Commit Graph

29494 Commits

Author SHA1 Message Date
CvH
39d1620743 Merge pull request #5363 from heitbaum/bx
kodi-binary-addons: update to latest versions
2021-05-10 21:57:18 +02:00
Matthias Reichl
03376e209b RPi: revert to firmware 1df5579
Signed-off-by: Matthias Reichl <hias@horus.com>
2021-05-10 20:49:03 +02:00
Matthias Reichl
a0e2173c95 linux (RPi): revert to 5.10.27-7fb9d00
Signed-off-by: Matthias Reichl <hias@horus.com>
2021-05-10 20:49:03 +02:00
knaerzche
a9dbd8a01a Merge pull request #5345 from easybe/u-boot
u-boot: rockchip: fix build with GCC 10
2021-05-10 15:00:34 +02:00
heitbaum
a81148cd0a kodi-binary-addons: update to latest versions 2021-05-09 22:19:16 +00:00
mglae
9752ade2c4 Merge pull request #5362 from CvH/10.0/settings_up
LibreELEC-settings: update to 3c824b3
2021-05-09 23:53:48 +02:00
CvH
9f9c0e7025 Merge pull request #5334 from heitbaum/kernelb3
[Allwinner,Generic,Rockchip] linux: Update to 5.10.35
2021-05-09 22:27:58 +02:00
CvH
e2f0f3fa12 LibreELEC-settings: update to 3c824b3 2021-05-09 19:58:29 +02:00
CvH
1cc0e3a8aa Merge pull request #5343 from heitbaum/samba
samba: update to 4.13.8
2021-05-09 18:58:40 +02:00
Matthias Reichl
2b2a7f8694 kodi: update to 19.1-Matrix
Signed-off-by: Matthias Reichl <hias@horus.com>
2021-05-09 18:24:59 +02:00
heitbaum
4dbe6f1cd2 kodi-binary-addons: update to latest versions
pvr.waipu: update to 2.8.3
- Store and use refresh token (reduce number of logins with credentials)
- Do not log password in Kodi log (improve privacy if user posts debug log)
2021-05-08 03:24:09 +00:00
heitbaum
dddfddbb5c linux: update to 5.10.35 2021-05-07 14:10:40 +00:00
heitbaum
b040a8ed4b kodi-binary-addons: update to latest versions 2021-05-02 23:37:23 +00:00
Matthias Reichl
8a74e16286 Merge pull request #5346 from heitbaum/netbase
netbase: update to 6.3
2021-05-02 11:08:29 +02:00
Matthias Reichl
4d7552e648 RPi: update to firmware 1a46874
Signed-off-by: Matthias Reichl <hias@horus.com>
2021-05-01 13:24:07 +02:00
Matthias Reichl
41c70127f8 linux (RPi): update to 5.10.33-96110e9
Signed-off-by: Matthias Reichl <hias@horus.com>
2021-05-01 13:24:07 +02:00
Matthias Reichl
91f43b13f6 rpi-eeprom: update to e610734
Signed-off-by: Matthias Reichl <hias@horus.com>
2021-05-01 13:24:07 +02:00
Matthias Reichl
fe11fa3c6c linux (RPi): update to 5.10.32-31b07b2
Signed-off-by: Matthias Reichl <hias@horus.com>
2021-05-01 13:24:07 +02:00
Matthias Reichl
c5c0f137b7 RPi: update to firmware 616dde8
Signed-off-by: Matthias Reichl <hias@horus.com>
2021-05-01 13:24:07 +02:00
Matthias Reichl
956b8edcd4 linux (RPi): update to 5.10.31-ad7f86c
Signed-off-by: Matthias Reichl <hias@horus.com>
2021-05-01 13:24:07 +02:00
Matthias Reichl
f8dc364d12 rpi-eeprom: update to f3b402d
Signed-off-by: Matthias Reichl <hias@horus.com>
2021-05-01 13:24:07 +02:00
heitbaum
f44dac9d67 netbase: update to 6.3
update 6.2 to 6.3
diff: https://salsa.debian.org/md/netbase/-/compare/v6.2...v6.3
2021-04-30 23:53:22 +00:00
Ezra Buehler
d2af770524 u-boot: rockchip: fix build with GCC 10 2021-04-30 22:40:54 +00:00
heitbaum
42655e155b kodi-binary-addons: update to latest versions
pvr.nextpvr: upsate to 8.2.2
- Add missing break
- Keyword timers where falling through and acting as advanced searches
2021-04-30 10:20:19 +00:00
heitbaum
4c499faaf0 samba: update to 4.13.8
update 4.1.7 (2021-03-24) to 4.18.8 (2021-04-29)
release notes: https://www.samba.org/samba/history/samba-4.13.8.html

==

This is a security release in order to address the following defect:

o CVE-2021-20254: Negative idmap cache entries can cause incorrect group entries
  in the Samba file server process token.

=======
Details
=======

o  CVE-2021-20254:
   The Samba smbd file server must map Windows group identities (SIDs) into unix
   group ids (gids). The code that performs this had a flaw that could allow it
   to read data beyond the end of the array in the case where a negative cache
   entry had been added to the mapping cache. This could cause the calling code
   to return those values into the process token that stores the group
   membership for a user.

   Most commonly this flaw caused the calling code to crash, but an alert user
   (Peter Eriksson, IT Department, Linköping University) found this flaw by
   noticing an unprivileged user was able to delete a file within a network
   share that they should have been disallowed access to.

   Analysis of the code paths has not allowed us to discover a way for a
   remote user to be able to trigger this flaw reproducibly or on demand,
   but this CVE has been issued out of an abundance of caution.

Changes since 4.13.7
--------------------

o  Volker Lendecke <vl@samba.org>
   * BUG 14571: CVE-2021-20254: Fix buffer overrun in sids_to_unixids().
2021-04-30 10:19:04 +00:00