Hi Michael,

So the samba built with no problem but there was a change to the rootfile.

I have found that the rootfile is under separate directories for each architecture. I did a diff between the x86_64 and the armv5tel and most of the differences are just the x86_64 replaced by arm but I also found files where the filename itself is different between x86_64 and armv5tel with for instance ...gnu.so.2 replaced by ....gnueabi.so.2

So I can do the patch with the x86_64 rootfile updated as that architecture is what I am using for my builds. I don't know what to do with the others. Are those automatically updated based on mine or do I have to do something to get them updated and if so then what?

Regards,
Adolf.

On 25/03/2021 18:50, Michael Tremer wrote:
> Great! Thank you.
> 
>> On 25 Mar 2021, at 14:44, Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>>
>> Hi.
>>
>> I will pick it up.
>>
>> Adolf.
>>
>>
>>
>> On 25/03/2021 10:41, Michael Tremer wrote:
>>> Is anyone up for grabbing this?
>>>
>>> We should not be affected by these security issues, but I do not see any reasons why we should not update - just in case.
>>>
>>> -Michael
>>>
>>>> Begin forwarded message:
>>>>
>>>> From: Karolin Seeger via samba-announce <samba-announce(a)lists.samba.org>
>>>> Subject: [Announce] Samba 4.14.2 (4.14.1), 4.13.7 (4.13.6) and 4.12.14 (4.12.13) Security Releases
>>>> Date: 24 March 2021 at 12:02:14 GMT
>>>> To: samba-announce(a)lists.samba.org, samba(a)lists.samba.org, samba-technical(a)lists.samba.org
>>>> Reply-To: kseeger(a)samba.org
>>>>
>>>> Release Announcements
>>>> ---------------------
>>>>
>>>> These are security releases in order to address the following defects:
>>>>
>>>> o CVE-2020-27840: Heap corruption via crafted DN strings.
>>>> o CVE-2021-20277: Out of bounds read in AD DC LDAP server.
>>>>
>>>>
>>>> =======
>>>> Details
>>>> =======
>>>>
>>>> o  CVE-2020-27840:
>>>>    An anonymous attacker can crash the Samba AD DC LDAP server by sending easily
>>>>    crafted DNs as part of a bind request. More serious heap corruption is likely
>>>>    also possible.
>>>>
>>>> o  CVE-2021-20277:
>>>>    User-controlled LDAP filter strings against the AD DC LDAP server may crash
>>>>    the LDAP server.
>>>>
>>>> For more details, please refer to the security advisories.
>>>>
>>>>
>>>> #######################################
>>>> Reporting bugs & Development Discussion
>>>> #######################################
>>>>
>>>> Please discuss this release on the samba-technical mailing list or by
>>>> joining the #samba-technical IRC channel on irc.freenode.net.
>>>>
>>>> If you do report problems then please try to send high quality
>>>> feedback. If you don't provide vital information to help us track down
>>>> the problem then you will probably be ignored.  All bug reports should
>>>> be filed under the Samba 4.1 and newer product in the project's Bugzilla
>>>> database (https://bugzilla.samba.org/).
>>>>
>>>>
>>>> ======================================================================
>>>> == Our Code, Our Bugs, Our Responsibility.
>>>> == The Samba Team
>>>> ======================================================================
>>>>
>>>>
>>>>
>>>> ================
>>>> Download Details
>>>> ================
>>>>
>>>> The uncompressed tarballs and patch files have been signed
>>>> using GnuPG (ID AA99442FB680B620).  The source code can be downloaded
>>>> from:
>>>>
>>>>         https://download.samba.org/pub/samba/stable/
>>>>
>>>> The release notes are available online at:
>>>>
>>>>         https://www.samba.org/samba/history/samba-4.14.2.html
>>>>         https://www.samba.org/samba/history/samba-4.13.7.html
>>>>         https://www.samba.org/samba/history/samba-4.12.14.html
>>>>
>>>> Our Code, Our Bugs, Our Responsibility.
>>>> (https://bugzilla.samba.org/)
>>>>
>>>>                         --Enjoy
>>>>                         The Samba Team
>>>
>> -- 
>> Sent from my laptop
>>
>