head 1.4; access; symbols pkgsrc-2026Q1:1.4.0.102 pkgsrc-2026Q1-base:1.4 pkgsrc-2025Q4:1.4.0.100 pkgsrc-2025Q4-base:1.4 pkgsrc-2025Q3:1.4.0.98 pkgsrc-2025Q3-base:1.4 pkgsrc-2025Q2:1.4.0.96 pkgsrc-2025Q2-base:1.4 pkgsrc-2025Q1:1.4.0.94 pkgsrc-2025Q1-base:1.4 pkgsrc-2024Q4:1.4.0.92 pkgsrc-2024Q4-base:1.4 pkgsrc-2024Q3:1.4.0.90 pkgsrc-2024Q3-base:1.4 pkgsrc-2024Q2:1.4.0.88 pkgsrc-2024Q2-base:1.4 pkgsrc-2024Q1:1.4.0.86 pkgsrc-2024Q1-base:1.4 pkgsrc-2023Q4:1.4.0.84 pkgsrc-2023Q4-base:1.4 pkgsrc-2023Q3:1.4.0.82 pkgsrc-2023Q3-base:1.4 pkgsrc-2023Q2:1.4.0.80 pkgsrc-2023Q2-base:1.4 pkgsrc-2023Q1:1.4.0.78 pkgsrc-2023Q1-base:1.4 pkgsrc-2022Q4:1.4.0.76 pkgsrc-2022Q4-base:1.4 pkgsrc-2022Q3:1.4.0.74 pkgsrc-2022Q3-base:1.4 pkgsrc-2022Q2:1.4.0.72 pkgsrc-2022Q2-base:1.4 pkgsrc-2022Q1:1.4.0.70 pkgsrc-2022Q1-base:1.4 pkgsrc-2021Q4:1.4.0.68 pkgsrc-2021Q4-base:1.4 pkgsrc-2021Q3:1.4.0.66 pkgsrc-2021Q3-base:1.4 pkgsrc-2021Q2:1.4.0.64 pkgsrc-2021Q2-base:1.4 pkgsrc-2021Q1:1.4.0.62 pkgsrc-2021Q1-base:1.4 pkgsrc-2020Q4:1.4.0.60 pkgsrc-2020Q4-base:1.4 pkgsrc-2020Q3:1.4.0.58 pkgsrc-2020Q3-base:1.4 pkgsrc-2020Q2:1.4.0.54 pkgsrc-2020Q2-base:1.4 pkgsrc-2020Q1:1.4.0.34 pkgsrc-2020Q1-base:1.4 pkgsrc-2019Q4:1.4.0.56 pkgsrc-2019Q4-base:1.4 pkgsrc-2019Q3:1.4.0.52 pkgsrc-2019Q3-base:1.4 pkgsrc-2019Q2:1.4.0.50 pkgsrc-2019Q2-base:1.4 pkgsrc-2019Q1:1.4.0.48 pkgsrc-2019Q1-base:1.4 pkgsrc-2018Q4:1.4.0.46 pkgsrc-2018Q4-base:1.4 pkgsrc-2018Q3:1.4.0.44 pkgsrc-2018Q3-base:1.4 pkgsrc-2018Q2:1.4.0.42 pkgsrc-2018Q2-base:1.4 pkgsrc-2018Q1:1.4.0.40 pkgsrc-2018Q1-base:1.4 pkgsrc-2017Q4:1.4.0.38 pkgsrc-2017Q4-base:1.4 pkgsrc-2017Q3:1.4.0.36 pkgsrc-2017Q3-base:1.4 pkgsrc-2017Q2:1.4.0.32 pkgsrc-2017Q2-base:1.4 pkgsrc-2017Q1:1.4.0.30 pkgsrc-2017Q1-base:1.4 pkgsrc-2016Q4:1.4.0.28 pkgsrc-2016Q4-base:1.4 pkgsrc-2016Q3:1.4.0.26 pkgsrc-2016Q3-base:1.4 pkgsrc-2016Q2:1.4.0.24 pkgsrc-2016Q2-base:1.4 pkgsrc-2016Q1:1.4.0.22 pkgsrc-2016Q1-base:1.4 pkgsrc-2015Q4:1.4.0.20 pkgsrc-2015Q4-base:1.4 pkgsrc-2015Q3:1.4.0.18 pkgsrc-2015Q3-base:1.4 pkgsrc-2015Q2:1.4.0.16 pkgsrc-2015Q2-base:1.4 pkgsrc-2015Q1:1.4.0.14 pkgsrc-2015Q1-base:1.4 pkgsrc-2014Q4:1.4.0.12 pkgsrc-2014Q4-base:1.4 pkgsrc-2014Q3:1.4.0.10 pkgsrc-2014Q3-base:1.4 pkgsrc-2014Q2:1.4.0.8 pkgsrc-2014Q2-base:1.4 pkgsrc-2014Q1:1.4.0.6 pkgsrc-2014Q1-base:1.4 pkgsrc-2013Q4:1.4.0.4 pkgsrc-2013Q4-base:1.4 pkgsrc-2013Q3:1.4.0.2 pkgsrc-2013Q3-base:1.4 pkgsrc-2013Q2:1.3.0.14 pkgsrc-2013Q2-base:1.3 pkgsrc-2013Q1:1.3.0.12 pkgsrc-2013Q1-base:1.3 pkgsrc-2012Q4:1.3.0.10 pkgsrc-2012Q4-base:1.3 pkgsrc-2012Q3:1.3.0.8 pkgsrc-2012Q3-base:1.3 pkgsrc-2012Q2:1.3.0.6 pkgsrc-2012Q2-base:1.3 pkgsrc-2012Q1:1.3.0.4 pkgsrc-2012Q1-base:1.3 pkgsrc-2011Q4:1.3.0.2 pkgsrc-2011Q4-base:1.3 pkgsrc-2011Q2:1.2.0.46 