diff options
Diffstat (limited to 'main/samba/APKBUILD')
-rw-r--r-- | main/samba/APKBUILD | 45 |
1 files changed, 44 insertions, 1 deletions
diff --git a/main/samba/APKBUILD b/main/samba/APKBUILD index a9efcd5780..2301bbde88 100644 --- a/main/samba/APKBUILD +++ b/main/samba/APKBUILD @@ -1,7 +1,7 @@ # Maintainer: Natanael Copa <ncopa@alpinelinux.org> pkgname=samba pkgver=4.7.6 -pkgrel=0 +pkgrel=1 pkgdesc="Tools to access a server's filespace and printers via SMB" url="http://www.samba.org" arch="all" @@ -50,6 +50,25 @@ source="https://us1.samba.org/samba/ftp/stable/$pkgname-$pkgver.tar.gz musl_uintptr.patch netdb-defines.patch netapp.patch + 0001-CVE-2018-1139-libcli-auth-Do-not-allow-ntlmv1-over-S.patch + 0002-CVE-2018-1139-libcli-auth-fix-debug-messages-in-hash.patch + 0003-CVE-2018-1139-s3-utils-use-enum-ntlm_auth_level-in-n.patch + 0004-CVE-2018-1139-selftest-verify-whether-ntlmv1-can-be-.patch + 0005-CVE-2018-1139-libcli-auth-Add-initial-tests-for-ntlm.patch + 0001-CVE-2018-10858-libsmb-Ensure-smbc_urlencode-can-t-ov.patch + 0002-CVE-2018-10858-libsmb-Harden-smbc_readdir_internal-a.patch + 0001-CVE-2018-10918-cracknames-Fix-DoS-NULL-pointer-de-re.patch + 0001-CVE-2018-10919-security-Move-object-specific-access-.patch + 0002-CVE-2018-10919-security-Add-more-comments-to-the-obj.patch + 0003-CVE-2018-10919-tests-Add-tests-for-guessing-confiden.patch + 0004-CVE-2018-10919-tests-Add-test-case-for-object-visibi.patch + 0005-CVE-2018-10919-security-Fix-checking-of-object-speci.patch + 0006-CVE-2018-10919-tests-test-ldap-searches-for-non-exis.patch + 0007-CVE-2018-10919-acl_read-Split-access_mask-logic-out-.patch + 0008-CVE-2018-10919-acl_read-Small-refactor-to-aclread_ca.patch + 0009-CVE-2018-10919-acl_read-Flip-the-logic-in-the-dirsyn.patch + 0010-CVE-2018-10919-acl_read-Fix-unauthorized-attribute-a.patch + 0011-CVE-2018-10919-tests-Add-extra-test-for-dirsync-dele.patch $pkgname.initd $pkgname.confd @@ -59,6 +78,11 @@ pkggroups="winbind" builddir="$srcdir/$pkgname-$pkgver" # secfixes: +# 4.7.6-r1: +# - CVE-2018-1139 +# - CVE-2018-10858 +# - CVE-2018-10918 +# - CVE-2018-10919 # 4.7.6-r0: # - CVE-2018-1050 # - CVE-2018-1057 @@ -518,6 +542,25 @@ b43809d7ecbf3968f5154c2ded6ed47dae36921f1895ea98bcce50557eb2ad39b736345ffb421465 a99e771f28d787dc22e832b97aa48a1c5e13ddc0c030c501a3c12819ff6e62800ef084b62930abe88c6767d785d5c37e2e9f18a4f9a24f2ee1f5d9650320c556 musl_uintptr.patch 1854577d0e4457e27da367a6c7ec0fb5cfd63cefea0a39181c9d6e78cf8d3eb50878cdddeea3daeec955d00263151c2f86ea754ff4276ef98bc52c0276d9ffe8 netdb-defines.patch 202667cb0383414d9289cd67574f5e1140c9a0ff63bb82a746a59b2397a00db15654bfb30cb5ec1cd68a097899be0f849d9aab4c0d210152386c9e66c640f0c0 netapp.patch +4ab899af4dd7de4f95601a41d30786d2236bbbae1f8f8e1b8cb4e81a65d2548f433420947611cd0c79b4eabb45567c215f07ab6fc71fa4ad92b803e32c127b44 0001-CVE-2018-1139-libcli-auth-Do-not-allow-ntlmv1-over-S.patch +89f43f3222bcd935fff63b73b140bdb6ec6b89fa67d25ffd1278a70355f89e8ee045902f4c11330ea853cff5e86ae493e39867a75cbfac4222453b251fd4f4f3 0002-CVE-2018-1139-libcli-auth-fix-debug-messages-in-hash.patch +393a46570e402218050b116238af892e17db19ff305c32dddc9f01b9584cdcbce26e15699d30d79f7c9a5eeba77faa1d8100e6b89f33c8a921202bd5e674bd77 0003-CVE-2018-1139-s3-utils-use-enum-ntlm_auth_level-in-n.patch +d9399568976324f24e5886185c533461f8fbd14cd3494a1ca02acf9d624ced2206669d413c0676f85e24e1d84f80d095cf894ddef8e3b698d8a9eccf784d206f 