsrc-2004Q2-base:1.3 pkgsrc-2004Q1:1.3.0.2 pkgsrc-2004Q1-base:1.3 pkgsrc-2003Q4:1.2.0.2 pkgsrc-2003Q4-base:1.2 netbsd-1-6-1-base:1.1 netbsd-1-6-1:1.1.0.2; locks; strict; comment @# @; 1.4 date 2011.12.16.11.05.24; author asau; state Exp; branches; next 1.3; 1.3 date 2004.01.11.02.26.31; author jlam; state dead; branches; next 1.2; 1.2 date 2003.03.16.07.57.47; author martti; state Exp; branches; next 1.1; 1.1 date 2003.02.18.11.25.58; author jdolecek; state Exp; branches 1.1.2.1; next ; 1.1.2.1 date 2003.02.18.11.25.58; author jmc; state dead; branches; next 1.1.2.2; 1.1.2.2 date 2003.03.23.01.24.28; author jmc; state Exp; branches; next ; desc @@ 1.4 log @Update to Samba 3.5.11 from net/samba35, part of Samba packages rearrangement. @ text @$NetBSD: patch-ar,v 1.1.1.1 2010/12/06 17:01:23 adam Exp $ --- script/installman.sh.orig 2010-01-14 10:12:10.000000000 +0000 +++ script/installman.sh @@@@ -33,7 +33,7 @@@@ for lang in $langs; do langdir=$MANDIR/$lang for d in $MANDIR $langdir $langdir/man1 $langdir/man5 $langdir/man7 $langdir/man8; do if [ ! -d $d ]; then - mkdir $d + mkdir -p $d if [ ! -d $d ]; then echo Failed to make directory $d, does $USER have privileges? exit 1 @ 1.3 log @Update net/samba to 3.0.1. Major changes from version 2.2.8anb6 include: * Active Directory support. Samba is able to join a ADS realm as a member server and authenticate using LDAP/Kerberos. * Unicode support. * New, more flexible authentication (passdb) system. * A new "net" command that is similar to the "net" command in Windows. * Samba now negotiates NT-style status32 codes on the wire, which greatly improves error handling. * Better Windows 2K/2K3/XP printing support. * Loadable module support for passdb backends and character sets. * More performant winbindd. * Support for migrating from a Windows NT4 domain to a Samba domain and maintaining user, group, and domain SIDs. * Support for establishing trust relationships with Windows NT4 DCs. * Initial support for a distributed Winbind architecture using an LDAP directory for storing SID-to-uid/gid mappings. * Major updates to the Samba documentation tree. * Full support for client and server SMB signing to ensure compatibility with default Windows 2K3 security settings. * Improvement of ACL mapping features. @ text @d1 1 a1 1 $NetBSD: patch-ar,v 1.2 2003/03/16 07:57:47 martti Exp $ d3 11 a13 14 --- smbd/open.c.orig Fri Feb 28 15:56:20 2003 +++ smbd/open.c Sun Mar 16 09:03:17 2003 @@@@ -979,8 +979,11 @@@@ fsp_open = open_file(fsp,conn,fname,psbuf,flags|flags2,mode,desired_access); if (!fsp_open && (flags == O_RDWR) && (errno != ENOENT) && fcbopen) { + int saved_errno = errno; if((fsp_open = open_file(fsp,conn,fname,psbuf,O_RDONLY,mode,desired_access)) == True) flags = O_RDONLY; + else + errno = saved_errno; } if (!fsp_open) { @ 1.2 log @Updated samba to 2.2.8 **************************************** * IMPORTANT: Security bugfix for Samba * **************************************** The SuSE security audit team, in particular Sebastian Krahmer , has found a flaw in the Samba main smbd code which could allow an external attacker to remotely and anonymously gain Super User (root) privileges on a server running a Samba server. This flaw exists in previous versions of Samba from 2.0.x to 2.2.7a inclusive. This is a serious problem and all sites should either upgrade to Samba 2.2.8 immediately or prohibit access to TCP ports 139 and 445. Advice created by Andrew Tridgell, the leader of the Samba Team, on how to protect an unpatched Samba server is given at the end of this section. The SMB/CIFS protocol implemented by Samba is vulnerable to many attacks, even without specific security holes. The TCP ports 139 and the new port 445 (used by Win2k and the Samba 3.0 alpha code in particular) should never be exposed to untrusted networks. @ text @d1 1 a1 1 $NetBSD: patch-ar,v 1.1 2003/02/18 11:25:58 jdolecek Exp $ @ 1.1 log @open_file_shared(): when falling back to O_RDONLY open_file() call after O_RDWR fails in fcbopen case, remember the errno from previous open_file() call and set errno back to this value if the second open_file() call fails too this makes samba report EACCESS instead of confusing ENOENT if creation of file fails due to insufficient permissions for SMBcreate/SMBmknew call bump package revision @ text @d1 1 a1 1 $NetBSD$ d3 3 a5 3 --- smbd/open.c.orig Tue Feb 18 11:59:26 2003 +++ smbd/open.c Tue Feb 18 11:59:39 2003 @@@@ -947,8 +947,11 @@@@ @ 1.1.2.1 log @file patch-ar was added on branch netbsd-1-6-1 on 2003-03-23 01:24:28 +0000 @ text @d1 16 @ 1.1.2.2 log @Pullup rev 1.2 (requested by bouyer in ticket #1220) Updated samba to 2.2.8 **************************************** * IMPORTANT: Security bugfix for Samba * **************************************** The SuSE security audit team, in particular Sebastian Krahmer , has found a flaw in the Samba main smbd code which could allow an external attacker to remotely and anonymously gain Super User (root) privileges on a server running a Samba server. This flaw exists in previous versions of Samba from 2.0.x to 2.2.7a inclusive. This is a serious problem and all sites should either upgrade to Samba 2.2.8 immediately or prohibit access to TCP ports 139 and 445. Advice created by Andrew Tridgell, the leader of the Samba Team, on how to protect an unpatched Samba server is given at the end of this section. The SMB/CIFS protocol implemented by Samba is vulnerable to many attacks, even without specific security holes. The TCP ports 139 and the new port 445 (used by Win2k and the Samba 3.0 alpha code in particular) should never be exposed to untrusted networks. @ text @a0 16 $NetBSD: patch-ar,v 1.1.2.1 2003/03/23 01:24:28 jmc Exp $ --- smbd/open.c.orig Fri Feb 28 15:56:20 2003 +++ smbd/open.c Sun Mar 16 09:03:17 2003 @@@@ -979,8 +979,11 @@@@ fsp_open = open_file(fsp,conn,fname,psbuf,flags|flags2,mode,desired_access); if (!fsp_open && (flags == O_RDWR) && (errno != ENOENT) && fcbopen) { + int saved_errno = errno; if((fsp_open = open_file(fsp,conn,fname,psbuf,O_RDONLY,mode,desired_access)) == True) flags = O_RDONLY; + else + errno = saved_errno; } if (!fsp_open) { @