Commit graph

2103 commits

Author SHA1 Message Date
heitbaum
6f69aa697e rpcbind: update to 1.2.6
update 1.2.5 (2018-08-15) to 1.2.6 (2021-05-10)

changelog:
- https://sourceforge.net/projects/rpcbind/files/rpcbind/1.2.6/1.2.6-ChangeLog/download

commit 7fcf2b27097fda927d637835468a83ed1b918001
Author: Roberto Bergantinos Corpas <rbergant@redhat.com>
Date:   Mon May 10 12:53:19 2021 -0400

    network_init: initialize response addrinfo list to NULL

    res pointer is not initialized, if for some reason it does not
    take any value after calling getaddrinfo, we end up causing oops
    when calling freeaddrinfo

    Signed-off-by: Roberto Bergantinos Corpas <rbergant@redhat.com>
    Signed-off-by: Steve Dickson <steved@redhat.com>

commit 7be92b30e47801c651e5316217d1651454653f68
Author: Roberto Bergantinos Corpas <rbergant@redhat.com>
Date:   Mon Nov 16 08:39:36 2020 -0500

    security: dowgrade priority for non-libwrap CALLIT logging

    Use aswell auth.warning for non-libwrap CALLIT logging, otherwise
    we'll broadcast everywhere for a call that is not allowed anyway

    Signed-off-by: Roberto Bergantinos Corpas <rbergant@redhat.com>
    Signed-off-by: Steve Dickson <steved@redhat.com>

commit 4bedceec49c804911770561fb09a4d2641f7d28d
Author: Petr Vorel <pvorel@suse.cz>
Date:   Tue Jun 9 09:44:35 2020 -0400

    man/rpcbind: Mention systemd socket in -h

    and reformat doc a bit.

    Based on Olaf Kirch's patch for openSUSE.

    Signed-off-by: Petr Vorel <pvorel@suse.cz>
    Signed-off-by: Steve Dickson <steved@redhat.com>

commit 3f4259b629ddd6ed3872a2bd2408711b789614da
Author: Petr Vorel <pvorel@suse.cz>
Date:   Thu Jun 4 10:21:27 2020 -0400

    security: Fix typos in debug messages and comments

    Signed-off-by: Petr Vorel <pvorel@suse.cz>
    Signed-off-by: Steve Dickson <steved@redhat.com>

commit 51945ec6fbebd5d5dfa525bd2dda0b950fe4e3bc
Author: Steve Dickson <steved@redhat.com>
Date:   Thu Feb 6 14:18:21 2020 -0500

    network_init: clean up a error path found by a covscan

    Signed-off-by: Steve Dickson <steved@redhat.com>

commit 8bf0ce4a1858b5cd00440e416ecfe0fd74662a01
Author: Mike Gilbert <floppym@gentoo.org>
Date:   Tue Jan 21 11:35:38 2020 -0500

    rpcbind: always use inline rpcsvc constants

    Modern versions of glibc no longer provide the rpcsvc headers, so
    there's very little point in trying to use them.

    Signed-off-by: Mike Gilbert <floppym@gentoo.org>
    Signed-off-by: Steve Dickson <steved@redhat.com>

commit eef835dbae60bc1f162d73369fda88700cf21d6f
Author: Mike Gilbert <floppym@gentoo.org>
Date:   Fri Jan 17 10:06:25 2020 -0500

    rpcbind: configure: fix detection of rpcsvc/mount.h

    If libtirpc is providing rpc/rpc.h, including rpcsvc/mount.h may fail if
    -I/path/to/tirpc is not passed to the compiler.

