[email protected] (Jérémie Courrèges-Anglas) writes:

> Hi,
>
> The last security update to samba-4.3.8 brought various regressions,
> among them guest account access from various implementations. Upstream
> is working on fixes as noted in this bug:
>
>   https://bugzilla.samba.org/show_bug.cgi?id=11849
>
> (See "Blocks:" for a list of bugs that might affect you.)
>
> Testing early and making sure that the fixes end up in the next 4.3.x is
> the way forward, but right now I can only deal with the latter part.
> Reports welcome!

Bah, upstream just published samba-4.3.9, including the fixes mentioned
above.  At least one developer tested my initial diff, having more
reports would be great.

Index: Makefile
===================================================================
RCS file: /cvs/ports/net/samba/Makefile,v
retrieving revision 1.215.2.1
diff -u -p -r1.215.2.1 Makefile
--- Makefile    17 Apr 2016 17:08:29 -0000      1.215.2.1
+++ Makefile    2 May 2016 17:22:14 -0000
@@ -1,7 +1,7 @@
 # $OpenBSD: Makefile,v 1.215.2.1 2016/04/17 17:08:29 jca Exp $
 
 SHARED_ONLY =          Yes
-VERSION =              4.3.8
+VERSION =              4.3.9
 DISTNAME =             samba-${VERSION}
 
 COMMENT-main =         SMB and CIFS client and server for UNIX
@@ -16,10 +16,12 @@ PKGNAME-tevent =    tevent-${TEVENT_V}
 PKGNAME-util =         samba-util-${VERSION}
 PKGNAME-docs =         samba-docs-${VERSION}
 
-PKG_ARCH-docs =                *
+REVISION-ldb =         0
 
 LDB_V =                        1.1.21
-TEVENT_V =             0.9.25
+TEVENT_V =             0.9.28
+
+PKG_ARCH-docs =                *
 
 SHARED_LIBS =          asn1-samba4             0.0 \
                        dcerpc                  0.0 \
@@ -55,7 +57,7 @@ SHARED_LIBS =         asn1-samba4             0.0 \
                        smbclient-raw           0.0 \
                        smbconf                 0.0 \
                        smbldap                 0.0 \
-                       tevent                  0.1 \
+                       tevent                  0.2 \
                        tevent-util             0.0 \
                        torture                 0.0 \
                        wbclient                3.0 \
Index: distinfo
===================================================================
RCS file: /cvs/ports/net/samba/distinfo,v
retrieving revision 1.45.2.1
diff -u -p -r1.45.2.1 distinfo
--- distinfo    17 Apr 2016 17:08:29 -0000      1.45.2.1
+++ distinfo    2 May 2016 11:47:20 -0000
@@ -1,2 +1,2 @@
-SHA256 (samba-4.3.8.tar.gz) = N53GbDoKSDv1vtN75uXRgpNNt8QQKyGSmmxGArMrKxA=
-SIZE (samba-4.3.8.tar.gz) = 20568773
+SHA256 (samba-4.3.9.tar.gz) = HyLGGn8kxTV6nvTRCDOizRYfQPPbA7y+WG1806VhOfM=
+SIZE (samba-4.3.9.tar.gz) = 20570849
Index: patches/patch-source3_wscript
===================================================================
RCS file: /cvs/ports/net/samba/patches/patch-source3_wscript,v
retrieving revision 1.1.2.1
diff -u -p -r1.1.2.1 patch-source3_wscript
--- patches/patch-source3_wscript       17 Apr 2016 17:08:29 -0000      1.1.2.1
+++ patches/patch-source3_wscript       2 May 2016 11:52:59 -0000
@@ -3,8 +3,8 @@ $OpenBSD: patch-source3_wscript,v 1.1.2.
 - use more generic check for OpenBSD.
 - disable vfs_snapper.so to avoid a possibly useless dep on d-bus
 
---- source3/wscript.orig       Mon Apr 11 19:08:44 2016
-+++ source3/wscript    Mon Apr 11 21:32:23 2016
+--- source3/wscript.orig       Mon May  2 13:47:40 2016
++++ source3/wscript    Mon May  2 13:47:40 2016
 @@ -74,7 +74,7 @@ def configure(conf):
          conf.ADD_CFLAGS('-DDEVELOPER -DDEBUG_PASSWORD')
          conf.env.developer = True
@@ -14,7 +14,7 @@ $OpenBSD: patch-source3_wscript,v 1.1.2.
          conf.ADD_LDFLAGS("-Wl,--export-dynamic", testflags=True)
  
      conf.CHECK_HEADERS('execinfo.h libexc.h libunwind.h netdb.h')
-@@ -1652,7 +1652,7 @@ main() {
+@@ -1679,7 +1679,7 @@ main() {
      if conf.CONFIG_SET('HAVE_VXFS'):
          default_shared_modules.extend(TO_LIST('vfs_vxfs'))
  


-- 
jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF  DDCC 0DFA 74AE 1524 E7EE

Reply via email to