pkgsrc-2011Q2-base:1.2 pkgsrc-2009Q4:1.2.0.44 pkgsrc-2009Q4-base:1.2 pkgsrc-2008Q4:1.2.0.42 pkgsrc-2008Q4-base:1.2 pkgsrc-2008Q3:1.2.0.40 pkgsrc-2008Q3-base:1.2 cube-native-xorg:1.2.0.38 cube-native-xorg-base:1.2 pkgsrc-2008Q2:1.2.0.36 pkgsrc-2008Q2-base:1.2 pkgsrc-2008Q1:1.2.0.34 pkgsrc-2008Q1-base:1.2 pkgsrc-2007Q4:1.2.0.32 pkgsrc-2007Q4-base:1.2 pkgsrc-2007Q3:1.2.0.30 pkgsrc-2007Q3-base:1.2 pkgsrc-2007Q2:1.2.0.28 pkgsrc-2007Q2-base:1.2 pkgsrc-2007Q1:1.2.0.26 pkgsrc-2007Q1-base:1.2 pkgsrc-2006Q4:1.2.0.24 pkgsrc-2006Q4-base:1.2 pkgsrc-2006Q3:1.2.0.22 pkgsrc-2006Q3-base:1.2 pkgsrc-2006Q2:1.2.0.20 pkgsrc-2006Q2-base:1.2 pkgsrc-2006Q1:1.2.0.18 pkgsrc-2006Q1-base:1.2 pkgsrc-2005Q4:1.2.0.16 pkgsrc-2005Q4-base:1.2 pkgsrc-2005Q3:1.2.0.14 pkgsrc-2005Q3-base:1.2 pkgsrc-2005Q2:1.2.0.12 pkgsrc-2005Q2-base:1.2 pkgsrc-2005Q1:1.2.0.10 pkgsrc-2005Q1-base:1.2 pkgsrc-2004Q4:1.2.0.8 pkgsrc-2004Q4-base:1.2 pkgsrc-2004Q3:1.2.0.6 pkgsrc-2004Q3-base:1.2 pkgsrc-2004Q2:1.2.0.4 pkgsrc-2004Q2-base:1.2 pkgsrc-2004Q1:1.2.0.2 pkgsrc-2004Q1-base:1.2 pkgsrc-2003Q4:1.1.0.2 pkgsrc-2003Q4-base:1.1; locks; strict; comment @# @; 1.4 date 2013.08.12.02.45.55; author taca; state Exp; branches; next 1.3; commitid EB23ZUIBzNlQT61x; 1.3 date 2011.12.16.11.05.24; author asau; state Exp; branches 1.3.14.1; next 1.2; 1.2 date 2004.01.11.02.26.31; author jlam; state dead; branches; next 1.1; 1.1 date 2003.09.05.19.13.42; author kim; state Exp; branches; next ; 1.3.14.1 date 2013.08.12.12.20.19; author tron; state Exp; branches; next ; commitid DRsIlszbKSa45a1x; desc @@ 1.4 log @Update samba to 3.6.17, security release. ============================== Release Notes for Samba 3.6.17 August 05, 2013 ============================== This is a security release in order to address CVE-2013-4124 (Missing integer wrap protection in EA list reading can cause server to loop with DOS). o CVE-2013-4124: All current released versions of Samba are vulnerable to a denial of service on an authenticated or guest connection. A malformed packet can cause the smbd server to loop the CPU performing memory allocations and preventing any further service. A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated if guest connections are allowed. This flaw is not exploitable beyond causing the code to loop allocating memory, which may cause the machine to exceed memory limits. Changes since 3.6.16: --------------------- o Jeremy Allison * BUG 10010: CVE-2013-4124: Missing integer wrap protection in EA list reading can cause server to loop with DOS. @ text @$NetBSD: patch-as,v 1.3 2011/12/16 11:05:24 asau Exp $ --- script/installmodules.sh.orig 2013-07-29 18:55:18.000000000 +0000 +++ script/installmodules.sh @@@@ -11,7 +11,7 @@@@ shift for d in $prefix $LIBDIR; do if [ ! -d $DESTDIR/$d ]; then -mkdir $DESTDIR/$d +mkdir -p $DESTDIR/$d if [ ! -d $DESTDIR/$d ]; then echo Failed to make directory $DESTDIR/$d exit 1 @ 1.3 log @Update to Samba 3.5.11 from net/samba35, part of Samba packages rearrangement. @ text @d1 1 a1 1 $NetBSD: patch-as,v 1.1.1.1 2010/12/06 17:01:23 adam Exp $ d3 1 a3 1 --- script/installmodules.sh.orig 2010-01-14 10:12:10.000000000 +0000 @ 1.3.14.1 log @Pullup ticket #4207 - requested by taca net/samba: security update Revisions pulled up: - net/samba/Makefile 1.235,1.237 - net/samba/Makefile.mirrors 1.10 - net/samba/PLIST 1.54 - net/samba/distinfo 1.91-1.92 - net/samba/patches/patch-ac 1.15 - net/samba/patches/patch-ad 1.19 - net/samba/patches/patch-ae 1.11 - net/samba/patches/patch-af 1.12 - net/samba/patches/patch-ah 1.7 - net/samba/patches/patch-ai 1.7 - net/samba/patches/patch-aj 1.7 - net/samba/patches/patch-ak 1.6 - net/samba/patches/patch-an 1.4 - net/samba/patches/patch-ao 1.4 - net/samba/patches/patch-aq 1.4 - net/samba/patches/patch-as 1.4 - net/samba/patches/patch-av 1.5 - net/samba/patches/patch-aw 1.4 - net/samba/patches/patch-ba 1.11 - net/samba/patches/patch-bb 1.5 - net/samba/patches/patch-bf 1.6 --- Module Name: pkgsrc Committed By: adam Date: Wed Jul 3 20:00:48 UTC 2013 Modified Files: pkgsrc/net/samba: Makefile PLIST distinfo pkgsrc/net/samba/patches: patch-bf Log Message: Changes 3.6.16: * BUG 9881: Link dbwrap_tool and dbwrap_torture against libtevent. * BUG 9722: Properly handle Oplock breaks in compound requests. * BUG 9822: Fix crash bug during Win8 sync. * BUG 9927: errno gets overwritten in call to check_parent_exists(). * BUG 8997: Change libreplace GPL source to LGPL. * BUG 9900: is_printer_published GUID retrieval. * BUG 9941: Fix a bug of drvupgrade of smbcontrol. * BUG 9868: Don't know how to make LIBNDR_PREG_OBJ. * BUG 9688: Remove "experimental" label on "max protocol=SMB2" parameter. * BUG 9881: Check for system libtevent. --- Module Name: pkgsrc Committed By: wiz Date: Thu Jul 4 19:31:10 UTC 2013 Modified Files: pkgsrc/net/samba: Makefile.mirrors Log Message: Fix URL. --- Module Name: pkgsrc Committed By: taca Date: Mon Aug 12 02:45:55 UTC 2013 Modified Files: pkgsrc/net/samba: Makefile distinfo pkgsrc/net/samba/patches: patch-ac patch-ad patch-ae patch-af patch-ah patch-ai patch-aj patch-ak patch-an patch-ao patch-aq patch-as patch-av patch-aw patch-ba patch-bb Log Message: Update samba to 3.6.17, security release. ============================== Release Notes for Samba 3.6.17 August 05, 2013 ============================== This is a security release in order to address CVE-2013-4124 (Missing integer wrap protection