Change log for samba package in Ubuntu
301 → 375 of 640 results | First • Previous • Next • Last |
samba (2:4.3.3+dfsg-1ubuntu2) xenial; urgency=medium * Fixes regression introduced by debian/patches/CVE-2015-5252.patch. (LP: #1545750) -- Dariusz Gadomski <email address hidden> Mon, 15 Feb 2016 16:05:12 +0100
Available diffs
samba (2:4.1.6+dfsg-1ubuntu2.14.04.12) trusty-security; urgency=medium * Fixes regression introduced by debian/patches/CVE-2015-5252.patch. (LP: #1545750) -- Dariusz Gadomski <email address hidden> Mon, 15 Feb 2016 15:59:51 +0100
Available diffs
samba (2:4.3.3+dfsg-1ubuntu1) xenial; urgency=medium * Merge with Debian; remaining changes: + debian/VERSION.patch: Update vendor string to "Ubuntu". + debian/smb.conf; - Add "(Samba, Ubuntu)" to server string. - Comment out the default [homes] share, and add a comment about "valid users = %s" to show users how to restrict access to \\server\username to only username. + debian/samba-common.config: - Do not change prioritiy to high if dhclient3 is installed. + debian/control: - Switch build depends from transitional libgnutsl28-dev to libgnutls-dev + Add ufw integration: - Created debian/samba.ufw.profile: - debian/rules, debian/samba.install: install profile + Add apport hook: - Created debian/source_samba.py. - debian/rules, debia/samb-common-bin.install: install hook. + d/p/krb_zero_cursor.patch - apply proposed-upstream fix for pam_winbind krb5_ccache_type=FILE failure (LP: #1310919)
Available diffs
samba (2:3.6.3-2ubuntu2.13) precise-security; urgency=medium * SECURITY UPDATE: file-access restrictions bypass via symlink - debian/patches/CVE-2015-5252.patch: validate matching component in source3/smbd/vfs.c. - CVE-2015-5252 * SECURITY UPDATE: man-in-the-middle attack via encrypted-to-unencrypted downgrade - debian/patches/CVE-2015-5296.patch: force signing in source3/libsmb/clidfs.c, source3/libsmb/libsmb_server.c. - CVE-2015-5296 * SECURITY UPDATE: snapshot access via shadow copy directory - debian/patches/CVE-2015-5299.patch: fix missing access checks in source3/modules/vfs_shadow_copy2.c. - CVE-2015-5299 * SECURITY UPDATE: information leak via incorrect string length handling - debian/patches/CVE-2015-5330.patch: fix string length handling in lib/util/charset/charset.h, lib/util/charset/codepoints.c, lib/util/charset/util_unistr.c, source3/lib/util_str.c. - CVE-2015-5330 -- Marc Deslauriers <email address hidden> Mon, 04 Jan 2016 14:50:47 -0500
Available diffs
samba (2:4.1.6+dfsg-1ubuntu2.14.04.11) trusty-security; urgency=medium * SECURITY UPDATE: denial of service in ldb_wildcard_compare function - debian/patches/CVE-2015-3223.patch: handle empty strings and embedded zeros in lib/ldb/common/ldb_match.c. - CVE-2015-3223 * SECURITY UPDATE: file-access restrictions bypass via symlink - debian/patches/CVE-2015-5252.patch: validate matching component in source3/smbd/vfs.c. - CVE-2015-5252 * SECURITY UPDATE: man-in-the-middle attack via encrypted-to-unencrypted downgrade - debian/patches/CVE-2015-5296.patch: force signing in libcli/smb/smbXcli_base.c, source3/libsmb/clidfs.c, source3/libsmb/libsmb_server.c. - CVE-2015-5296 * SECURITY UPDATE: snapshot access via shadow copy directory - debian/patches/CVE-2015-5299.patch: fix missing access checks in source3/modules/vfs_shadow_copy2.c. - CVE-2015-5299 * SECURITY UPDATE: information leak via incorrect string length handling - debian/patches/CVE-2015-5330.patch: fix string length handling in lib/ldb/common/ldb_dn.c, lib/util/charset/charset.h, lib/util/charset/codepoints.c, lib/util/charset/util_str.c, lib/util/charset/util_unistr.c. - CVE-2015-5330 * SECURITY UPDATE: LDAP server denial of service - debian/patches/CVE-2015-7540.patch: check returns in lib/util/asn1.c, libcli/ldap/ldap_message.c, libcli/ldap/ldap_message.h, source4/libcli/ldap/ldap_controls.c. - CVE-2015-7540 * SECURITY UPDATE: access restrictions bypass in machine account creation - debian/patches/CVE-2015-8467.patch: restrict swapping between account types in source4/dsdb/samdb/ldb_modules/samldb.c. - CVE-2015-8467 * debian/control: bump libldb-dev Build-Depends to security update version. * This update does _not_ contain the changes from samba 2:4.1.6+dfsg-1ubuntu2.14.04.10 in trusty-proposed. -- Marc Deslauriers <email address hidden> Mon, 04 Jan 2016 11:28:45 -0500
Available diffs