    Bug: https://bugs.gentoo.org/665222
    Signed-off-by: Mike Gilbert <floppym@gentoo.org>
    Signed-off-by: Steve Dickson <steved@redhat.com>

commit c05401d753fec8ac692299819f32565ffafe2a3d
Author: Steve Dickson <steved@redhat.com>
Date:   Tue Jan 14 14:21:02 2020 -0500

    README: Add where to send bug reports

    Signed-off-by: Steve Dickson <steved@redhat.com>

commit 8d6389fb701cd6b12b9bf0a0359ee2cad2a478ac
Author: Steve Dickson <steved@redhat.com>
Date:   Tue Nov 5 11:02:21 2019 -0500

    Remove BAD_FREE from reply_proc()

    Signed-off-by: Steve Dickson <steved@redhat.com>

commit e915f698cc534aceb774312f9aa2a42b5f457985
Author: Steve Dickson <steved@redhat.com>
Date:   Mon Jul 29 09:45:31 2019 -0400

    rpcinfo: Removed resource leaks from src/util.c

    Signed-off-by: Steve Dickson <steved@redhat.com>

commit a6889bba949b1d7f2d745ba1cb6528492da11d45
Author: Steve Dickson <steved@redhat.com>
Date:   Sat Jul 27 13:54:50 2019 -0400

    Removed resource leaks from src/rpcbind.c

    Signed-off-by: Steve Dickson <steved@redhat.com>

commit fc61ce53bf9e7a099b6356dd88122f60f9a21eda
Author: Amadeusz Sławiński <amade@asmblr.net>
Date:   Thu Sep 26 15:29:19 2019 -0400

    rpcbind: Correct some of includes

    Musl based systems are more pedantic than glibc ones about where we
    include files from. Correct some headers to include proper files.

    In file included from src/rpcb_svc_com.c:45:0:
    /usr/include/sys/poll.h:1:2: warning: #warning redirecting incorrect #include <sys/poll.h> to <poll.h> [-Wcpp]
     #warning redirecting incorrect #include <sys/poll.h> to <poll.h>
      ^~~~~~~

    In file included from src/rpcbind.c:45:0:
    /usr/include/sys/errno.h:1:2: warning: #warning redirecting incorrect #include <sys/errno.h> to <errno.h> [-Wcpp]
     #warning redirecting incorrect #include <sys/errno.h> to <errno.h>
      ^~~~~~~
    In file included from src/rpcbind.c:49:0:
    /usr/include/sys/signal.h:1:2: warning: #warning redirecting incorrect #include <sys/signal.h> to <signal.h> [-Wcpp]
     #warning redirecting incorrect #include <sys/signal.h> to <signal.h>
      ^~~~~~~

    In file included from src/util.c:48:0:
    /usr/include/sys/poll.h:1:2: warning: #warning redirecting incorrect #include <sys/poll.h> to <poll.h> [-Wcpp]
     #warning redirecting incorrect #include <sys/poll.h> to <poll.h>
      ^~~~~~~

    Signed-off-by: Amadeusz Sławiński <amade@asmblr.net>
    Signed-off-by: Steve Dickson <steved@redhat.com>

commit 9a40fb4fb35506f6f1423318ed736caf5e490fb7
Author: Amadeusz Sławiński <amade@asmblr.net>
Date:   Thu Sep 26 15:27:23 2019 -0400

    rpcbind: Add missing includes

    On musl systems there are implicit function declaration warnings due to
    missing string.h include.

    src/pmap_svc.c: In function ‘pmapproc_change’:
    src/pmap_svc.c:225:8: warning: implicit declaration of function ‘memcmp’ [-Wimplicit-function-declaration]
       if (!memcmp(rpcbreg.r_netid, "udp6", 4) ||
            ^~~~~~
    src/pmap_svc.c: In function ‘pmap_netid2ipprot’:
    src/pmap_svc.c:408:6: warning: implicit declaration of function ‘strcmp’ [-Wimplicit-function-declaration]
      if (strcmp(netid, tcptrans) == 0)
          ^~~~~~

    src/warmstart.c: In function ‘read_struct’:
    src/warmstart.c:116:22: warning: implicit declaration of function ‘strerror’; did you mean ‘perror’? [-Wimplicit-function-declaration]
         filename, errno, strerror(errno));
                          ^~~~~~~~
                          perror