0004-CVE-2018-1139-selftest-verify-whether-ntlmv1-can-be-.patch +541b8bc3b7b52a25f0cc6a5b5e9564bcd4c69c17c5d79dc60de5e85d7312cb0015ff13fb85f08f40149561f0d1fc4b1d599cfcb4962a286e7e00a0366cc88d97 0005-CVE-2018-1139-libcli-auth-Add-initial-tests-for-ntlm.patch +1d817f4253f4081da69acf2443372f264b4d59486efb9f99bf4e355fe61c97f562d49ef62f429483aa88d55811974f29f6155c55a91bd51ae1105c7ae062d14a 0001-CVE-2018-10858-libsmb-Ensure-smbc_urlencode-can-t-ov.patch +076967a0d311dde58fff9b2b295728af8df60c9aac426771ade60dd0dd47eff8dbceb2ed07ba70701cc11a3ed63b681e85c511962f0d956a1d7ea736206b2032 0002-CVE-2018-10858-libsmb-Harden-smbc_readdir_internal-a.patch +fb5500c2bd10f2a7beb19004e97d2360d8980b3d64524a43debb49fd40143f8e1c3477349b4c2f52f0caa99335f8f429b771d76b29e54715cef3ff3ca28f8789 0001-CVE-2018-10918-cracknames-Fix-DoS-NULL-pointer-de-re.patch +fb239ab76d9cb818dc02218f0b455678893b550deb7923588b1be7e6214d733cfbbd6833b638606bbc0bbf6f9716f8d972732d8b4caacee5ea2ee9c3c4e0ba3b 0001-CVE-2018-10919-security-Move-object-specific-access-.patch +74989701e3f8c037b1fa0183d382707deded90c2870a084f62c6bf22845c0bf81d1c9ab847a1a8820b7fee6bfb2f29c99e6066399c054f6444dbe83b2a0feb77 0002-CVE-2018-10919-security-Add-more-comments-to-the-obj.patch +31a2b079f7e3043ce4cfa96336f7eecb8a616881ddb267ab92b8009e19a2b342568ab70e84202637b9dbf5d39ff39d76bbfed5b1b934f87af7a8fef064d9b9a8 0003-CVE-2018-10919-tests-Add-tests-for-guessing-confiden.patch +c81d508f6fdffc8830c3d4d69e3ce1f03070cd6a19cc59c44b0ade1bd7038a972b039911f19e385e282d08763f5306d1c6d164c7c0a1625bfb6b0fb2e03e32e5 0004-CVE-2018-10919-tests-Add-test-case-for-object-visibi.patch +b5e73fa0e114a8c388b56b46d373dd821aecab942c409421afaca26aeeb85f14ca42db9fda88e03dcbdb8a016e92723a7526029fc1f392a894ac543a586a63f9 0005-CVE-2018-10919-security-Fix-checking-of-object-speci.patch +9547e2cc039845c9d2679e4028a9a23ddd9c809e8ec28d9da60449f2d417ba3a192101789bd9f72a8ce6e5215bb0f5a562c732a710b0b4fa38add37a4fb475e3 0006-CVE-2018-10919-tests-test-ldap-searches-for-non-exis.patch +5d2bcb47aa0840a1e18d3490b4e366a8d7ff67b6ac410f7d9c96b142d874f3763ae1a39a417283819be8de84c0d92f4ba31e5485417ce7e3717997888bcb8f22 0007-CVE-2018-10919-acl_read-Split-access_mask-logic-out-.patch +54bf2a43eb760b735eeefdce969a4e8fb30dd56d7c816dd7bb494feb8af648a686fa18eabe33db1a15bfbff4b3c98ae339752050a6da70c201bc2acbf0f41c57 0008-CVE-2018-10919-acl_read-Small-refactor-to-aclread_ca.patch +c317f5338a612906a3765ee69e3f487f755d4aa61670543aefec71cc4eb7fed12f1aa21027f80661a25a2cc550ddbceb3988a1d3fa624925763b9164b9153b89 0009-CVE-2018-10919-acl_read-Flip-the-logic-in-the-dirsyn.patch +f59421fc880c864d36da28d9a6b41fb8be912c8a0411301cc80c8682210d17fc111ea956a9d2ad01ebb58f4737a3b8d8fa8d8e2a897d32a8b30240eacf23b2e2 0010-CVE-2018-10919-acl_read-Fix-unauthorized-attribute-a.patch +8c284d9faa975342092c94193c6993d1dc11e429f108bf2a152a631ed2f5ae85c1f5db5ef51828682357aac015c888cc1080f705fbc529b6d07112a0039d3bd6 0011-CVE-2018-10919-tests-Add-extra-test-for-dirsync-dele.patch 6bee83aab500f27248b315d8a5f567940d7232269b021d801b3d51c20ed9e4aad513ee0117f356fb388014a63a145beacb55307ef9addbf7997987304b548fcf samba.initd 4faf581ecef3ec38319e3c4ab6d3995c51fd7ba83180dc5553a2ff4dfb92efadb43030c543292130c4ed0c281dc0972c6973d52d48062c5edb39bb1c4bbb6dd6 samba.confd f88ebe59ca3a9e9b77dd5993c13ef3e73a838efb8ed858088b464a330132d662f33e25c27819e38835389dee23057a3951de11bae1eef55db8ff5e1ec6760053 samba.logrotate" |