- diff from 2:4.1.6+dfsg-1ubuntu2.14.04.9 (in Ubuntu) to 2:4.1.6+dfsg-1ubuntu2.14.04.11 (15.9 KiB)
- diff from 2:4.1.6+dfsg-1ubuntu2.14.04.7 (in ~ubuntu-security/ubuntu/ppa) to 2:4.1.6+dfsg-1ubuntu2.14.04.11 (19.7 KiB)
- diff from 2:4.1.6+dfsg-1ubuntu2 (in Ubuntu) to 2:4.1.6+dfsg-1ubuntu2.14.04.11 (29.9 KiB)
samba (2:4.1.13+dfsg-4ubuntu3.1) vivid-security; urgency=medium * SECURITY UPDATE: denial of service in ldb_wildcard_compare function - debian/patches/CVE-2015-3223.patch: handle empty strings and embedded zeros in lib/ldb/common/ldb_match.c. - CVE-2015-3223 * SECURITY UPDATE: file-access restrictions bypass via symlink - debian/patches/CVE-2015-5252.patch: validate matching component in source3/smbd/vfs.c. - CVE-2015-5252 * SECURITY UPDATE: man-in-the-middle attack via encrypted-to-unencrypted downgrade - debian/patches/CVE-2015-5296.patch: force signing in libcli/smb/smbXcli_base.c, source3/libsmb/clidfs.c, source3/libsmb/libsmb_server.c. - CVE-2015-5296 * SECURITY UPDATE: snapshot access via shadow copy directory - debian/patches/CVE-2015-5299.patch: fix missing access checks in source3/modules/vfs_shadow_copy2.c. - CVE-2015-5299 * SECURITY UPDATE: information leak via incorrect string length handling - debian/patches/CVE-2015-5330.patch: fix string length handling in lib/ldb/common/ldb_dn.c, lib/util/charset/charset.h, lib/util/charset/codepoints.c, lib/util/charset/util_str.c, lib/util/charset/util_unistr.c. - CVE-2015-5330 * SECURITY UPDATE: LDAP server denial of service - debian/patches/CVE-2015-7540.patch: check returns in lib/util/asn1.c, libcli/ldap/ldap_message.c, libcli/ldap/ldap_message.h, source4/libcli/ldap/ldap_controls.c. - CVE-2015-7540 * SECURITY UPDATE: access restrictions bypass in machine account creation - debian/patches/CVE-2015-8467.patch: restrict swapping between account types in source4/dsdb/samdb/ldb_modules/samldb.c. - CVE-2015-8467 * debian/control: bump libldb-dev Build-Depends to security update version. -- Marc Deslauriers <email address hidden> Mon, 04 Jan 2016 10:36:48 -0500
Available diffs
samba (2:4.1.17+dfsg-4ubuntu3.1) wily-security; urgency=medium * SECURITY UPDATE: denial of service in ldb_wildcard_compare function - debian/patches/CVE-2015-3223.patch: handle empty strings and embedded zeros in lib/ldb/common/ldb_match.c. - CVE-2015-3223 * SECURITY UPDATE: file-access restrictions bypass via symlink - debian/patches/CVE-2015-5252.patch: validate matching component in source3/smbd/vfs.c. - CVE-2015-5252 * SECURITY UPDATE: man-in-the-middle attack via encrypted-to-unencrypted downgrade - debian/patches/CVE-2015-5296.patch: force signing in libcli/smb/smbXcli_base.c, source3/libsmb/clidfs.c, source3/libsmb/libsmb_server.c. - CVE-2015-5296 * SECURITY UPDATE: snapshot access via shadow copy directory - debian/patches/CVE-2015-5299.patch: fix missing access checks in source3/modules/vfs_shadow_copy2.c. - CVE-2015-5299 * SECURITY UPDATE: information leak via incorrect string length handling - debian/patches/CVE-2015-5330.patch: fix string length handling in lib/ldb/common/ldb_dn.c, lib/util/charset/charset.h, lib/util/charset/codepoints.c, lib/util/charset/util_str.c, lib/util/charset/util_unistr.c. - CVE-2015-5330 * SECURITY UPDATE: LDAP server denial of service - debian/patches/CVE-2015-7540.patch: check returns in lib/util/asn1.c, libcli/ldap/ldap_message.c, libcli/ldap/ldap_message.h, source4/libcli/ldap/ldap_controls.c. - CVE-2015-7540 * SECURITY UPDATE: access restrictions bypass in machine account creation - debian/patches/CVE-2015-8467.patch: restrict swapping between account types in source4/dsdb/samdb/ldb_modules/samldb.c. - CVE-2015-8467 * debian/control: bump libldb-dev Build-Depends to security update version. -- Marc Deslauriers <email address hidden> Mon, 04 Jan 2016 09:30:56 -0500
Available diffs
samba (2:4.1.20+dfsg-1ubuntu5) xenial; urgency=medium * Resolve small merge error in the rules -- Sebastien Bacher <email address hidden> Wed, 16 Dec 2015 12:02:12 +0100
Available diffs
Superseded in xenial-proposed |
samba (2:4.1.20+dfsg-1ubuntu4) xenial; urgency=medium * Backport Debian change to remove libpam-smbpasswd, it segfaults leading to non working session (lp: #1515207) -- Sebastien Bacher <email address hidden> Wed, 16 Dec 2015 11:47:44 +0100
Available diffs
samba (2:4.1.20+dfsg-1ubuntu3) xenial; urgency=medium * Build with the new ldb -- Sebastien Bacher <email address hidden> Wed, 18 Nov 2015 11:45:32 +0100