    Signed-off-by: Amadeusz Sławiński <amade@asmblr.net>
    Signed-off-by: Steve Dickson <steved@redhat.com>

commit 06a3103a871de29478e499818ef227779c1dd9a6
Author: Steve Dickson <steved@redhat.com>
Date:   Tue Aug 6 13:41:47 2019 -0400

    rpcinfo: Removed overun from src/rpcb_stat.c

    Signed-off-by: Steve Dickson <steved@redhat.com>

commit b5937e1414e1600d788fd1d689b4f64a09422d03
Author: Steve Dickson <steved@redhat.com>
Date:   Thu Sep 5 10:06:18 2019 -0400

    rpcbind: look for an exact match of the ip address for a requested service first

    the rpcbind program returns the first IP address that matches the hint
    IP, i.e.: The first interface found that is UP and on the same network
    as the hint IP address (bestmatch).
    That could be wrong if there are multiple ips in the same subnet for the
    same interface configured.

    For instance output of ip addr:
    ~> ip addr
        inet 10.xxx.xx.133/22 brd 10.xxx.xx.255 scope global mgmt   <------first ip-address which matches the hint
        inet 10.xxx.xx.147/22 scope global eth0     <----actual ip-address where nfs server is configured
        inet 10.xxx.xx.160/22 scope global secondary eth0
    ~>

    rpc mount export: RPC: Timed out
    rpc mount export: RPC: Timed out

    For multiple IP adresses in the same subnet, it should try to find an
    exact match first and only if that fails return the best match.

    Signed-off-by: Thomas Blume <thomas.blume@suse.com>
    Signed-off-by: Steve Dickson <steved@redhat.com>

commit 0bc1c0ae7ce61a7ac8a8e9a9b2086268f011abf0
Author: Steve Dickson <steved@redhat.com>
Date:   Tue Oct 9 09:19:50 2018 -0400

    rpcinfo: Fix stack buffer overflow

    *** buffer overflow detected ***: rpcinfo terminated
    ======= Backtrace: =========
    /lib64/libc.so.6(+0x721af)[0x7ff24c4451af]
    /lib64/libc.so.6(__fortify_fail+0x37)[0x7ff24c4ccdc7]
    /lib64/libc.so.6(+0xf8050)[0x7ff24c4cb050]
    rpcinfo(+0x435f)[0xef3be2635f]
    rpcinfo(+0x1c62)[0xef3be23c62]
    /lib64/libc.so.6(__libc_start_main+0xf5)[0x7ff24c3f36e5]
    rpcinfo(+0x2739)[0xef3be24739]
    ======= Memory map: ========
    ...
    The patch below fixes it.

    Reviewed-by: Chuck Lever <chuck.lever@oracle.com>
    Signed-off-by: Thomas Blume <thomas.blume@suse.com>
    Signed-off-by: Steve Dickson <steved@redhat.com>
2022-02-26 09:12:51 +00:00
heitbaum
86e13f8ac3 wpa_supplicant: update to 2.10
update 2.9 (2019-08-07) to 2.10 (2022-01-16)

ann: http://lists.infradead.org/pipermail/hostap/2022-January/040148.html
2022-02-26 09:12:51 +00:00
heitbaum
4549704a1b ethtool: update to 5.16
update 5.15 (2021-11-09) to 5.16 (2022-01-19)

Version 5.16 - January 19, 2022
	* Feature: use memory maps for module EEPROM parsing (-m)
	* Feature: show CMIS diagnostic information (-m)
	* Fix: fix dumping advertised FEC modes (--show-fec)
	* Fix: ignore cable test notifications from other devices (--cable-test)
	* Fix: do not show duplicate options in help text (--help)
2022-02-26 09:12:51 +00:00
heitbaum
416f909f07 iwd: update to 1.25
update 1.23 (2022-01-27) to 1.25 (2022-02-24)

logs:
- https://git.kernel.org/pub/scm/network/wireless/iwd.git/log/

ver 1.24:
- Fix issue with handshake and missing rekeying support.
- Fix issue with BSS ranking and zero signal strength.
- Fix issue with setting OWE IE length correctly.
2022-02-26 09:11:34 +00:00
heitbaum
2896665cae openvpn: update to 2.5.5
update from 2.5.3 (2021-06-17) to 2.5.5 (2021-12-15)

