Path to this page:
./
net/samba,
SMB/CIFS protocol server suite
Branch: pkgsrc-2013Q2,
Version: 3.6.17,
Package name: samba-3.6.17,
Maintainer: pkgsrc-usersSamba provides file and print services for Microsoft Windows clients.
These services may be hosted off any TCP/IP-enabled platform. The
Samba project includes not only an impressive feature set in file and
print serving capabilities, but has been extended to include client
functionality, utilities to ease migration to Samba, tools to aid
interoperability with Microsoft Windows, and administration tools.
DEINSTALL.nss_winbind [+/-]# $NetBSD: DEINSTALL.nss_winbind,v 1.2 2013/04/19 07:17:46 sborrill Exp $
case ${STAGE} in
DEINSTALL)
NSS_WINBIND='@NSS_WINBIND@'
case $NSS_WINBIND in
"@comment *") ;;
*)
if ${TEST} -e /usr/lib/${NSS_WINBIND##*/} && \
target=`${LS} -l /usr/lib/${NSS_WINBIND##*/} | \
${AWK} '{print $NF;}'` && \
${TEST} x"$target" = x"${PREFIX}/${NSS_WINBIND}" ;then
${ECHO} "Removing /usr/lib/${NSS_WINBIND##*/} symlink."
${RM} -f /usr/lib/${NSS_WINBIND##*/}
fi
;;
esac
;;
esac
Required to run:[
databases/tdb] [
devel/popt] [
devel/readline] [
lang/perl5]
Package options: ads, ldap, pam, winbind
Master sites: (Expand)
SHA1: e0e9921e87328667e7379c72130c5c800737846f
RMD160: 0280da9cd7fa97e3e0d8121a0d7cdc1228d6d9d3
Filesize: 33311.072 KB
Version history: (Expand)
- (2013-08-12) Updated to version: samba-3.6.17
- (2013-07-08) Package added to pkgsrc.se, version samba-3.6.15nb1 (created)
CVS history: (Expand)
2013-08-12 14:20:19 by Matthias Scheler | Files touched by this commit (21) | |
Log message:
Pullup ticket #4207 - requested by taca
net/samba: security update
Revisions pulled up:
- net/samba/Makefile 1.235,1.237
- net/samba/Makefile.mirrors 1.10
- net/samba/PLIST 1.54
- net/samba/distinfo 1.91-1.92
- net/samba/patches/patch-ac 1.15
- net/samba/patches/patch-ad 1.19
- net/samba/patches/patch-ae 1.11
- net/samba/patches/patch-af 1.12
- net/samba/patches/patch-ah 1.7
- net/samba/patches/patch-ai 1.7
- net/samba/patches/patch-aj 1.7
- net/samba/patches/patch-ak 1.6
- net/samba/patches/patch-an 1.4
- net/samba/patches/patch-ao 1.4
- net/samba/patches/patch-aq 1.4
- net/samba/patches/patch-as 1.4
- net/samba/patches/patch-av 1.5
- net/samba/patches/patch-aw 1.4
- net/samba/patches/patch-ba 1.11
- net/samba/patches/patch-bb 1.5
- net/samba/patches/patch-bf 1.6
---
Module Name: pkgsrc
Committed By: adam
Date: Wed Jul 3 20:00:48 UTC 2013
Modified Files:
pkgsrc/net/samba: Makefile PLIST distinfo
pkgsrc/net/samba/patches: patch-bf
Log message:
Changes 3.6.16:
* BUG 9881: Link dbwrap_tool and dbwrap_torture against libtevent.
* BUG 9722: Properly handle Oplock breaks in compound requests.
* BUG 9822: Fix crash bug during Win8 sync.
* BUG 9927: errno gets overwritten in call to check_parent_exists().
* BUG 8997: Change libreplace GPL source to LGPL.
* BUG 9900: is_printer_published GUID retrieval.
* BUG 9941: Fix a bug of drvupgrade of smbcontrol.
* BUG 9868: Don't know how to make LIBNDR_PREG_OBJ.
* BUG 9688: Remove "experimental" label on "max \
protocol=SMB2" parameter.
* BUG 9881: Check for system libtevent.
---
Module Name: pkgsrc
Committed By: wiz
Date: Thu Jul 4 19:31:10 UTC 2013
Modified Files:
pkgsrc/net/samba: Makefile.mirrors
Log message:
Fix URL.
---
Module Name: pkgsrc
Committed By: taca
Date: Mon Aug 12 02:45:55 UTC 2013
Modified Files:
pkgsrc/net/samba: Makefile distinfo
pkgsrc/net/samba/patches: patch-ac patch-ad patch-ae patch-af patch-ah
patch-ai patch-aj patch-ak patch-an patch-ao patch-aq patch-as
patch-av patch-aw patch-ba patch-bb
Log message:
Update samba to 3.6.17, security release.
==============================
Release Notes for Samba 3.6.17
August 05, 2013
==============================
This is a security release in order to address
CVE-2013-4124 (Missing integer wrap protection in EA list reading can cause
server to loop with DOS).
o CVE-2013-4124:
All current released versions of Samba are vulnerable to a denial of
service on an authenticated or guest connection. A malformed packet
can cause the smbd server to loop the CPU performing memory
allocations and preventing any further service.
A connection to a file share, or a local account is needed to exploit
this problem, either authenticated or unauthenticated if guest
connections are allowed.
This flaw is not exploitable beyond causing the code to loop
allocating memory, which may cause the machine to exceed memory
limits.
Changes since 3.6.16:
---------------------
o Jeremy Allison <jra@samba.org>
* BUG 10010: CVE-2013-4124: Missing integer wrap protection in EA list
reading can cause server to loop with DOS.
|