<feed xmlns='http://www.w3.org/2005/Atom'>
<title>packages/net/samba4/patches, branch master</title>
<subtitle>Mirror of packages feed</subtitle>
<id>https://git.openwrt.org/feed/packages/atom?h=master</id>
<link rel='self' href='https://git.openwrt.org/feed/packages/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/'/>
<updated>2025-06-18T14:51:32Z</updated>
<entry>
<title>samba4: bump to 4.22.2</title>
<updated>2025-06-18T14:51:32Z</updated>
<author>
<name>John Audia</name>
</author>
<published>2025-06-02T19:19:14Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=192ca00bce6360bf718154a9f69f4dea36ecbda7'/>
<id>urn:sha1:192ca00bce6360bf718154a9f69f4dea36ecbda7</id>
<content type='text'>
https://www.samba.org/samba/history/samba-4.22.2.html

Removed upstreamed:
  101-do-not-check-xsltproc-manpages.patch
  105-perl-json-pp.patch

Removed due to build failure:
  104-samba-4.12-unbundle-icu.patch

Added:
  104-fix-build-on-aarch64-and-risc.patch[1]

Makefile:
  Removed section on --accel-aes due to upstream dropping support
  Added line to correct fcntl check in cross-answers.txt

1. For aarch64 and risc64, the discard_const macro is used to remove
const qualifiers from string literals, but casting a string literal’s
address to uintptr_t and then to void * is not a constant expression in
some compilers or environments e.g. the musl libc and aarch64/risc64
combination seems to enforce stricter rules for constant initializers
or pointer/integer size handling compared to glibc-based systems.

Build system: x86/64
Build-tested: x86/64
Run-tested: x86/64

Signed-off-by: John Audia &lt;therealgraysky@proton.me&gt;
</content>
</entry>
<entry>
<title>samba4: update to 4.18.0</title>
<updated>2023-03-26T19:35:59Z</updated>
<author>
<name>Andrew Sim</name>
</author>
<published>2023-03-22T07:20:14Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=275eb110bb1951e965cdb8daca090b970fe6e35c'/>
<id>urn:sha1:275eb110bb1951e965cdb8daca090b970fe6e35c</id>
<content type='text'>
Samba release history: https://www.samba.org/samba/history/samba-4.18.0.html

Signed-off-by: Andrew Sim &lt;andrewsimz@gmail.com&gt;
</content>
</entry>
<entry>
<title>samba4: update to 4.17.5</title>
<updated>2023-03-09T01:19:08Z</updated>
<author>
<name>Michael Peleshenko</name>
</author>
<published>2023-03-01T15:14:14Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=604604a6675652c694e123770b601dfcea2187d1'/>
<id>urn:sha1:604604a6675652c694e123770b601dfcea2187d1</id>
<content type='text'>
* update to 4.17.5
* changelog: https://www.samba.org/samba/history/samba-4.17.5
* refresh patch

* CVE-2022-42898: Samba's Kerberos libraries and AD DC failed to guard against integer overflows when parsing a PAC on a 32-bit system, which allowed an attacker with a forged PAC to corrupt the heap.
 https://www.samba.org/samba/security/CVE-2022-42898.html

* CVE-2022-37966: This is the Samba CVE for the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.

  A Samba Active Directory DC will issue weak rc4-hmac session keys for use between modern clients and servers despite all modern Kerberos implementations supporting the aes256-cts-hmac-sha1-96 cipher.

  On Samba Active Directory DCs and members 'kerberos encryption types = legacy' would force rc4-hmac as a client even if the server supports aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96.
  https://www.samba.org/samba/security/CVE-2022-37966.html

* CVE-2022-37967: This is the Samba CVE for the Windows Kerberos Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.

  A service account with the special constrained delegation permission could forge a more powerful ticket than the one it was presented with.
  https://www.samba.org/samba/security/CVE-2022-37967.html

* CVE-2022-38023: The "RC4" protection of the NetLogon Secure channel uses the same algorithms as rc4-hmac cryptography in Kerberos, and so must also be assumed to be weak.
  https://www.samba.org/samba/security/CVE-2022-38023.html

* BUG 15210: synthetic_pathref AFP_AfpInfo failed errors.
  This resolves errors logged during macOS TimeMachine backups.
  https://bugzilla.samba.org/show_bug.cgi?id=15210