Available diffs
samba (2:4.1.17+dfsg-4ubuntu3) wily; urgency=medium * debian/samba.logrotate: - revert to Debian version of the logrotate reload command, fix an invalid syntax introduced in the upstart->systemd transition (lp: #1385868) -- Sebastien Bacher <email address hidden> Tue, 10 Nov 2015 19:04:30 +0100
Available diffs
samba (2:4.1.20+dfsg-1ubuntu2) xenial; urgency=medium * debian/samba.logrotate: - revert to Debian version of the logrotate reload command, fix an invalid syntax introduced in the upstart->systemd transition (lp: #1385868) -- Sebastien Bacher <email address hidden> Tue, 10 Nov 2015 19:01:06 +0100
Available diffs
samba (2:4.1.20+dfsg-1ubuntu1) xenial; urgency=medium * Merge with Debian; remaining changes: + debian/VERSION.patch: Update vendor string to "Ubuntu". + debian/smb.conf; - Add "(Samba, Ubuntu)" to server string. - Comment out the default [homes] share, and add a comment about "valid users = %s" to show users how to restrict access to \\server\username to only username. + debian/samba-common.config: - Do not change prioritiy to high if dhclient3 is installed. + debian/control: - Don't build against or suggest ctdb and tdb. - Switch build depends from transitional libgnutsl28-dev to libgnutls-dev + debian/rules: - Drop explicit configuration options for ctdb and tdb. + Add ufw integration: - Created debian/samba.ufw.profile: - debian/rules, debian/samba.install: install profile + Add apport hook: - Created debian/source_samba.py. - debian/rules, debia/samb-common-bin.install: install hook. + debian/samba.logrotate: use service command to reload (send SIGHUP) the main processes such that it works under both upstart and systemd. + debian/samba-common.dirs: Move /var/lib/samba/private from samba.dirs. + d/p/krb_zero_cursor.patch - apply proposed-upstream fix for pam_winbind krb5_ccache_type=FILE failure (LP: #1310919)
Available diffs
Deleted in trusty-proposed (Reason: moved to -updates) |
samba (2:4.1.6+dfsg-1ubuntu2.14.04.10) trusty; urgency=medium * debian/patches/git_netbios_empty_name.patch: - s3-nmbd: Fix netbios name truncation, should fix machines having an empty name on smb if their netbios name is long (lp: #1505590) -- Sebastien Bacher <email address hidden> Tue, 13 Oct 2015 10:56:29 +0100
Available diffs
samba (2:4.1.6+dfsg-1ubuntu2.14.04.9) trusty; urgency=medium * debian/patches/0001-byteorder-do-not-assume-PowerPC-is-big-endian.patch: deal with the fact that POWER8 can be little-endian, so don't use special instructions to write in little-endian in that case. (LP: #1472584) -- Mathieu Trudel-Lapierre <email address hidden> Wed, 12 Aug 2015 21:09:22 -0400
Available diffs
Superseded in xenial-release |
Obsolete in wily-release |
Deleted in wily-proposed (Reason: moved to release) |
samba (2:4.1.17+dfsg-4ubuntu2) wily; urgency=medium * debian/control: - Switch build depends from transitional libgnutsl28-dev to libgnutls-dev -- Robert Ancell <email address hidden> Tue, 11 Aug 2015 11:34:50 +1200
Available diffs
samba (2:4.1.6+dfsg-1ubuntu2.14.04.8) trusty; urgency=medium * Fix for "no talloc stackframe at" warning messages (LP: #1257186) -- Ryan Harper <email address hidden> Mon, 22 Jun 2015 08:48:37 -0500
samba (2:4.1.17+dfsg-4ubuntu1) wily; urgency=medium * Merge from Debian unstable. Remaining changes: + debian/VERSION.patch: Update vendor string to "Ubuntu". + debian/smb.conf; - Add "(Samba, Ubuntu)" to server string. - Comment out the default [homes] share, and add a comment about "valid users = %s" to show users how to restrict access to \\server\username to only username. + debian/samba-common.config: - Do not change prioritiy to high if dhclient3 is installed. + debian/control: - Don't build against or suggest ctdb and tdb. + debian/rules: - Drop explicit configuration options for ctdb and tdb. + Add ufw integration: - Created debian/samba.ufw.profile: - debian/rules, debian/samba.install: install profile + Add apport hook: - Created debian/source_samba.py. - debian/rules, debia/samb-common-bin.install: install hook. + debian/samba.logrotate: use service command to reload (send SIGHUP) the main processes such that it works under both upstart and systemd. + debian/samba-common.dirs: Move /var/lib/samba/private from samba.dirs. + d/p/krb_zero_cursor.patch - apply proposed-upstream fix for pam_winbind krb5_ccache_type=FILE failure (LP: #1310919) + debian/patches/git_timeout_client_error.patch: - don't let smb mounts timeout that leads to errors when trying to reuse a mount after idling for a while in e.g nautilus (lp: #310932)
