Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
4.11.15_1 24 Apr 2021 15:12:52
    |
Rene Ladan (rene)  |
Remove expired ports:
2021-04-22 net/samba411: Security Support ends on 03 Dec 2020
2021-04-22 net-im/cordless: Unmaintained and dead upstream, uses the old Discord
API which notably has got users banned
2021-04-18 news/plor: listed as "Alpha-release" but last update in 2001;
unmaintained
2021-04-20 security/certificate-transparency: Broken for more than 6 months |
4.11.15_1 06 Apr 2021 14:31:13
    |
Mathieu Arnold (mat)  |
all: Remove all other $FreeBSD keywords. |
4.11.15_1 06 Apr 2021 14:31:07
    |
Mathieu Arnold (mat)  |
Remove # $FreeBSD$ from Makefiles. |
4.11.15_1 25 Mar 2021 02:57:01
  |
timur  |
Security update for net/samba4* ports to 4.13.6 and 4.12.13 respectively.
Mark net/samba411 s deprecated.
Relnotes: CVE-2020-27840
CVE-2021-20277 |
4.11.15_1 30 Jan 2021 13:22:39
  |
dim  |
net/samba411 net/samba412 net/samba413: Fix zero-sized VLAs
With recent versions of clang, samba could dump core shortly after
startup, terminating with either SIGILL or SIGSEGV.
Investigation showed that samba is using C99 variable length arrays
(VLAs), and in some cases the length of these arrays would become zero.
Since this is undefined behavior, various interesting things would
happen, often ending in segfaults.
Fix this by avoiding to use zero as the length for these VLA
declarations.
A similar patch was also sent upstream, and was accepted and included in
subsequent samba releases.
See also: https://bugzilla.samba.org/show_bug.cgi?id=14605
Reported by: Dries Michiels <driesm.michiels@gmail.com>
PR: 252157
MFH: 2021Q1 |
4.11.15 24 Dec 2020 13:34:58
  |
fluffy  |
net/samba41[1-3]: switch to PYTHON_EXT_SUFFIX |
4.11.15 31 Oct 2020 04:28:26
  |
timur  |
Security update for samba411, samba412 and samba413:
CVE-2020-14318 (Missing handle permissions check in SMB1/2/3 ChangeNotify)
CVE-2020-14323 (Unprivileged user can crash winbind)
CVE-2020-14383 (An authenticated user can crash the DCE/RPC DNS with easily
crafted records)
Security: CVE-2020-14318
CVE-2020-14323
CVE-2020-14383 |
4.11.14 26 Oct 2020 16:29:38
  |
0mp  |
Update conflicts
Approved by: portmgr blanket |
4.11.14 14 Oct 2020 22:27:05
  |
timur  |
Routine upgrade Samba ports to 4.11.14 and 4.12.8 respectively. |
4.11.13 20 Sep 2020 02:15:25
  |
timur  |
Upgrade Samba 4.10 to 4.10.18 and 4.11 to 4.11.13 to address security issue.
https://www.samba.org/samba/security/CVE-2020-1472.html
Security: CVE-2020-1472 |
4.11.11 05 Jul 2020 00:27:27
  |
timur  |
Update Samba ports to close recent CVEs.
PR: 245475
Security: CVE-2020-10730
CVE-2020-10745
CVE-2020-10760
CVE-2020-14303 |
4.11.8 29 Apr 2020 01:55:08
  |
timur  |
Security update samba410 to the 4.10.15 and samba 411 to 4.11.8
Security: CVE-2020-10700
CVE-2020-10704 |
4.11.7 21 Apr 2020 08:35:39
  |
timur  |
Introduce new ports databases/ldb20 and net/samba411 |
4.10.14 21 Apr 2020 08:31:33
  |
timur  |
Repocopy databases/ldb20 and net/samba411 |
4.11.7 21 Apr 2020 08:14:03
  |
timur  |
Remove ports databases/ldb20, net/samba411 on the portmanager request |
4.11.7 12 Apr 2020 02:00:35
  |
timur  |
Add new Samba 4.11 port |