release notes:
- https://github.com/OpenVPN/openvpn/blob/release/2.5/Changes.rst
2022-02-26 09:10:52 +00:00
Rudi Heitbaum
ffea36f57f openssh: update to 8.9p1
release notes:
- https://www.openssh.com/releasenotes.html
2022-02-23 15:10:24 +00:00
Rudi Heitbaum
fd49cad5c8 wireless-regdb: update to 2022.02.18
Log (https://git.kernel.org/pub/scm/linux/kernel/git/sforshee/wireless-regdb.git/log/):

- Update regulatory rules for the Netherlands (NL) on 6GHz
- Update regulatory rules for China (CN)
- Update regulatory rules for South Korea (KR)
- Revert "wireless-regdb: Update regulatory rules for South Korea (KR)"
- Update regulatory rules for Spain (ES) on 6GHz
- add 802.11ah bands to world regulatory domain
- add support for US S1G channels
- Update regulatory rules for France (FR) on 6 and 60 GHz
- Update regulatory rules for South Korea (KR)
- Update regulatory rules for Croatia (HR) on 6GHz
- Raise DFS TX power limit to 250 mW (24 dBm) for the US
2022-02-19 01:50:24 +00:00
Rudi Heitbaum
d431e8865a wireless-regdb: update to 2022.02.18
Log (https://git.kernel.org/pub/scm/linux/kernel/git/sforshee/wireless-regdb.git/log/):

- Update regulatory rules for the Netherlands (NL) on 6GHz
- Update regulatory rules for China (CN)
- Update regulatory rules for South Korea (KR)
- Revert "wireless-regdb: Update regulatory rules for South Korea (KR)"
- Update regulatory rules for Spain (ES) on 6GHz
- add 802.11ah bands to world regulatory domain
- add support for US S1G channels
- Update regulatory rules for France (FR) on 6 and 60 GHz
- Update regulatory rules for South Korea (KR)
- Update regulatory rules for Croatia (HR) on 6GHz
- Raise DFS TX power limit to 250 mW (24 dBm) for the US
2022-02-19 01:49:52 +00:00
CvH
25c2698364
Merge pull request #5644 from boot2k3/master
libnfs: update to 5.0.1
2022-02-03 17:49:51 +01:00
CvH
1808f92226
Merge pull request #6094 from heitbaum/rpath-so
Remove libtool preserved temporary RPATH/RUNPATH from "shared object" ELF binaries (libraries/executables)
2022-02-03 17:44:55 +01:00
CvH
875334be33
Merge pull request #6088 from heitbaum/iwd2
Update iwd to 1.23 and connman to 1.41
2022-02-03 17:43:36 +01:00
Dmitry_L
10eb9e351a libnfs: update to 5.0.1
This commit below required more updated libnfs than 4.0.0
https://github.com/xbmc/xbmc/pull/17512
2022-02-01 18:40:21 +03:00
heitbaum
bf99162267 samba: update to 4.13.17
update 4.13.15 (2021-12-15) to 4.13.17 (2022-01-31)

release notes:
- https://www.samba.org/samba/history/samba-4.13.16.html
- https://www.samba.org/samba/security/CVE-2021-43566.html
- https://www.samba.org/samba/history/samba-4.13.17.html
2022-02-01 10:33:15 +00:00
heitbaum
b43721da58 samba: update to 4.13.17
release notes:
- https://www.samba.org/samba/history/samba-4.13.17.html

                   ===============================
                   Release Notes for Samba 4.13.17
                          January 31, 2022
                   ===============================

This is a security release in order to address the following defects:

o CVE-2021-44142: Out-of-Bound Read/Write on Samba vfs_fruit module.
                  https://www.samba.org/samba/security/CVE-2021-44142.html

o CVE-2022-0336:  Re-adding an SPN skips subsequent SPN conflict checks.
                  https://www.samba.org/samba/security/CVE-2022-0336.html