Signed-off-by: Michael Peleshenko &lt;mpeleshenko@gmail.com&gt;
</content>
</entry>
<entry>
<title>samba4: update to 4.17.1</title>
<updated>2022-10-23T20:53:12Z</updated>
<author>
<name>Andrew Sim</name>
</author>
<published>2022-10-22T06:41:26Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=46e984f051428d182933dc147f1f82c7efa2c5e1'/>
<id>urn:sha1:46e984f051428d182933dc147f1f82c7efa2c5e1</id>
<content type='text'>
* update to 4.17.1
* changelog: https://www.samba.org/samba/history/samba-4.17.1
* refresh patch

Signed-off-by: Andrew Sim &lt;andrewsimz@gmail.com&gt;
</content>
</entry>
<entry>
<title>samba4: remove duplicate entry from libldb-fix-musl-libc-unkown-type-error.patch</title>
<updated>2022-10-07T08:53:26Z</updated>
<author>
<name>Andrew Sim</name>
</author>
<published>2022-10-06T21:17:28Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=0d5d9e573723782fd5759009915d8d3cd2142783'/>
<id>urn:sha1:0d5d9e573723782fd5759009915d8d3cd2142783</id>
<content type='text'>
Signed-off-by: Andrew Sim &lt;andrewsimz@gmail.com&gt;
</content>
</entry>
<entry>
<title>samba4: update to 4.17.0</title>
<updated>2022-10-07T08:53:26Z</updated>
<author>
<name>Andrew Sim</name>
</author>
<published>2022-10-06T20:44:23Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=402f4ba4eff65b80a9deaa6085256112bec4d67b'/>
<id>urn:sha1:402f4ba4eff65b80a9deaa6085256112bec4d67b</id>
<content type='text'>
Signed-off-by: Andrew Sim &lt;andrewsimz@gmail.com&gt;
</content>
</entry>
<entry>
<title>samba4: fix build on macos</title>
<updated>2022-05-22T20:40:48Z</updated>
<author>
<name>Sergey V. Lobanov</name>
</author>
<published>2022-02-15T23:48:08Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=510d44d988282abef81011b7281591b1bca88c90'/>
<id>urn:sha1:510d44d988282abef81011b7281591b1bca88c90</id>
<content type='text'>
This commit fixes two issues on macos:
1. Added a patch to fix 'echo -n' issue with MacOS shell
(backported from upstream)
2. Redefined sys.platform='linux' for target build if build host is
MacOS (otherwise, build script tries to use MacOS logic for
OpenWrt(Linux) target build)

Signed-off-by: Sergey V. Lobanov &lt;sergey@lobanov.in&gt;
</content>
</entry>
<entry>
<title>samba4: update to 4.14.11; fix AD_DC build</title>
<updated>2022-01-28T20:09:09Z</updated>
<author>
<name>Andy Walsh</name>
</author>
<published>2022-01-28T09:03:42Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=7730a65d300fd515e4633c0a8bdb5857c42146b3'/>
<id>urn:sha1:7730a65d300fd515e4633c0a8bdb5857c42146b3</id>
<content type='text'>
* update to 4.14.11
* fix AD_DC build
* add vfs_widelinks to defaults
* refresh patches
* fixes: #16697, #17692
* fixes: CVE-2016-2124, CVE-2020-25717, CVE-2020-25718, CVE-2020-25719, CVE-2020-25721, CVE-2020-25722, CVE-2021-3738, CVE-2021-23192

Signed-off-by: Andy Walsh &lt;andy.walsh44+github@gmail.com&gt;
</content>
</entry>
<entry>
<title>samba: update to 4.14.7</title>
<updated>2021-09-08T14:28:54Z</updated>
<author>
<name>Andy Walsh</name>
</author>
<published>2021-09-08T11:38:24Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=f75bb89c7ea439a99d4e9d631f6b6179ca3d52b9'/>
<id>urn:sha1:f75bb89c7ea439a99d4e9d631f6b6179ca3d52b9</id>
<content type='text'>
* update to 4.14.7

Signed-off-by: Andy Walsh &lt;andy.walsh44+github@gmail.com&gt;
</content>
</entry>
<entry>
<title>samba4: update to 4.14.5</title>
<updated>2021-06-27T13:32:34Z</updated>
<author>
<name>Andy Walsh</name>
</author>
<published>2021-06-27T13:15:26Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=7f3f6d162ae6bb3924a25f37f82efc54dee2c49f'/>
<id>urn:sha1:7f3f6d162ae6bb3924a25f37f82efc54dee2c49f</id>
<content type='text'>
* update to 4.14.5
* refresh patches

Signed-off-by: Andy Walsh &lt;andy.walsh44+github@gmail.com&gt;
</content>
</entry>
</feed>
