Commit Graph

1975 Commits

Author SHA1 Message Date
CvH
25c2698364 Merge pull request #5644 from boot2k3/master
libnfs: update to 5.0.1
2022-02-03 17:49:51 +01:00
CvH
1808f92226 Merge pull request #6094 from heitbaum/rpath-so
Remove libtool preserved temporary RPATH/RUNPATH from "shared object" ELF binaries (libraries/executables)
2022-02-03 17:44:55 +01:00
CvH
875334be33 Merge pull request #6088 from heitbaum/iwd2
Update iwd to 1.23 and connman to 1.41
2022-02-03 17:43:36 +01:00
Dmitry_L
10eb9e351a libnfs: update to 5.0.1
This commit below required more updated libnfs than 4.0.0
https://github.com/xbmc/xbmc/pull/17512
2022-02-01 18:40:21 +03:00
heitbaum
b43721da58 samba: update to 4.13.17
release notes:
- https://www.samba.org/samba/history/samba-4.13.17.html

                   ===============================
                   Release Notes for Samba 4.13.17
                          January 31, 2022
                   ===============================

This is a security release in order to address the following defects:

o CVE-2021-44142: Out-of-Bound Read/Write on Samba vfs_fruit module.
                  https://www.samba.org/samba/security/CVE-2021-44142.html

o CVE-2022-0336:  Re-adding an SPN skips subsequent SPN conflict checks.
                  https://www.samba.org/samba/security/CVE-2022-0336.html

Changes since 4.13.16
---------------------

o  Ralph Boehme <slow@samba.org>
   * BUG 14914: CVE-2021-44142

o  Joseph Sutton <josephsutton@catalyst.net.nz>
   * BUG 14950: CVE-2022-0336
2022-02-01 10:32:45 +00:00
heitbaum
1e1f7c5710 connman: update to 1.41 2022-01-28 20:19:36 +00:00
heitbaum
0011c4d3e9 iwd: update to 1.23 2022-01-28 20:15:21 +00:00
heitbaum
f4d1416b7c connman: remove RPATH 2022-01-23 21:39:17 +00:00
heitbaum
edbe9d8fe9 bluez: remove RPATH 2022-01-23 21:39:17 +00:00
heitbaum
254219ed6e iptables: remove RPATH 2022-01-23 21:39:17 +00:00
heitbaum
ac480ad8d7 avahi: remove RPATH 2022-01-23 21:39:17 +00:00
heitbaum
e49d784342 samba: update to 4.13.16
update 4.13.15 (2021-12-15) to 4.13.16 (2022-01-10)

release notes:
- https://www.samba.org/samba/history/samba-4.13.16.html
- https://www.samba.org/samba/security/CVE-2021-43566.html
2022-01-12 10:39:53 +00:00
heitbaum
ec45ff05c6 samba: update to 4.13.15
release notes:
- https://www.samba.org/samba/history/samba-4.13.15.html
2021-12-28 10:23:58 +00:00
Jernej Skrabec
6c1cc07900 bluez: install empty bluez.pc
This is needed to convience pulseaudio that bluez is present.
2021-12-08 22:17:13 +01:00
CvH
629317df2a Merge pull request #5939 from SupervisedThinking/bluez
[le11] bluez: update to 5.62
2021-12-08 12:01:06 +01:00
heitbaum
c2d6efc729 samba: add libunwind as a target dependency 2021-12-05 08:30:21 +00:00
SupervisedThinking
fa45dcd946 bluez: update to 5.62
- add configure opt to disable manpages
- drop upstreamed patch
2021-12-02 18:19:08 +01:00
heitbaum
7104aa63d7 ethtool: update to 5.15 2021-11-28 11:56:56 +00:00
Christian Hewitt
609799474b sshpass: fix build on x86_64 2021-11-23 05:44:23 +00:00
heitbaum
423cf56047 iw: update to 5.16 2021-11-20 15:27:54 +11:00
heitbaum
dec5a9460f iwd: update to 1.20 2021-11-20 15:27:49 +11:00
heitbaum
7af3568bd9 samba: update to 4.13.14
update 4.13.13 (2021-10-29) to 4.13.14 (2021-11-09)

release notes: https://www.samba.org/samba/history/samba-4.13.14.html

                   ===============================
                   Release Notes for Samba 4.13.14
                           November 9, 2021
                   ===============================

