| Commit message (Collapse) | Author | Age |
|
|
|
|
|
| |
Samba release history: https://www.samba.org/samba/history/samba-4.18.0.html
Signed-off-by: Andrew Sim <andrewsimz@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* update to 4.17.5
* changelog: https://www.samba.org/samba/history/samba-4.17.5
* refresh patch
* CVE-2022-42898: Samba's Kerberos libraries and AD DC failed to guard against integer overflows when parsing a PAC on a 32-bit system, which allowed an attacker with a forged PAC to corrupt the heap.
https://www.samba.org/samba/security/CVE-2022-42898.html
* CVE-2022-37966: This is the Samba CVE for the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.
A Samba Active Directory DC will issue weak rc4-hmac session keys for use between modern clients and servers despite all modern Kerberos implementations supporting the aes256-cts-hmac-sha1-96 cipher.
On Samba Active Directory DCs and members 'kerberos encryption types = legacy' would force rc4-hmac as a client even if the server supports aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96.
https://www.samba.org/samba/security/CVE-2022-37966.html
* CVE-2022-37967: This is the Samba CVE for the Windows Kerberos Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.
A service account with the special constrained delegation permission could forge a more powerful ticket than the one it was presented with.
https://www.samba.org/samba/security/CVE-2022-37967.html
* CVE-2022-38023: The "RC4" protection of the NetLogon Secure channel uses the same algorithms as rc4-hmac cryptography in Kerberos, and so must also be assumed to be weak.
https://www.samba.org/samba/security/CVE-2022-38023.html
* BUG 15210: synthetic_pathref AFP_AfpInfo failed errors.
This resolves errors logged during macOS TimeMachine backups.
https://bugzilla.samba.org/show_bug.cgi?id=15210
Signed-off-by: Michael Peleshenko <mpeleshenko@gmail.com>
|
|
|
|
|
|
|
|
| |
* update to 4.17.1
* changelog: https://www.samba.org/samba/history/samba-4.17.1
* refresh patch
Signed-off-by: Andrew Sim <andrewsimz@gmail.com>
|
|
|
|
| |
Signed-off-by: Andrew Sim <andrewsimz@gmail.com>
|
|
|
|
| |
Signed-off-by: Andrew Sim <andrewsimz@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
| |
This commit fixes two issues on macos:
1. Added a patch to fix 'echo -n' issue with MacOS shell
(backported from upstream)
2. Redefined sys.platform='linux' for target build if build host is
MacOS (otherwise, build script tries to use MacOS logic for
OpenWrt(Linux) target build)
Signed-off-by: Sergey V. Lobanov <sergey@lobanov.in>
|
|
|
|
|
|
|
|
|
|
|
| |
* update to 4.14.11
* fix AD_DC build
* add vfs_widelinks to defaults
* refresh patches
* fixes: #16697, #17692
* fixes: CVE-2016-2124, CVE-2020-25717, CVE-2020-25718, CVE-2020-25719, CVE-2020-25721, CVE-2020-25722, CVE-2021-3738, CVE-2021-23192
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|
|
|
|
|
|
| |
* update to 4.14.7
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|
|
|
|
|
|
|
| |
* update to 4.14.5
* refresh patches
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|
|
|
|
|
|
|
|
|
| |
The crude loop I wrote to come up with this changeset:
find -L package/feeds/packages/ -name patches | \
sed 's/patches$/refresh/' | sort | xargs make
Signed-off-by: Ilya Lipnitskiy <ilya.lipnitskiy@gmail.com>
|
|
|
|
|
|
|
|
|
|
| |
* update to 4.12.5
* fixes CVE-2020-10730, CVE-2020-10745, CVE-2020-10760, CVE-2020-14303
* add fix-musl_missing__nss_buflen_passwd.patch
* remove fixed tirpc include
* add extra CONFIGURE_VARS (XSLTPROC=false, WAF_NO_PREFORK=1)
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|
|
|
|
|
|
| |
* add unbundle libunwind, icu patches
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|
|
|
|
|
|
|
|
| |
* update to 4.12.3
* update/remove patches
* disable netbios port 139 on 'DISABLE_NETBIOS' option or missing 'nmbd'
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* update to 4.11.4 (python3 version)
* re-enable AD-DC option
* add 'samba_nice' UCI option via "config procd 'extra'"
* restructure buildsteps (don't rely on waf --targets logic)
* move quota option into VFS
* move ACL option into AC-DC
* add more admin-tools
* use rpath_install for libs
* fix rpath + rstrip
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|
|
|
|
|
|
|
|
| |
* fix openwrt/packages#10700
* add suffix to asn1_compile, compile_et to avoid krb5 conflicts
* bundle samba's com_err
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|
|
|
|
|
|
|
|
|
| |
* update to 4.9.16
* cherry-pick some musl alpine/openembedded patches
* cleanup/remove AD-DC/Winbind options and related code
* build the compile_et via samba4/host
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|
|
|
|
|
|
|
|
| |
* revert to 4.9.x series (4.10 needs too many unofficial patches and has weird waf bugs)
* cleanup patches
* enable AD_DC build option again
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|
|
|
|
|
|
|
| |
* add missing libreadline dep
* remove old patches
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|
|
|
|
|
|
|
|
|
|
| |
* update to 4.10.6
* use python3
* disable SERVER_AD_DC option (bugged atm)
* fix init script symlink smb.conf detection
* add new deps (libtasn1, libopenssl)
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|
|
|
|
|
|
|
|
| |
* add patch for tmsize overflow (https://bugzilla.samba.org/show_bug.cgi?id=13622)
* re-enable netbios by default
(Some users still need netbios and its just a minor size increase 50kb)
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|
|
|
|
|
|
|
| |
Update Samba to 4.9.2
Refresh patches
Signed-off-by: Daniel Engberg <daniel.engberg.lists@pyret.net>
|
|
|
|
|
|
|
|
|
| |
* update to 4.8.5
* enable aesni support for x86_64
* add 'unbundle libbsd' patch
* update smb.conf.template (disable spoolss)
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|
|
Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
|