From owner-freebsd-ports@freebsd.org Sat Aug 6 01:19:42 2016 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3117BBB07FE for ; Sat, 6 Aug 2016 01:19:42 +0000 (UTC) (envelope-from junovitch@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id 26C8518F7; Sat, 6 Aug 2016 01:19:42 +0000 (UTC) (envelope-from junovitch@FreeBSD.org) Received: from Silverstone (localhost [IPv6:::1]) by freefall.freebsd.org (Postfix) with ESMTP id BC7881DDA; Sat, 6 Aug 2016 01:19:41 +0000 (UTC) (envelope-from junovitch@FreeBSD.org) Date: Fri, 5 Aug 2016 21:19:41 -0400 From: Jason Unovitch To: iceflatline Cc: freebsd-ports@freebsd.org Subject: Re: Multiple security vulnerabilities in net/samba36 Message-ID: <20160806011941.GA91700@Silverstone> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; x-action=pgp-signed In-Reply-To: User-Agent: Mutt/1.6.1 (2016-04-27) X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 06 Aug 2016 01:19:42 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Fri, Aug 05, 2016 at 03:23:49PM -0700, iceflatline wrote: > Apologies in advance if this message should be directed to another > mailing list. pkg audit has been complaining about multiple > vulnerabilities in samba36 (samba36-3.6.25_3) for quite awhile. > > See: https://vuxml.FreeBSD.org/freebsd/a636fc26-00d9-11e6-b704-000c292e4fd8.html > > Anyone have a sense on when the port will be updated to address these issues? > > Andy > _______________________________________________ Hi, Samba 3.6 has been EOL'd by upstream as of 2015-03-04 per https://wiki.samba.org/index.php/Samba_Release_Planning. It was removed from ports but re-added in https://svnweb.FreeBSD.org/changeset/ports/415328 as unfortunately there were still some ports that required it as a dependency. If you are not impacted by needing it as a dependency I would advise moving to one of the supported versions. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQF8BAEBCgBmBQJXpTsmXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ0NURGNTQ1OTkzQkJFMzc3OTNDQUNERUU2 RkQ0OUMzMDE2MUNBQTZFAAoJEG/UnDAWHKpuGi4H/RzHLwnawHO/KERWWckbKJf+ Fb5LY+b8SEZ7yC1DpdY91gB9y80siLU/9enhJw8B4IwEex/wUa4Y0RxGirgXou0i 5mlAQ7c6bpI+iKId3V98tAw4sEV/6yvMIQYLlCfW3DomOUEkd5KEvTH3XtfkEsnW vP2kIqYqQaE3neWI1rkjjj8BfQ9h1kAA8gZc1Lavx/u/43YXEgYbzp2b+nliqcTC HgnJGmJkVBm5QTS5MuASwhauWxlLiZqWQKQQG42IqCvajTHU0Q6VqOApWggAX9VX JbZ1+7geecQ6flFDTKgmErSfZYm4dwlD+jS48oFaeuiOLubwqNbhII5U0TwQ4zY= =d4kF -----END PGP SIGNATURE-----