Available diffs
Superseded in wily-proposed |
samba (2:4.1.13+dfsg-4ubuntu4) wily; urgency=medium * No-change rebuild against current libldb1. This makes the package installable again. -- Martin Pitt <email address hidden> Fri, 08 May 2015 06:09:32 +0200
Available diffs
Superseded in wily-release |
Obsolete in vivid-release |
Deleted in vivid-proposed (Reason: moved to release) |
samba (2:4.1.13+dfsg-4ubuntu3) vivid; urgency=medium * debian/patches/git_timeout_client_error.patch: - don't let smb mounts timeout that leads to errors when trying to reuse a mount after idling for a while in e.g nautilus (lp: #310932) -- Sebastien Bacher <email address hidden> Fri, 03 Apr 2015 17:20:06 +0200
Available diffs
samba (2:3.6.3-2ubuntu2.12) precise-security; urgency=medium * SECURITY UPDATE: code execution vulnerability in smbd daemon - debian/patches/CVE-2015-0240.patch: don't call talloc_free on an uninitialized pointer and don't dereference a NULL pointer in source3/rpc_server/netlogon/srv_netlog_nt.c, initialize creds_out in libcli/auth/schannel_state_tdb.c. - CVE-2015-0240 -- Marc Deslauriers <email address hidden> Mon, 23 Feb 2015 10:29:50 -0500
Available diffs
samba (2:4.1.11+dfsg-1ubuntu2.2) utopic-security; urgency=medium * SECURITY UPDATE: code execution vulnerability in smbd daemon - debian/patches/CVE-2015-0240.patch: don't call talloc_free on an uninitialized pointer and don't dereference a NULL pointer in source3/rpc_server/netlogon/srv_netlog_nt.c. - CVE-2015-0240 -- Marc Deslauriers <email address hidden> Mon, 23 Feb 2015 09:07:06 -0500
Available diffs
samba (2:4.1.6+dfsg-1ubuntu2.14.04.7) trusty-security; urgency=medium * SECURITY UPDATE: code execution vulnerability in smbd daemon - debian/patches/CVE-2015-0240.patch: don't call talloc_free on an uninitialized pointer and don't dereference a NULL pointer in source3/rpc_server/netlogon/srv_netlog_nt.c. - CVE-2015-0240 -- Marc Deslauriers <email address hidden> Mon, 23 Feb 2015 09:07:54 -0500
samba (2:4.1.13+dfsg-4ubuntu2) vivid; urgency=medium * SECURITY UPDATE: code execution vulnerability in smbd daemon - debian/patches/CVE-2015-0240.patch: don't call talloc_free on an uninitialized pointer and don't dereference a NULL pointer in source3/rpc_server/netlogon/srv_netlog_nt.c. - CVE-2015-0240 -- Marc Deslauriers <email address hidden> Mon, 23 Feb 2015 08:36:51 -0500
Available diffs
Deleted in trusty-proposed (Reason: moved to -updates) |
samba (2:4.1.6+dfsg-1ubuntu2.14.04.6) trusty; urgency=medium * Fix "force user" and "force group" options. (LP: #1416906) -- Dave Chiluk <email address hidden> Wed, 11 Feb 2015 15:49:11 -0800
Available diffs
samba (2:4.1.6+dfsg-1ubuntu2.14.04.5) trusty; urgency=medium * Restore recommends for the separate libnss-winbind and libpam-winbind packages needed for upgrades of winbind from Precise to Trusty. (LP: #1412909) -- Brian Murray <email address hidden> Wed, 28 Jan 2015 15:24:47 -0800
samba (2:4.1.13+dfsg-4ubuntu1) vivid; urgency=low * Merge from Debian unstable. Remaining changes: + debian/VERSION.patch: Update vendor string to "Ubuntu". + debian/smb.conf; - Add "(Samba, Ubuntu)" to server string. - Comment out the default [homes] share, and add a comment about "valid users = %s" to show users how to restrict access to \\server\username to only username. + debian/samba-common.config: - Do not change prioritiy to high if dhclient3 is installed. + debian/control: - Don't build against or suggest ctdb and tdb. + debian/rules: - Drop explicit configuration options for ctdb and tdb. + Add ufw integration: - Created debian/samba.ufw.profile: - debian/rules, debian/samba.install: install profile + Add apport hook: - Created debian/source_samba.py. - debian/rules, debia/samb-common-bin.install: install hook. + debian/samba.logrotate: use service command to reload (send SIGHUP) the main processes such that it works under both upstart and systemd. + debian/samba-common.dirs: Move /var/lib/samba/private from samba.dirs. + d/p/krb_zero_cursor.patch - apply proposed-upstream fix for pam_winbind krb5_ccache_type=FILE failure (LP: #1310919) + debian/patches/CVE-2014-8143.patch fix CVE-2014-8143.
