head 1.3; access; symbols pkgsrc-2014Q4:1.2.0.12 pkgsrc-2014Q4-base:1.2 pkgsrc-2014Q3:1.2.0.10 pkgsrc-2014Q3-base:1.2 pkgsrc-2014Q2:1.2.0.8 pkgsrc-2014Q2-base:1.2 pkgsrc-2014Q1:1.2.0.6 pkgsrc-2014Q1-base:1.2 pkgsrc-2013Q4:1.2.0.4 pkgsrc-2013Q4-base:1.2 pkgsrc-2013Q3:1.2.0.2 pkgsrc-2013Q3-base:1.2 pkgsrc-2013Q2:1.1.0.14 pkgsrc-2013Q2-base:1.1 pkgsrc-2013Q1:1.1.0.12 pkgsrc-2013Q1-base:1.1 pkgsrc-2012Q4:1.1.0.10 pkgsrc-2012Q4-base:1.1 pkgsrc-2012Q3:1.1.0.8 pkgsrc-2012Q3-base:1.1 pkgsrc-2012Q2:1.1.0.6 pkgsrc-2012Q2-base:1.1 pkgsrc-2012Q1:1.1.0.4 pkgsrc-2012Q1-base:1.1 pkgsrc-2011Q4:1.1.0.2 pkgsrc-2011Q4-base:1.1; locks; strict; comment @# @; 1.3 date 2015.02.25.15.00.20; author taca; state dead; branches; next 1.2; commitid 43G89p61KLWHToby; 1.2 date 2013.08.12.02.47.32; author taca; state Exp; branches; next 1.1; commitid CfTLzSYulRBuU61x; 1.1 date 2011.10.11.20.30.00; author jmcneill; state Exp; branches 1.1.14.1; next ; 1.1.14.1 date 2013.08.12.14.21.30; author tron; state Exp; branches; next ; commitid udOa9UdiEH1EKa1x; desc @@ 1.3 log @Remove samba35 package. Samba 3.5.x was EOL Oct 2013. @ text @$NetBSD: patch-ba,v 1.2 2013/08/12 02:47:32 taca Exp $ --- configure.in.orig 2013-07-24 18:53:49.000000000 +0000 +++ configure.in @@@@ -6244,6 +6244,11 @@@@ AC_CHECK_MEMBER(struct passwd.pw_age, AC_DEFINE(HAVE_PASSWD_PW_AGE, 1, [Defined if struct passwd has pw_age field]),, [#include ]) +# NetBSD +AC_CHECK_MEMBER(struct passwd.pw_class, + AC_DEFINE(HAVE_PASSWD_PW_CLASS, 1, [Defined if struct passwd has pw_class field]),, + [#include ]) + # AIX 4.3.x and 5.1 do not have as many members in # struct secmethod_table as AIX 5.2 AC_CHECK_MEMBERS([struct secmethod_table.method_attrlist], , , @ 1.2 log @Update samba35 to 3.5.22, security release. ============================== Release Notes for Samba 3.5.22 August 05, 2013 ============================== This is a security release in order to address CVE-2013-4124 (Missing integer wrap protection in EA list reading can cause server to loop with DOS). o CVE-2013-4124: All current released versions of Samba are vulnerable to a denial of service on an authenticated or guest connection. A malformed packet can cause the smbd server to loop the CPU performing memory allocations and preventing any further service. A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated if guest connections are allowed. This flaw is not exploitable beyond causing the code to loop allocating memory, which may cause the machine to exceed memory limits. Changes since 3.5.21: --------------------- o Jeremy Allison * BUG 10010: CVE-2013-4124: Missing integer wrap protection in EA list reading can cause server to loop with DOS. @ text @d1 1 a1 1 $NetBSD: patch-ba,v 1.1 2011/10/11 20:30:00 jmcneill Exp $ @ 1.1 log @integrate the patch from the following url: http://www.ogris.de/samba/unix-active-directory.html and install nss_winbind. bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD$ d3 1 a3 1 --- configure.in.orig 2011-08-03 18:24:05.000000000 +0000 d5 1 a5 1 @@@@ -6239,6 +6239,11 @@@@ AC_CHECK_MEMBER(struct passwd.pw_age, @ 1.1.14.1 log @Pullup ticket #4208 - requested by taca net/samba35: security update Revisions pulled up: - net/samba35/Makefile 1.31 - net/samba35/distinfo 1.16 - net/samba35/patches/patch-af 1.6 - net/samba35/patches/patch-ah 1.3 - net/samba35/patches/patch-ap 1.2 - net/samba35/patches/patch-aq 1.4 - net/samba35/patches/patch-av 1.3 - net/samba35/patches/patch-aw 1.2 - net/samba35/patches/patch-ba 1.2 - net/samba35/patches/patch-bb 1.2 --- Module Name: pkgsrc Committed By: taca Date: Mon Aug 12 02:47:32 UTC 2013 Modified Files: pkgsrc/net/samba35: Makefile distinfo pkgsrc/net/samba35/patches: patch-af patch-ah patch-ap patch-aq patch-av patch-aw patch-ba patch-bb Log Message: Update samba35 to 3.5.22, security release. ============================== Release Notes for Samba 3.5.22 August 05, 2013 ============================== This is a security release in order to address CVE-2013-4124 (Missing integer wrap protection in EA list reading can cause server to loop with DOS). o CVE-2013-4124: All current released versions of Samba are vulnerable to a denial of service on an authenticated or guest connection. A malformed packet can cause the smbd server to loop the CPU performing memory allocations and preventing any further service. A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated if guest connections are allowed. This flaw is not exploitable beyond causing the code to loop allocating memory, which may cause the machine to exceed memory limits. Changes since 3.5.21: --------------------- o Jeremy Allison * BUG 10010: CVE-2013-4124: Missing integer wrap protection in EA list reading can cause server to loop with DOS. @ text @d3 1 a3 1 --- configure.in.orig 2013-07-24 18:53:49.000000000 +0000 d5 1 a5 1 @@@@ -6244,6 +6244,11 @@@@ AC_CHECK_MEMBER(struct passwd.pw_age, @