Changes since 4.13.16
---------------------

o  Ralph Boehme <slow@samba.org>
   * BUG 14914: CVE-2021-44142

o  Joseph Sutton <josephsutton@catalyst.net.nz>
   * BUG 14950: CVE-2022-0336
2022-02-01 10:32:45 +00:00
heitbaum
1e1f7c5710 connman: update to 1.41 2022-01-28 20:19:36 +00:00
heitbaum
0011c4d3e9 iwd: update to 1.23 2022-01-28 20:15:21 +00:00
heitbaum
f4d1416b7c connman: remove RPATH 2022-01-23 21:39:17 +00:00
heitbaum
edbe9d8fe9 bluez: remove RPATH 2022-01-23 21:39:17 +00:00
heitbaum
254219ed6e iptables: remove RPATH 2022-01-23 21:39:17 +00:00
heitbaum
ac480ad8d7 avahi: remove RPATH 2022-01-23 21:39:17 +00:00
heitbaum
e49d784342 samba: update to 4.13.16
update 4.13.15 (2021-12-15) to 4.13.16 (2022-01-10)

release notes:
- https://www.samba.org/samba/history/samba-4.13.16.html
- https://www.samba.org/samba/security/CVE-2021-43566.html
2022-01-12 10:39:53 +00:00
Wic
e2dac9d3c8
Update bluetoothd service capability
Add CAP_FOWNER for fix problem with save paired device into /storage/.cache/bluetooth/
2022-01-02 13:16:39 +07:00
heitbaum
3de1b95301 samba: update to 4.13.15
release notes:
- https://www.samba.org/samba/history/samba-4.13.15.html
2021-12-28 10:25:22 +00:00
heitbaum
ec45ff05c6 samba: update to 4.13.15
release notes:
- https://www.samba.org/samba/history/samba-4.13.15.html
2021-12-28 10:23:58 +00:00
Jernej Skrabec
6c1cc07900 bluez: install empty bluez.pc
This is needed to convience pulseaudio that bluez is present.
2021-12-08 22:17:13 +01:00
CvH
629317df2a
Merge pull request #5939 from SupervisedThinking/bluez
[le11] bluez: update to 5.62
2021-12-08 12:01:06 +01:00
heitbaum
c2d6efc729 samba: add libunwind as a target dependency 2021-12-05 08:30:21 +00:00
SupervisedThinking
fa45dcd946 bluez: update to 5.62
- add configure opt to disable manpages
- drop upstreamed patch
2021-12-02 18:19:08 +01:00
heitbaum
7104aa63d7 ethtool: update to 5.15 2021-11-28 11:56:56 +00:00
Christian Hewitt
54d91c1f0e sshpass: fix build on x86_64 2021-11-23 05:46:45 +00:00
Christian Hewitt
609799474b sshpass: fix build on x86_64 2021-11-23 05:44:23 +00:00
heitbaum
423cf56047 iw: update to 5.16 2021-11-20 15:27:54 +11:00
heitbaum
dec5a9460f iwd: update to 1.20 2021-11-20 15:27:49 +11:00
CvH
8bc9c42568
Merge pull request #5850 from chewitt/sshpass-10
sshpass: add initial package and include with network-tools bundle
2021-11-15 12:51:31 +01:00
heitbaum
cc26aa21c4 samba: update to 4.13.14
update 4.13.13 (2021-10-29) to 4.13.14 (2021-11-09)

release notes: https://www.samba.org/samba/history/samba-4.13.14.html

                   ===============================
                   Release Notes for Samba 4.13.14
                           November 9, 2021
                   ===============================

