* Downgrade glibc to 2.27 for L4T Builds.
* Downgrade binutils to 2.32 for L4T Builds.
* Update L4T Project Options
* Refactor tegra-bsp package
* Import/Rebase CTC's ffmpeg patches, and switch decoder to nvv4l2 from nvmpi. Fixes decoder issues
* Enable all disabled cores
* Remove hack in busybox package to dump firmware into L4T Builds, we now handle this in tegra-bsp package.
* More L4T project cleanups
* Bring switch-bootloader package.mk inline with upstream formatting
* Fix reboot_payload
* Add proper tegra-bsp:init support
* Bootloader cleanups, seperate bootloader stuff for libreelec builds
* Update init for supporting all distros on Nintendo Switch
* Add proper splash images for libreelec builds.
* Final bootloader fixes
* switch-bootloader-merge-fixes
* Fix uboot merge issues
* fix bmp
* It all builds
* add Basic USB Gadget(Serial console only)
* Properly fix mtp, and finish gadget stuff
update 1.49.1 (2021-09-02) to 1.49.3 (2021-11-09)
news:
Overview of changes in 1.49.2
=============================
* Update Unicode data to Unicode 14
* Fix underlining of spaces
* Round font metrics when appropriate
* Fix some corner cases of cursor positioning
* Handle Catalan middle-dot in text segmentation
Overview of changes in 1.49.3
=============================
* Fix hinting of glyph metrics
* Fix logical glyph extents in vertical gravities
* Visualize more default-ignorable glyphs
* Fix advance widths in transformed contexts
* Implement Small Caps and other casing variations
* remove old license headers
* remove obsolete PKG_ vars
* switch-coreboot|u-boot: use full commit sha (due to new get_git)
* switch-cpu|gpu-profile: fix dependencies and toolchain
due to shallow clone the tag cannot be retrieved, but can be passed as
env. the tag of the libretro-fork has not changed for a long time, so it
is safe to keep it hard-coded in the package.mk.
preserves space, tarballs can be reused if the package repository gets
nuked or the commit disappears from the history (e.g. in case of a
forced pushed)
* use full lenght commit hash (for future get_git)
* core_info: use Makefile to install files
* glsl_shaders: remove toolchain from dependencies
* libretro_database: store cheats in original location
* retroarch: rebase patch: bluetooth pairing removal
* retroarch_assets: remove toolchain and fontconfig from dependencies
* retroarch_joypad_autoconfig: remove toolchain from dependencies
* retroarch_overlays: use Makefile to install files
* slang_shaders: remove toolchain from dependencies
* Lakka/smb.conf: remove Cheats share
* retroarch: remove cheat overlay mount
RTL drivers require some fixes for Linux 5.15
Systemd has also some issues due to changes in headers (on 5.15)
While at this, bump Mesa minor release for some extra panfrost fixes
update 4.13.13 (2021-10-29) to 4.13.14 (2021-11-09)
release notes: https://www.samba.org/samba/history/samba-4.13.14.html
===============================
Release Notes for Samba 4.13.14
November 9, 2021
===============================
This is a security release in order to address the following defects:
o CVE-2016-2124: SMB1 client connections can be downgraded to plaintext
authentication.
https://www.samba.org/samba/security/CVE-2016-2124.html
o CVE-2020-25717: A user on the domain can become root on domain members.
https://www.samba.org/samba/security/CVE-2020-25717.html
(PLEASE READ! There are important behaviour changes described)
o CVE-2020-25718: Samba AD DC did not correctly sandbox Kerberos tickets issued
by an RODC.
https://www.samba.org/samba/security/CVE-2020-25718.html
o CVE-2020-25719: Samba AD DC did not always rely on the SID and PAC in Kerberos
tickets.
https://www.samba.org/samba/security/CVE-2020-25719.html
o CVE-2020-25721: Kerberos acceptors need easy access to stable AD identifiers
(eg objectSid).
https://www.samba.org/samba/security/CVE-2020-25721.html
o CVE-2020-25722: Samba AD DC did not do suffienct access and conformance
checking of data stored.
https://www.samba.org/samba/security/CVE-2020-25722.html
o CVE-2021-3738: Use after free in Samba AD DC RPC server.
https://www.samba.org/samba/security/CVE-2021-3738.html
o CVE-2021-23192: Subsequent DCE/RPC fragment injection vulnerability.
https://www.samba.org/samba/security/CVE-2021-23192.html
Changes since 4.13.13
---------------------
o Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
* CVE-2020-25722
o Andrew Bartlett <abartlet@samba.org>
* CVE-2020-25718
* CVE-2020-25719
* CVE-2020-25721
* CVE-2020-25722
o Ralph Boehme <slow@samba.org>
* CVE-2020-25717
o Alexander Bokovoy <ab@samba.org>
* CVE-2020-25717
o Samuel Cabrero <scabrero@samba.org>
* CVE-2020-25717
o Nadezhda Ivanova <nivanova@symas.com>
* CVE-2020-25722
o Stefan Metzmacher <metze@samba.org>
* CVE-2016-2124
* CVE-2020-25717
* CVE-2020-25719
* CVE-2020-25722
* CVE-2021-23192
* CVE-2021-3738
* ldb: version 2.2.3
o Andreas Schneider <asn@samba.org>
* CVE-2020-25719
o Joseph Sutton <josephsutton@catalyst.net.nz>
* CVE-2020-17049
* CVE-2020-25718
* CVE-2020-25719
* CVE-2020-25721
* CVE-2020-25722
* MS CVE-2020-17049
* retroarch: rebase patch for cpufreq/disable on switch
* retroarch: remove patch merged upstream (define for nightly)
* fbneo: add highscore.dat to system
* gpsp: disable dynarec on aarch64
* mame2003-plus: add artwork, cheat.dat and history.dat to system
* slang-shaders: add to all targets, not only for vulkan