Available diffs
samba (2:4.1.11+dfsg-1ubuntu4) vivid; urgency=medium * SECURITY UPDATE: elevation of privilege to AD Domain Controller - debian/patches/CVE-2014-8143.patch: check for extended access rights before allowing changes to userAccountControl in librpc/idl/security.idl, source4/auth/session.c, source4/dsdb/common/util.c, source4/dsdb/pydsdb.c, source4/dsdb/samdb/ldb_modules/samldb.c, source4/dsdb/samdb/samdb.h, source4/rpc_server/lsa/dcesrv_lsa.c, source4/setup/schema_samba4.ldif. - CVE-2014-8143 -- Marc Deslauriers <email address hidden> Wed, 21 Jan 2015 09:19:12 -0500
Available diffs
samba (2:4.1.6+dfsg-1ubuntu2.14.04.4) trusty-security; urgency=medium * SECURITY UPDATE: elevation of privilege to AD Domain Controller - debian/patches/CVE-2014-8143.patch: check for extended access rights before allowing changes to userAccountControl in librpc/idl/security.idl, source4/auth/session.c, source4/dsdb/common/util.c, source4/dsdb/pydsdb.c, source4/dsdb/samdb/ldb_modules/samldb.c, source4/dsdb/samdb/samdb.h, source4/rpc_server/lsa/dcesrv_lsa.c, source4/setup/schema_samba4.ldif. - CVE-2014-8143 -- Marc Deslauriers <email address hidden> Wed, 21 Jan 2015 09:26:12 -0500
Available diffs
samba (2:4.1.11+dfsg-1ubuntu2.1) utopic-security; urgency=medium * SECURITY UPDATE: elevation of privilege to AD Domain Controller - debian/patches/CVE-2014-8143.patch: check for extended access rights before allowing changes to userAccountControl in librpc/idl/security.idl, source4/auth/session.c, source4/dsdb/common/util.c, source4/dsdb/pydsdb.c, source4/dsdb/samdb/ldb_modules/samldb.c, source4/dsdb/samdb/samdb.h, source4/rpc_server/lsa/dcesrv_lsa.c, source4/setup/schema_samba4.ldif. - CVE-2014-8143 -- Marc Deslauriers <email address hidden> Wed, 21 Jan 2015 09:25:29 -0500
Available diffs
samba (2:4.1.11+dfsg-1ubuntu3) vivid; urgency=medium * No-change rebuild against current ldb. Note that I'm not claiming the merging for this package. -- Martin Pitt <email address hidden> Thu, 04 Dec 2014 07:50:22 +0100
Available diffs
Superseded in vivid-release |
Obsolete in utopic-release |
Deleted in utopic-proposed (Reason: moved to release) |
samba (2:4.1.11+dfsg-1ubuntu2) utopic; urgency=medium * d/p/krb_zero_cursor.patch - apply proposed-upstream fix for pam_winbind krb5_ccache_type=FILE failure (LP: #1310919) -- Serge Hallyn <email address hidden> Thu, 11 Sep 2014 11:53:36 -0500
Available diffs
samba (2:4.1.11+dfsg-1ubuntu1) utopic; urgency=medium * Merge from Debian unstable. Remaining changes: + debian/VERSION.patch: Update vendor string to "Ubuntu". + debian/smb.conf; - Add "(Samba, Ubuntu)" to server string. - Comment out the default [homes] share, and add a comment about "valid users = %s" to show users how to restrict access to \\server\username to only username. + debian/samba-common.config: - Do not change prioritiy to high if dhclient3 is installed. + debian/control: - Don't build against or suggest ctdb and tdb. + debian/rules: - Drop explicit configuration options for ctdb and tdb. + Add ufw integration: - Created debian/samba.ufw.profile: - debian/rules, debian/samba.install: install profile + Add apport hook: - Created debian/source_samba.py. - debian/rules, debia/samb-common-bin.install: install hook. + debian/samba.logrotate: call upstart interfaces unconditionally instead of hacking arround with pid files. + Set sbmclients conflicts with samba4-clients less than 4.0.3+dfsg1-0.1ubuntu4, first dummy transitional package version. + debian/samba-common.dirs: Move /var/lib/samba/private from samba.dirs. * In logrotate, use service command to reload (send SIGHUP) the main processes such that it works under both upstart and systemd. * Drop CVE patches, applied upstream. * Drop patches absent from series: readline-ftbfs.patch, krb5_kt_start_seq.diff, config-bind99.patch * Drop debian/source/include-binaries, pyc files are correctly cleaned up
Available diffs
samba (2:4.1.8+dfsg-1ubuntu3) utopic; urgency=medium * SECURITY UPDATE: remote code execution on unauthenticated nmbd - debian/patches/CVE-2014-3560.patch: fix unstrcpy in lib/util/string_wrappers.h. - CVE-2014-3560 -- Marc Deslauriers <email address hidden> Fri, 01 Aug 2014 17:54:54 -0400
Available diffs
samba (2:4.1.6+dfsg-1ubuntu2.14.04.3) trusty-security; urgency=medium * SECURITY UPDATE: remote code execution on unauthenticated nmbd - debian/patches/CVE-2014-3560.patch: fix unstrcpy in lib/util/string_wrappers.h. - CVE-2014-3560 -- Marc Deslauriers <email address hidden> Fri, 01 Aug 2014 17:57:10 -0400
Available diffs
