freebsd-ports/net/samba413/files/patch-source3_wscript__build
Timur I. Bakeyev dd3fc789e7 Security update for samba411, samba412 and samba413:
CVE-2020-14318 (Missing handle permissions check in SMB1/2/3 ChangeNotify)
CVE-2020-14323 (Unprivileged user can crash winbind)
CVE-2020-14383 (An authenticated user can crash the DCE/RPC DNS with easily crafted records)

Security:	CVE-2020-14318
		CVE-2020-14323
		CVE-2020-14383
2020-10-31 04:28:26 +00:00

60 lines
2.2 KiB
Text

--- source3/wscript_build.orig 2020-07-09 13:33:56 UTC
+++ source3/wscript_build
@@ -233,11 +233,9 @@ bld.SAMBA3_SUBSYSTEM('SMBREGISTRY',
talloc
replace
util_reg
- samba-util
- samba-security
errors3
dbwrap
- samba3-util
+ samba3util
''')
# Do not link against this use 'smbconf'
@@ -495,7 +493,7 @@ bld.SAMBA3_LIBRARY('secrets3',
bld.SAMBA3_LIBRARY('smbldap',
source='lib/smbldap.c',
- deps='ldap lber samba-util smbconf',
+ deps='ldap lber samba3util smbd_shim samba-debug smbconf',
enabled=bld.CONFIG_SET("HAVE_LDAP"),
private_library=False,
abi_directory='lib/ABI',
@@ -721,6 +719,7 @@ bld.SAMBA3_LIBRARY('smbd_base',
smbd_conn
param_service
AVAHI
+ dns_sd
PRINTBASE
PROFILE
LOCKING
@@ -1129,6 +1128,7 @@ bld.SAMBA3_BINARY('client/smbclient',
msrpc3
RPC_NDR_SRVSVC
cli_smb_common
+ dns_sd
archive
''')
@@ -1153,8 +1153,8 @@ bld.SAMBA3_BINARY('smbspool_krb5_wrapper',
enabled=bld.CONFIG_SET('HAVE_CUPS'))
bld.SAMBA3_BINARY('smbspool_argv_wrapper',
- source='script/tests/smbspool_argv_wrapper.c',
- for_selftest=True)
+ source='script/tests/smbspool_argv_wrapper.c',
+ for_selftest=True)
bld.SAMBA3_BINARY('locktest2',
source='torture/locktest2.c',
@@ -1303,7 +1303,7 @@ bld.SAMBA3_BINARY('vfstest',
smbconf
SMBREADLINE
''',
- for_selftest=True)
+ install=True)
bld.SAMBA3_BINARY('versiontest',
source='lib/version_test.c',