summaryrefslogtreecommitdiffstats
path: root/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb
Commit message (Collapse)AuthorAgeFilesLines
* samba upgrade 4.14.14 -> 4.17.4Yi Zhao2023-01-011-352/+0
| | | | | | | | | | | | | | | | | | | | | | The 4.14.x is EOL: https://wiki.samba.org/index.php/Samba_Release_Planning Upgrade to latest 4.17.x. Release Notes: https://www.samba.org/samba/history/samba-4.17.0.html https://www.samba.org/samba/history/samba-4.17.4.html * Refresh patches * Update PACKAGECONFIG * Split a new package ctdb * Add a patch to skip checking PYTHONHASHSEED * Drop the following patches as these issues have been fixed upstream: 0005-samba-build-dnsserver_common-code.patch netdb_defines.patch samba-fix-musl-lib-without-innetgr.patch Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* samba: Fix install conflict with multilib enabled.leimaohui2022-11-071-0/+1
| | | | | Signed-off-by: Lei Maohui <leimaohui@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* samba: Fix warnings in configure tests for rpath checksKhem Raj2022-08-281-0/+3
| | | | | | | | | Add a patch to avoid implicit-function-declaration warnings, they will soon become errors with clang 15+ set path for privatelibdir Signed-off-by: Khem Raj <raj.khem@gmail.com>
* samba: fix buildpaths issueYi Zhao2022-08-271-0/+1
| | | | | | | | | | | | | | | | | | The test case tfork_cmd_send in smbtorture fails on target as it requries a script located in the source directory: $ smbtorture ncalrpc:localhost local.tfork.tfork_cmd_send test: tfork_cmd_send /buildarea/build/tmp/work/core2-64-poky-linux/samba/4.14.14-r0/samba-4.14.14/testprogs/blackbox/tfork.sh: Failed to exec child - No such file or directory This also triggers the buildpaths warning: QA Issue: File /usr/bin/smbtorture in package samba-testsuite contains reference to TMPDIR [buildpaths] Skip this test case in smbtorture to avoid the warning. Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* samba: upgrade 4.14.13 -> 4.14.14Yi Zhao2022-08-251-0/+347
This is a security release in order to address the following defects: CVE-2022-2031: Samba AD users can bypass certain restrictions associated with changing passwords. https://www.samba.org/samba/security/CVE-2022-2031.html CVE-2022-32744: Samba AD users can forge password change requests for any user. https://www.samba.org/samba/security/CVE-2022-32744.html CVE-2022-32745: Samba AD users can crash the server process with an LDAP add or modify request. https://www.samba.org/samba/security/CVE-2022-32745.html CVE-2022-32746: Samba AD users can induce a use-after-free in the server process with an LDAP add or modify request. https://www.samba.org/samba/security/CVE-2022-32746.html CVE-2022-32742: Server memory information leak via SMB1. https://www.samba.org/samba/security/CVE-2022-32742.html Release Notes: https://www.samba.org/samba/history/samba-4.14.14.html Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>