samba (2:4.1.8+dfsg-1ubuntu2) utopic; urgency=medium * SECURITY UPDATE: denial of service on nmbd malformed packet - debian/patches/CVE-2014-0244.patch: return on EWOULDBLOCK/EAGAIN in source3/lib/system.c. - CVE-2014-0244 * SECURITY UPDATE: denial of service via bad unicode conversion - debian/patches/CVE-2014-3493.patch: refactor code in source3/lib/charcnv.c, change return code checks in source3/libsmb/clirap.c, source3/smbd/lanman.c. - CVE-2014-3493 -- Marc Deslauriers <email address hidden> Mon, 23 Jun 2014 14:10:12 -0400
Available diffs
samba (2:4.1.6+dfsg-1ubuntu2.14.04.2) trusty-security; urgency=medium * SECURITY UPDATE: info leak via SRV_SNAPSHOT_ARRAY response field - debian/patches/CVE-2014-0178.patch: don't return uninitialized data and extra bytes in source3/modules/vfs_default.c. - CVE-2014-0178 * SECURITY UPDATE: denial of service via forged DNS response - debian/patches/CVE-2014-0239.patch: don't reply to replies in source4/dns_server/dns_server.c, added test to python/samba/tests/dns.py. - CVE-2014-0239 * SECURITY UPDATE: denial of service on nmbd malformed packet - debian/patches/CVE-2014-0244.patch: return on EWOULDBLOCK/EAGAIN in source3/lib/system.c. - CVE-2014-0244 * SECURITY UPDATE: denial of service via bad unicode conversion - debian/patches/CVE-2014-3493.patch: refactor code in source3/lib/charcnv.c, change return code checks in source3/libsmb/clirap.c, source3/smbd/lanman.c. - CVE-2014-3493 -- Marc Deslauriers <email address hidden> Mon, 23 Jun 2014 14:26:59 -0400
samba (2:3.4.7~dfsg-1ubuntu3.15) lucid-security; urgency=medium * SECURITY UPDATE: denial of service via bad unicode conversion - debian/patches/CVE-2014-3493.patch: refactor code in source3/lib/charcnv.c, change return code checks in source3/libsmb/clirap.c, source3/smbd/lanman.c. - CVE-2014-3493 -- Marc Deslauriers <email address hidden> Mon, 23 Jun 2014 15:07:40 -0400
Available diffs
samba (2:3.6.3-2ubuntu2.11) precise-security; urgency=medium * SECURITY UPDATE: denial of service on nmbd malformed packet - debian/patches/CVE-2014-0244.patch: return on EWOULDBLOCK/EAGAIN in source3/lib/system.c. - CVE-2014-0244 * SECURITY UPDATE: denial of service via bad unicode conversion - debian/patches/CVE-2014-3493.patch: refactor code in source3/lib/charcnv.c, change return code checks in source3/libsmb/clirap.c, source3/smbd/lanman.c. - CVE-2014-3493 -- Marc Deslauriers <email address hidden> Mon, 23 Jun 2014 15:02:25 -0400
Available diffs
samba (2:3.6.18-1ubuntu3.3) saucy-security; urgency=medium * SECURITY UPDATE: info leak via SRV_SNAPSHOT_ARRAY response field - debian/patches/CVE-2014-0178.patch: don't return uninitialized data and extra bytes in source3/smbd/nttrans.c. - CVE-2014-0178 * SECURITY UPDATE: denial of service on nmbd malformed packet - debian/patches/CVE-2014-0244.patch: return on EWOULDBLOCK/EAGAIN in source3/lib/system.c. - CVE-2014-0244 * SECURITY UPDATE: denial of service via bad unicode conversion - debian/patches/CVE-2014-3493.patch: refactor code in source3/lib/charcnv.c, change return code checks in source3/libsmb/clirap.c, source3/smbd/lanman.c. - CVE-2014-3493 -- Marc Deslauriers <email address hidden> Mon, 23 Jun 2014 14:58:05 -0400
Available diffs
samba (2:4.1.8+dfsg-1ubuntu1) utopic; urgency=low * Merge from Debian unstable. Remaining changes: + debian/VERSION.patch: Update vendor string to "Ubuntu". + debian/smb.conf; - Add "(Samba, Ubuntu)" to server string. - Comment out the default [homes] share, and add a comment about "valid users = %s" to show users how to restrict access to \\server\username to only username. + debian/samba-common.config: - Do not change prioritiy to high if dhclient3 is installed. + debian/control: - Don't build against or suggest ctdb and tdb. + debian/rules: - Drop explicit configuration options for ctdb and tdb. + Add ufw integration: - Created debian/samba.ufw.profile: - debian/rules, debian/samba.install: install profile + Add apport hook: - Created debian/source_samba.py. - debian/rules, debia/samb-common-bin.install: install hook. + debian/samba.logrotate: call upstart interfaces unconditionally instead of hacking arround with pid files. + Set sbmclients conflicts with samba4-clients less than 4.0.3+dfsg1-0.1ubuntu4, first dummy transitional package version. + Dropped patches: - debian/patches/CVE-2013-4496.patch: Dropped no longer needed - debian/patches/CVE-2013-6442.patch: Dropped no longer needed. - debian/patches/readline-ftbfs.patch: Use the debian version. + debian/samba-common.dirs: Move /var/lib/samba/private from samba.dirs. (LP: #1268180)
Available diffs
samba (2:4.1.6+dfsg-1ubuntu6) utopic; urgency=medium * Set the stack size to unlimited during the build to avoid a SIGBUS in xsltproc on some architectures. -- Colin Watson <email address hidden> Mon, 02 Jun 2014 23:18:40 +0100