This is a security release in order to address the following defects:

o CVE-2016-2124:  SMB1 client connections can be downgraded to plaintext
                  authentication.
                  https://www.samba.org/samba/security/CVE-2016-2124.html

o CVE-2020-25717: A user on the domain can become root on domain members.
                  https://www.samba.org/samba/security/CVE-2020-25717.html
                  (PLEASE READ! There are important behaviour changes described)

o CVE-2020-25718: Samba AD DC did not correctly sandbox Kerberos tickets issued
                  by an RODC.
                  https://www.samba.org/samba/security/CVE-2020-25718.html

o CVE-2020-25719: Samba AD DC did not always rely on the SID and PAC in Kerberos
                  tickets.
                  https://www.samba.org/samba/security/CVE-2020-25719.html

o CVE-2020-25721: Kerberos acceptors need easy access to stable AD identifiers
                  (eg objectSid).
                  https://www.samba.org/samba/security/CVE-2020-25721.html

o CVE-2020-25722: Samba AD DC did not do suffienct access and conformance
                  checking of data stored.
                  https://www.samba.org/samba/security/CVE-2020-25722.html

o CVE-2021-3738:  Use after free in Samba AD DC RPC server.
                  https://www.samba.org/samba/security/CVE-2021-3738.html

o CVE-2021-23192: Subsequent DCE/RPC fragment injection vulnerability.
                  https://www.samba.org/samba/security/CVE-2021-23192.html

Changes since 4.13.13
---------------------

o  Douglas Bagnall &lt;douglas.bagnall@catalyst.net.nz&gt;
   * CVE-2020-25722

o  Andrew Bartlett &lt;abartlet@samba.org&gt;
   * CVE-2020-25718
   * CVE-2020-25719
   * CVE-2020-25721
   * CVE-2020-25722

o  Ralph Boehme &lt;slow@samba.org&gt;
   * CVE-2020-25717

o  Alexander Bokovoy &lt;ab@samba.org&gt;
   * CVE-2020-25717

o  Samuel Cabrero &lt;scabrero@samba.org&gt;
   * CVE-2020-25717

o  Nadezhda Ivanova &lt;nivanova@symas.com&gt;
   * CVE-2020-25722

o  Stefan Metzmacher &lt;metze@samba.org&gt;
   * CVE-2016-2124
   * CVE-2020-25717
   * CVE-2020-25719
   * CVE-2020-25722
   * CVE-2021-23192
   * CVE-2021-3738
   * ldb: version 2.2.3

o  Andreas Schneider &lt;asn@samba.org&gt;
   * CVE-2020-25719

o  Joseph Sutton &lt;josephsutton@catalyst.net.nz&gt;
   * CVE-2020-17049
   * CVE-2020-25718
   * CVE-2020-25719
   * CVE-2020-25721
   * CVE-2020-25722
   * MS CVE-2020-17049
2021-11-10 18:52:49 +11:00
heitbaum
7af3568bd9 samba: update to 4.13.14
update 4.13.13 (2021-10-29) to 4.13.14 (2021-11-09)

release notes: https://www.samba.org/samba/history/samba-4.13.14.html

                   ===============================
                   Release Notes for Samba 4.13.14
                           November 9, 2021
                   ===============================

This is a security release in order to address the following defects:

o CVE-2016-2124:  SMB1 client connections can be downgraded to plaintext
                  authentication.
                  https://www.samba.org/samba/security/CVE-2016-2124.html

o CVE-2020-25717: A user on the domain can become root on domain members.
                  https://www.samba.org/samba/security/CVE-2020-25717.html
                  (PLEASE READ! There are important behaviour changes described)

o CVE-2020-25718: Samba AD DC did not correctly sandbox Kerberos tickets issued
                  by an RODC.
                  https://www.samba.org/samba/security/CVE-2020-25718.html

o CVE-2020-25719: Samba AD DC did not always rely on the SID and PAC in Kerberos
                  tickets.
                  https://www.samba.org/samba/security/CVE-2020-25719.html

o CVE-2020-25721: Kerberos acceptors need easy access to stable AD identifiers
                  (eg objectSid).
                  https://www.samba.org/samba/security/CVE-2020-25721.html

o CVE-2020-25722: Samba AD DC did not do suffienct access and conformance
                  checking of data stored.
                  https://www.samba.org/samba/security/CVE-2020-25722.html

o CVE-2021-3738:  Use after free in Samba AD DC RPC server.
                  https://www.samba.org/samba/security/CVE-2021-3738.html

o CVE-2021-23192: Subsequent DCE/RPC fragment injection vulnerability.
                  https://www.samba.org/samba/security/CVE-2021-23192.html