in EA list reading can cause server to loop with DOS). o CVE-2013-4124: All current released versions of Samba are vulnerable to a denial of service on an authenticated or guest connection. A malformed packet can cause the smbd server to loop the CPU performing memory allocations and preventing any further service. A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated if guest connections are allowed. This flaw is not exploitable beyond causing the code to loop allocating memory, which may cause the machine to exceed memory limits. Changes since 3.6.16: --------------------- o Jeremy Allison * BUG 10010: CVE-2013-4124: Missing integer wrap protection in EA list reading can cause server to loop with DOS. @ text @d1 1 a1 1 $NetBSD$ d3 1 a3 1 --- script/installmodules.sh.orig 2013-07-29 18:55:18.000000000 +0000 @ 1.2 log @Update net/samba to 3.0.1. Major changes from version 2.2.8anb6 include: * Active Directory support. Samba is able to join a ADS realm as a member server and authenticate using LDAP/Kerberos. * Unicode support. * New, more flexible authentication (passdb) system. * A new "net" command that is similar to the "net" command in Windows. * Samba now negotiates NT-style status32 codes on the wire, which greatly improves error handling. * Better Windows 2K/2K3/XP printing support. * Loadable module support for passdb backends and character sets. * More performant winbindd. * Support for migrating from a Windows NT4 domain to a Samba domain and maintaining user, group, and domain SIDs. * Support for establishing trust relationships with Windows NT4 DCs. * Initial support for a distributed Winbind architecture using an LDAP directory for storing SID-to-uid/gid mappings. * Major updates to the Samba documentation tree. * Full support for client and server SMB signing to ensure compatibility with default Windows 2K3 security settings. * Improvement of ACL mapping features. @ text @d1 1 a1 1 $NetBSD: patch-as,v 1.1 2003/09/05 19:13:42 kim Exp $ d3 11 a13 14 Fix DFS referrals for Windows XP and 2003 clients. http://lists.xsec.it/pipermail/samba-it/2003-April/000321.html --- smbd/trans2.c.orig Sun Apr 6 21:54:00 2003 +++ smbd/trans2.c Fri Sep 5 14:47:28 2003 @@@@ -3041,7 +3041,7 @@@@ { char *params = *pparams; enum remote_arch_types ra_type = get_remote_arch(); - BOOL NT_arch = ((ra_type == RA_WINNT) || (ra_type == RA_WIN2K)); + BOOL NT_arch = ((ra_type == RA_WINNT) || (ra_type == RA_WIN2K) || (ra_type == RA_WINXP) || (ra_type == RA_WIN2K3)); pstring pathname; int reply_size = 0; int max_referral_level; @ 1.1 log @Fix DFS for Windows XP and 2003 clients. http://lists.xsec.it/pipermail/samba-it/2003-April/000321.html @ text @d1 1 a1 1 $NetBSD$ @