aboutsummaryrefslogtreecommitdiff
path: root/net/samba4/patches/021-source4-msgsock-nvram-fix.patch
Commit message (Collapse)AuthorAge
* samba4: update to 4.18.0Andrew Sim2023-03-27
| | | | | | Samba release history: https://www.samba.org/samba/history/samba-4.18.0.html Signed-off-by: Andrew Sim <andrewsimz@gmail.com>
* samba4: update to 4.17.5Michael Peleshenko2023-03-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * update to 4.17.5 * changelog: https://www.samba.org/samba/history/samba-4.17.5 * refresh patch * CVE-2022-42898: Samba's Kerberos libraries and AD DC failed to guard against integer overflows when parsing a PAC on a 32-bit system, which allowed an attacker with a forged PAC to corrupt the heap. https://www.samba.org/samba/security/CVE-2022-42898.html * CVE-2022-37966: This is the Samba CVE for the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022. A Samba Active Directory DC will issue weak rc4-hmac session keys for use between modern clients and servers despite all modern Kerberos implementations supporting the aes256-cts-hmac-sha1-96 cipher. On Samba Active Directory DCs and members 'kerberos encryption types = legacy' would force rc4-hmac as a client even if the server supports aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96. https://www.samba.org/samba/security/CVE-2022-37966.html * CVE-2022-37967: This is the Samba CVE for the Windows Kerberos Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022. A service account with the special constrained delegation permission could forge a more powerful ticket than the one it was presented with. https://www.samba.org/samba/security/CVE-2022-37967.html * CVE-2022-38023: The "RC4" protection of the NetLogon Secure channel uses the same algorithms as rc4-hmac cryptography in Kerberos, and so must also be assumed to be weak. https://www.samba.org/samba/security/CVE-2022-38023.html * BUG 15210: synthetic_pathref AFP_AfpInfo failed errors. This resolves errors logged during macOS TimeMachine backups. https://bugzilla.samba.org/show_bug.cgi?id=15210 Signed-off-by: Michael Peleshenko <mpeleshenko@gmail.com>
* samba4: update to 4.17.1Andrew Sim2022-10-23
| | | | | | | | * update to 4.17.1 * changelog: https://www.samba.org/samba/history/samba-4.17.1 * refresh patch Signed-off-by: Andrew Sim <andrewsimz@gmail.com>
* treewide: Run refresh on all packagesIlya Lipnitskiy2021-02-20
| | | | | | | | | The crude loop I wrote to come up with this changeset: find -L package/feeds/packages/ -name patches | \ sed 's/patches$/refresh/' | sort | xargs make Signed-off-by: Ilya Lipnitskiy <ilya.lipnitskiy@gmail.com>
* samba4: update to 4.11.4Andy Walsh2019-12-17
* update to 4.11.4 (python3 version) * re-enable AD-DC option * add 'samba_nice' UCI option via "config procd 'extra'" * restructure buildsteps (don't rely on waf --targets logic) * move quota option into VFS * move ACL option into AC-DC * add more admin-tools * use rpath_install for libs * fix rpath + rstrip Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>