Available diffs
Superseded in utopic-proposed |
samba (2:4.1.6+dfsg-1ubuntu5) utopic; urgency=medium * Backport from unstable (Ivo De Decker): - Build-depend on heimdal-dev. -- Colin Watson <email address hidden> Mon, 02 Jun 2014 15:39:54 +0100
Available diffs
Superseded in utopic-proposed |
samba (2:4.1.6+dfsg-1ubuntu4) utopic; urgency=high * No change rebuild against new dh_installinit, to call update-rc.d at postinst. -- Dimitri John Ledkov <email address hidden> Wed, 28 May 2014 10:41:32 +0100
Available diffs
samba (2:4.1.6+dfsg-1ubuntu2.14.04.1) trusty-proposed; urgency=medium * cherrypick upstream patch 1310919 to fix pam_winbind regression (LP: #1310919) -- Serge Hallyn <email address hidden> Tue, 29 Apr 2014 16:05:44 -0500
Available diffs
samba (2:4.1.6+dfsg-1ubuntu3) utopic; urgency=medium * cherrypick upstream patch 1310919 to fix pam_winbind regression (LP: #1310919) -- Serge Hallyn <email address hidden> Tue, 29 Apr 2014 16:05:44 -0500
Available diffs
Superseded in utopic-release |
Published in trusty-release |
Deleted in trusty-proposed (Reason: moved to release) |
samba (2:4.1.6+dfsg-1ubuntu2) trusty; urgency=medium * Fix a grammatical error in smb.conf that showed up in a ucf prompt on upgrade. -- Steve Langasek <email address hidden> Thu, 03 Apr 2014 19:08:03 -0700
Available diffs
samba (2:4.1.6+dfsg-1ubuntu1) trusty; urgency=low * Merge from Debian unstable. Remaining changes: + debian/VERSION.patch: Update vendor string to "Ubuntu". + debian/smb.conf; - Add "(Samba, Ubuntu)" to server string. - Comment out the default [homes] share, and add a comment about "valid users = %s" to show users how to restrict access to \\server\username to only username. + debian/samba-common.config: - Do not change prioritiy to high if dhclient3 is installed. + debian/control: - Don't build against or suggest ctdb and tdb. + debian/rules: - Drop explicit configuration options for ctdb and tdb. + Add ufw integration: - Created debian/samba.ufw.profile: - debian/rules, debian/samba.install: install profile + Add apport hook: - Created debian/source_samba.py. - debian/rules, debia/samb-common-bin.install: install hook. + debian/samba.logrotate: call upstart interfaces unconditionally instead of hacking arround with pid files. + Set sbmclients conflicts with samba4-clients less than 4.0.3+dfsg1-0.1ubuntu4, first dummy transitional package version. + Dropped patches: - debian/patches/CVE-2013-4496.patch: Dropped no longer needed - debian/patches/CVE-2013-6442.patch: Dropped no longer needed. - debian/patches/readline-ftbfs.patch: Use the debian version. + debian/samba-common.dirs: Move /var/lib/samba/private from samba.dirs. (LP: #1268180)
Available diffs
samba (2:4.1.3+dfsg-2ubuntu5) trusty; urgency=medium * debian/smb.conf: comment back some of the "share definitions" options (including "valid users"). That was an Ubuntu diff and seems to have been dropped in the trusty merge. Those changes seem needed to get the usershare feature working (used by nautilus-share) (lp: #1261873) -- Sebastien Bacher <email address hidden> Tue, 01 Apr 2014 16:01:04 +0200
Available diffs
samba (2:4.1.3+dfsg-2ubuntu4) trusty; urgency=medium * SECURITY UPDATE: Password lockout not enforced for SAMR password changes - debian/patches/CVE-2013-4496.patch: refactor password lockout code in source3/auth/check_samsec.c, source3/rpc_server/samr/srv_samr_chgpasswd.c, source3/rpc_server/samr/srv_samr_nt.c, source3/smbd/lanman.c, source4/rpc_server/samr/samr_password.c, source4/torture/rpc/samr.c. - CVE-2013-4496 * SECURITY UPDATE: smbcacls can remove a file or directory ACL by mistake - debian/patches/CVE-2013-6442.patch: handle existing ACL in source3/utils/smbcacls.c. - CVE-2013-6442 * debian/patches/readline-ftbfs.patch: fix ftbfs with newer readline6. -- Marc Deslauriers <email address hidden> Mon, 17 Mar 2014 08:32:30 -0400
Available diffs
samba (2:3.4.7~dfsg-1ubuntu3.14) lucid-security; urgency=medium * SECURITY UPDATE: Password lockout not enforced for SAMR password changes - debian/patches/CVE-2013-4496.patch: refactor password lockout code in source3/auth/auth_sam.c, source3/rpc_server/srv_samr_nt.c, source3/smbd/chgpasswd.c, source3/smbd/lanman.c, source4/rpc_server/samr/samr_password.c, source4/torture/rpc/samr.c. - CVE-2013-4496 -- Marc Deslauriers <email address hidden> Mon, 17 Mar 2014 10:53:36 -0400
Available diffs