This is a security release in order to address the following defects:

o CVE-2016-2124:  SMB1 client connections can be downgraded to plaintext
                  authentication.
                  https://www.samba.org/samba/security/CVE-2016-2124.html

o CVE-2020-25717: A user on the domain can become root on domain members.
                  https://www.samba.org/samba/security/CVE-2020-25717.html
                  (PLEASE READ! There are important behaviour changes described)

o CVE-2020-25718: Samba AD DC did not correctly sandbox Kerberos tickets issued
                  by an RODC.
                  https://www.samba.org/samba/security/CVE-2020-25718.html

o CVE-2020-25719: Samba AD DC did not always rely on the SID and PAC in Kerberos
                  tickets.
                  https://www.samba.org/samba/security/CVE-2020-25719.html

o CVE-2020-25721: Kerberos acceptors need easy access to stable AD identifiers
                  (eg objectSid).
                  https://www.samba.org/samba/security/CVE-2020-25721.html

o CVE-2020-25722: Samba AD DC did not do suffienct access and conformance
                  checking of data stored.
                  https://www.samba.org/samba/security/CVE-2020-25722.html

o CVE-2021-3738:  Use after free in Samba AD DC RPC server.
                  https://www.samba.org/samba/security/CVE-2021-3738.html

o CVE-2021-23192: Subsequent DCE/RPC fragment injection vulnerability.
                  https://www.samba.org/samba/security/CVE-2021-23192.html

Changes since 4.13.13
---------------------

o  Douglas Bagnall &lt;douglas.bagnall@catalyst.net.nz&gt;
   * CVE-2020-25722

o  Andrew Bartlett &lt;abartlet@samba.org&gt;
   * CVE-2020-25718
   * CVE-2020-25719
   * CVE-2020-25721
   * CVE-2020-25722

o  Ralph Boehme &lt;slow@samba.org&gt;
   * CVE-2020-25717

o  Alexander Bokovoy &lt;ab@samba.org&gt;
   * CVE-2020-25717

o  Samuel Cabrero &lt;scabrero@samba.org&gt;
   * CVE-2020-25717

o  Nadezhda Ivanova &lt;nivanova@symas.com&gt;
   * CVE-2020-25722

o  Stefan Metzmacher &lt;metze@samba.org&gt;
   * CVE-2016-2124
   * CVE-2020-25717
   * CVE-2020-25719
   * CVE-2020-25722
   * CVE-2021-23192
   * CVE-2021-3738
   * ldb: version 2.2.3

o  Andreas Schneider &lt;asn@samba.org&gt;
   * CVE-2020-25719

o  Joseph Sutton &lt;josephsutton@catalyst.net.nz&gt;
   * CVE-2020-17049
   * CVE-2020-25718
   * CVE-2020-25719
   * CVE-2020-25721
   * CVE-2020-25722
   * MS CVE-2020-17049
2021-11-10 18:52:34 +11:00
Christian Hewitt
b3c98526cc sshpass: add initial package 2021-11-05 09:43:59 +00:00
heitbaum
4be46be119 samba: update to 4.13.13
update 4.13.12 (2021-09-22) to 4.13.13 (2021-10-29)

release notes:
- https://www.samba.org/samba/history/samba-4.13.13.html

Changes since 4.13.12
---------------------

o  Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
   * BUG 14868: rodc_rwdc test flaps.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with
     embedded Heimdal.
   * BUG 14836: Python ldb.msg_diff() memory handling failure.
   * BUG 14845: "in" operator on ldb.Message is case sensitive.
   * BUG 14848: Release LDB 2.3.1 for Samba 4.14.9.
   * BUG 14871: Fix Samba support for UF_NO_AUTH_DATA_REQUIRED.
   * BUG 14874: Allow special chars like "@" in samAccountName when generating
     the salt.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Isaac Boukris <iboukris@gmail.com>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Viktor Dukhovni <viktor@twosigma.com>
   * BUG 12998: Fix transit path validation.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Luke Howard <lukeh@padl.com>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  David Mulder <dmulder@suse.com>
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Andreas Schneider <asn@samba.org>
   * BUG 14870: Prepare to operate with MIT krb5 >= 1.20.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Joseph Sutton <josephsutton@catalyst.net.nz>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal.
   * BUG 14645: rpcclient NetFileEnum and net rpc file both cause lock order
     violation: brlock.tdb, share_entries.tdb.
   * BUG 14836: Python ldb.msg_diff() memory handling failure.
   * BUG 14845: "in" operator on ldb.Message is case sensitive.
   * BUG 14848: Release LDB 2.3.1 for Samba 4.14.9.
   * BUG 14868: rodc_rwdc test flaps.
   * BUG 14871: Fix Samba support for UF_NO_AUTH_DATA_REQUIRED.
   * BUG 14874: Allow special chars like "@" in samAccountName when generating
     the salt.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Nicolas Williams <nico@twosigma.com>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.
2021-10-30 13:02:27 +11:00
CvH
56f5485fbd Merge pull request #5803 from mglae/le11_wsdd2_initial
wsdd2: initial package v1.8.6
2021-10-27 12:23:45 +02:00