Changes since 4.13.13
---------------------

o  Douglas Bagnall &lt;douglas.bagnall@catalyst.net.nz&gt;
   * CVE-2020-25722

o  Andrew Bartlett &lt;abartlet@samba.org&gt;
   * CVE-2020-25718
   * CVE-2020-25719
   * CVE-2020-25721
   * CVE-2020-25722

o  Ralph Boehme &lt;slow@samba.org&gt;
   * CVE-2020-25717

o  Alexander Bokovoy &lt;ab@samba.org&gt;
   * CVE-2020-25717

o  Samuel Cabrero &lt;scabrero@samba.org&gt;
   * CVE-2020-25717

o  Nadezhda Ivanova &lt;nivanova@symas.com&gt;
   * CVE-2020-25722

o  Stefan Metzmacher &lt;metze@samba.org&gt;
   * CVE-2016-2124
   * CVE-2020-25717
   * CVE-2020-25719
   * CVE-2020-25722
   * CVE-2021-23192
   * CVE-2021-3738
   * ldb: version 2.2.3

o  Andreas Schneider &lt;asn@samba.org&gt;
   * CVE-2020-25719

o  Joseph Sutton &lt;josephsutton@catalyst.net.nz&gt;
   * CVE-2020-17049
   * CVE-2020-25718
   * CVE-2020-25719
   * CVE-2020-25721
   * CVE-2020-25722
   * MS CVE-2020-17049
2021-11-10 18:52:34 +11:00
Christian Hewitt
ab02de77da sshpass: add initial package 2021-11-06 07:36:05 +00:00
Christian Hewitt
b3c98526cc sshpass: add initial package 2021-11-05 09:43:59 +00:00
Tomáš Kelemen (vudiq)
f4f61ac3d9
Merge LibreELEC 10.0.1 2021-11-03 13:03:34 +01:00
heitbaum
c877b53887 samba: update to 4.13.13
update 4.13.12 (2021-09-22) to 4.13.13 (2021-10-29)

release notes:
- https://www.samba.org/samba/history/samba-4.13.13.html

Changes since 4.13.12
---------------------

o  Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
   * BUG 14868: rodc_rwdc test flaps.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with
     embedded Heimdal.
   * BUG 14836: Python ldb.msg_diff() memory handling failure.
   * BUG 14845: "in" operator on ldb.Message is case sensitive.
   * BUG 14848: Release LDB 2.3.1 for Samba 4.14.9.
   * BUG 14871: Fix Samba support for UF_NO_AUTH_DATA_REQUIRED.
   * BUG 14874: Allow special chars like "@" in samAccountName when generating
     the salt.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Isaac Boukris <iboukris@gmail.com>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Viktor Dukhovni <viktor@twosigma.com>
   * BUG 12998: Fix transit path validation.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Luke Howard <lukeh@padl.com>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  David Mulder <dmulder@suse.com>
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Andreas Schneider <asn@samba.org>
   * BUG 14870: Prepare to operate with MIT krb5 >= 1.20.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Joseph Sutton <josephsutton@catalyst.net.nz>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal.
   * BUG 14645: rpcclient NetFileEnum and net rpc file both cause lock order
     violation: brlock.tdb, share_entries.tdb.
   * BUG 14836: Python ldb.msg_diff() memory handling failure.
   * BUG 14845: "in" operator on ldb.Message is case sensitive.
   * BUG 14848: Release LDB 2.3.1 for Samba 4.14.9.
   * BUG 14868: rodc_rwdc test flaps.
   * BUG 14871: Fix Samba support for UF_NO_AUTH_DATA_REQUIRED.
   * BUG 14874: Allow special chars like "@" in samAccountName when generating
     the salt.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Nicolas Williams <nico@twosigma.com>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.
2021-10-30 13:03:27 +11:00
heitbaum
4be46be119 samba: update to 4.13.13
update 4.13.12 (2021-09-22) to 4.13.13 (2021-10-29)

