packages/net/samba4/patches
Michael Peleshenko 604604a667
samba4: update to 4.17.5
* update to 4.17.5
* changelog: https://www.samba.org/samba/history/samba-4.17.5
* refresh patch

* CVE-2022-42898: Samba's Kerberos libraries and AD DC failed to guard against integer overflows when parsing a PAC on a 32-bit system, which allowed an attacker with a forged PAC to corrupt the heap.
 https://www.samba.org/samba/security/CVE-2022-42898.html

* CVE-2022-37966: This is the Samba CVE for the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.

  A Samba Active Directory DC will issue weak rc4-hmac session keys for use between modern clients and servers despite all modern Kerberos implementations supporting the aes256-cts-hmac-sha1-96 cipher.

  On Samba Active Directory DCs and members 'kerberos encryption types = legacy' would force rc4-hmac as a client even if the server supports aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96.
  https://www.samba.org/samba/security/CVE-2022-37966.html

* CVE-2022-37967: This is the Samba CVE for the Windows Kerberos Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.

  A service account with the special constrained delegation permission could forge a more powerful ticket than the one it was presented with.
  https://www.samba.org/samba/security/CVE-2022-37967.html

* CVE-2022-38023: The "RC4" protection of the NetLogon Secure channel uses the same algorithms as rc4-hmac cryptography in Kerberos, and so must also be assumed to be weak.
  https://www.samba.org/samba/security/CVE-2022-38023.html

* BUG 15210: synthetic_pathref AFP_AfpInfo failed errors.
  This resolves errors logged during macOS TimeMachine backups.
  https://bugzilla.samba.org/show_bug.cgi?id=15210

Signed-off-by: Michael Peleshenko <mpeleshenko@gmail.com>
2023-03-08 20:19:08 -05:00
..
003-getpwent_r.patch treewide: Run refresh on all packages 2021-02-20 16:02:15 -08:00
004-missing-headers.patch treewide: Run refresh on all packages 2021-02-20 16:02:15 -08:00
005-musl_uintptr.patch treewide: Run refresh on all packages 2021-02-20 16:02:15 -08:00
007-libldb-fix-musl-libc-unkown-type-error.patch samba4: remove duplicate entry from libldb-fix-musl-libc-unkown-type-error.patch 2022-10-07 01:53:26 -07:00
008-samba-4.11-add_missing___compar_fn_t.patch samba4: update to 4.14.5 2021-06-27 15:32:34 +02:00
009-samba-4-11-fix-host-tools-checks.patch.patch samba4: update to 4.17.0 2022-10-07 01:53:26 -07:00
010-samba-4-12-fix-musl_missing__nss_buflen_passwd.patch samba4: update to 4.17.0 2022-10-07 01:53:26 -07:00
011-samba-4-14-disable-python-module-host-check.patch samba4: update to 4.17.0 2022-10-07 01:53:26 -07:00
020-source3-msgsock-nvram-fix.patch samba4: update to 4.17.0 2022-10-07 01:53:26 -07:00
021-source4-msgsock-nvram-fix.patch samba4: update to 4.17.5 2023-03-08 20:19:08 -05:00
101-do-not-check-xsltproc-manpages.patch samba4: update to 4.14.11; fix AD_DC build 2022-01-28 12:09:09 -08:00
102-samba-4.11-unbundle-libbsd.patch samba4: update to 4.17.0 2022-10-07 01:53:26 -07:00
103-samba-4.12-unbundle-libunwind.patch samba4: update to 4.17.0 2022-10-07 01:53:26 -07:00
104-samba-4.12-unbundle-icu.patch treewide: Run refresh on all packages 2021-02-20 16:02:15 -08:00
105-perl-json-pp.patch samba4: update to 4.17.0 2022-10-07 01:53:26 -07:00