diff options
author | Rene Ladan <rene@FreeBSD.org> | 2020-12-12 15:09:15 +0000 |
---|---|---|
committer | Rene Ladan <rene@FreeBSD.org> | 2020-12-12 15:09:15 +0000 |
commit | 6592a822122a3d2bf252ccd85dd40b85b09dde59 (patch) | |
tree | 2b93a21c9e067c02f1a583dbc6d8157ffaea1a57 /security/sssd/files/patch-src__providers__ad__ad_gpo_ndr.c | |
parent | 693a9581667ca0ab414315d4f29d67c490c480c2 (diff) | |
download | ports-6592a822122a3d2bf252ccd85dd40b85b09dde59.tar.gz ports-6592a822122a3d2bf252ccd85dd40b85b09dde59.zip |
MFH: r555585 r557829
security/sssd: update to 1.16.5
This fixes several security vulnerabilities and unexpires
the port because it moves to Python 3.
PR: 241347
Submitted by: lukas.slebodnik@intrak.sk (initial patch)
Security: CVE-2018-16838
Security: CVE-2019-3811
security/sssd: fix SMB option
- use Samba 4.12 instead of the removed Samba 4.10
- use ldb 2.1 instead of ldb 2.0
While here, recognize Kerberos 1.18
PR: 250864
Submitted by: joerg (patch by Richard Frewin)
Approved by: maintainer timeout (14 days)
Notes
Notes:
svn path=/branches/2020Q4/; revision=557830
Diffstat (limited to 'security/sssd/files/patch-src__providers__ad__ad_gpo_ndr.c')
-rw-r--r-- | security/sssd/files/patch-src__providers__ad__ad_gpo_ndr.c | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/security/sssd/files/patch-src__providers__ad__ad_gpo_ndr.c b/security/sssd/files/patch-src__providers__ad__ad_gpo_ndr.c new file mode 100644 index 000000000000..7bb5a0c1f476 --- /dev/null +++ b/security/sssd/files/patch-src__providers__ad__ad_gpo_ndr.c @@ -0,0 +1,29 @@ +--- src/providers/ad/ad_gpo_ndr.c-orig 2020-11-28 22:21:39.860006000 +0000 ++++ src/providers/ad/ad_gpo_ndr.c 2020-11-28 22:23:15.849602000 +0000 +@@ -105,7 +105,7 @@ + union security_ace_object_type *r) + { + uint32_t level; +- level = ndr_pull_get_switch_value(ndr, r); ++ level = ndr_token_peek(&ndr->switch_list, r); + NDR_PULL_CHECK_FLAGS(ndr, ndr_flags); + if (ndr_flags & NDR_SCALARS) { + NDR_CHECK(ndr_pull_union_align(ndr, 4)); +@@ -135,7 +135,7 @@ + union security_ace_object_inherited_type *r) + { + uint32_t level; +- level = ndr_pull_get_switch_value(ndr, r); ++ level = ndr_token_peek(&ndr->switch_list, r); + NDR_PULL_CHECK_FLAGS(ndr, ndr_flags); + if (ndr_flags & NDR_SCALARS) { + NDR_CHECK(ndr_pull_union_align(ndr, 4)); +@@ -198,7 +198,7 @@ + union security_ace_object_ctr *r) + { + uint32_t level; +- level = ndr_pull_get_switch_value(ndr, r); ++ level = ndr_token_peek(&ndr->switch_list, r); + NDR_PULL_CHECK_FLAGS(ndr, ndr_flags); + if (ndr_flags & NDR_SCALARS) { + NDR_CHECK(ndr_pull_union_align(ndr, 4)); |