release notes:
- https://www.samba.org/samba/history/samba-4.13.13.html

Changes since 4.13.12
---------------------

o  Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
   * BUG 14868: rodc_rwdc test flaps.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with
     embedded Heimdal.
   * BUG 14836: Python ldb.msg_diff() memory handling failure.
   * BUG 14845: "in" operator on ldb.Message is case sensitive.
   * BUG 14848: Release LDB 2.3.1 for Samba 4.14.9.
   * BUG 14871: Fix Samba support for UF_NO_AUTH_DATA_REQUIRED.
   * BUG 14874: Allow special chars like "@" in samAccountName when generating
     the salt.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Isaac Boukris <iboukris@gmail.com>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Viktor Dukhovni <viktor@twosigma.com>
   * BUG 12998: Fix transit path validation.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Luke Howard <lukeh@padl.com>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  David Mulder <dmulder@suse.com>
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Andreas Schneider <asn@samba.org>
   * BUG 14870: Prepare to operate with MIT krb5 >= 1.20.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Joseph Sutton <josephsutton@catalyst.net.nz>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal.
   * BUG 14645: rpcclient NetFileEnum and net rpc file both cause lock order
     violation: brlock.tdb, share_entries.tdb.
   * BUG 14836: Python ldb.msg_diff() memory handling failure.
   * BUG 14845: "in" operator on ldb.Message is case sensitive.
   * BUG 14848: Release LDB 2.3.1 for Samba 4.14.9.
   * BUG 14868: rodc_rwdc test flaps.
   * BUG 14871: Fix Samba support for UF_NO_AUTH_DATA_REQUIRED.
   * BUG 14874: Allow special chars like "@" in samAccountName when generating
     the salt.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.

o  Nicolas Williams <nico@twosigma.com>
   * BUG 14642: Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze
     bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal.
   * BUG 14881: Backport bronze bit fixes, tests, and selftest improvements.
2021-10-30 13:02:27 +11:00
CvH
56f5485fbd
Merge pull request #5803 from mglae/le11_wsdd2_initial
wsdd2: initial package v1.8.6
2021-10-27 12:23:45 +02:00
GavinDarkglider
4d58d3cf00
Add support for Nintendo Switch (#1536) 2021-10-27 09:47:55 +02:00
mglae
d38aac52a4 wsdd2: initial package v1.8.6 2021-10-26 18:29:51 +02:00
heitbaum
840b8b873a openssh: update to 8.8p1
update 8.6p1 to 8.8p1

changelog:
- https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/ChangeLog

release notes:
- https://www.openssh.com/releasenotes.html
2021-10-17 08:43:43 +11:00
Ntemis
37054d13df bluez: enable FastConnectable for Lakka
port of 7e5e5c5bfa
2021-10-15 08:28:37 +02:00
Dmitry_L
c26eca3b7c
rpcbind: NFS discovery fix
After update to 1.2.5 NFS servers discovery doesn't work anymore.
In this build added a new configuration flag --enable-rmtcalls which will be needed to enable the remote call functionality.
2021-10-10 17:41:17 +03:00
Dmitry_L
5ad630caeb
rpcbind: NFS discovery fix
After update to 1.2.5 NFS servers discovery doesn't work anymore.
In this build added a new configuration flag --enable-rmtcalls which will be needed to enable the remote call functionality.
2021-10-10 17:08:32 +03:00
heitbaum
654542e76e samba: update to 4.13.12
release notes:
- https://www.samba.org/samba/history/samba-4.13.12.html
2021-10-02 22:18:00 +10:00
heitbaum
5cf5025376 samba: update to 4.13.12
release notes:
- https://www.samba.org/samba/history/samba-4.13.12.html
2021-10-02 22:17:12 +10:00