samba (2:3.6.3-2ubuntu2.10) precise-security; urgency=medium * SECURITY UPDATE: Password lockout not enforced for SAMR password changes - debian/patches/CVE-2013-4496.patch: refactor password lockout code in source3/auth/check_samsec.c, source3/rpc_server/samr/srv_samr_chgpasswd.c, source3/rpc_server/samr/srv_samr_nt.c, source3/smbd/lanman.c, source4/rpc_server/samr/samr_password.c, source4/torture/rpc/samr.c. - CVE-2013-4496 -- Marc Deslauriers <email address hidden> Mon, 17 Mar 2014 08:54:32 -0400
Available diffs
samba (2:3.6.6-3ubuntu5.4) quantal-security; urgency=medium * SECURITY UPDATE: Password lockout not enforced for SAMR password changes - debian/patches/CVE-2013-4496.patch: refactor password lockout code in source3/auth/check_samsec.c, source3/rpc_server/samr/srv_samr_chgpasswd.c, source3/rpc_server/samr/srv_samr_nt.c, source3/smbd/lanman.c, source4/rpc_server/samr/samr_password.c, source4/torture/rpc/samr.c. - CVE-2013-4496 -- Marc Deslauriers <email address hidden> Mon, 17 Mar 2014 08:53:51 -0400
Available diffs
samba (2:3.6.18-1ubuntu3.2) saucy-security; urgency=medium * SECURITY UPDATE: Password lockout not enforced for SAMR password changes - debian/patches/CVE-2013-4496.patch: refactor password lockout code in source3/auth/check_samsec.c, source3/rpc_server/samr/srv_samr_chgpasswd.c, source3/rpc_server/samr/srv_samr_nt.c, source3/smbd/lanman.c, source4/rpc_server/samr/samr_password.c, source4/torture/rpc/samr.c. - CVE-2013-4496 -- Marc Deslauriers <email address hidden> Mon, 17 Mar 2014 08:51:05 -0400
Available diffs
samba (2:4.1.3+dfsg-2ubuntu3) trusty; urgency=medium * Depend on tdb-tools (LP: #1279593) * Updated generated config for Bind9.9. -- Stephane Graber <email address hidden> Wed, 12 Feb 2014 21:26:00 -0500
Available diffs
samba (2:4.1.3+dfsg-2ubuntu2) trusty; urgency=medium * Add missing python-ntdb dependency to python-samba (spotted by autopkgtest). -- Martin Pitt <email address hidden> Mon, 10 Feb 2014 09:53:01 +0100
Available diffs
Superseded in trusty-proposed |
samba (2:4.1.3+dfsg-2ubuntu1) trusty; urgency=low * Merge from Debian Unstable: - debian/VERSION.patch: Update vendor string to "Ubuntu". * debian/smb.conf; - Add "(Samba, Ubuntu)" to server string. - Comment out the default [homes] share, and add a comment about "valid users = %s" to show users how to restrict access to \\server\username to only username. + debian/samba-common.config: - Do not change prioritiy to high if dhclient3 is installed. + debian/control: - Don't build against or suggest ctdb and tdb. + debian/rules: - Drop explicit configuration options for ctdb and tdb. + Add ufw integration: - Created debian/samba.ufw.profile: - debian/rules, debian/samba.install: install profile + Add apport hook: - Created debian/source_samba.py. - debian/rules, debia/samb-common-bin.install: install hook. + debian/samba.logrotate: call upstart interfaces unconditionally instead of hacking arround with pid files. + Set sbmclients conflicts with samba4-clients less than 4.0.3+dfsg1-0.1ubuntu4, first dummy transitional package version.
Available diffs
samba (2:4.0.13+dfsg-1ubuntu1) trusty; urgency=low * Merge from Debian Unstable: - debian/VERSION.patch: Update vendor string to "Ubuntu". * debian/smb.conf; - Add "(Samba, Ubuntu)" to server string. - Comment out the default [homes] share, and add a comment about "valid users = %s" to show users how to restrict access to \\server\username to only username. + debian/samba-common.config: - Do not change prioritiy to high if dhclient3 is installed. + debian/control: - Don't build against or suggest ctdb and tdb. + debian/rules: - Drop explicit configuration options for ctdb and tdb. + Add ufw integration: - Created debian/samba.ufw.profile: - debian/rules, debian/samba.install: install profile + Add apport hook: - Created debian/source_samba.py. - debian/rules, debia/samb-common-bin.install: install hook. + debian/samba.logrotate: call upstart interfaces unconditionally instead of hacking arround with pid files. + Set sbmclients conflicts with samba4-clients less than 4.0.3+dfsg1-0.1ubuntu4, first dummy transitional package version.
Available diffs
samba (2:3.4.7~dfsg-1ubuntu3.13) lucid-security; urgency=low * SECURITY UPDATE: file restrictions bypass via alternate data streams - debian/patches/CVE-2013-4475.patch: properly check base file access in source3/smbd/open.c. - CVE-2013-4475 * SECURITY UPDATE: pam_winbind access restriction bypass via invalid group names - debian/patches/CVE-2012-6150.patch: ensure valid groups in nsswitch/pam_winbind.c. - CVE-2012-6150 * SECURITY UPDATE: arbitrary code execution via incorrect DCE-RPC fragment length field checking - debian/patches/CVE-2013-4408.patch: apply massive upstream fix to lib/async_req/async_sock.c, libcli/util/ntstatus.h, source3/lib/netapi/{group,localgroup,user}.c, source3/libnet/libnet_join.c, source3/libsmb/nterr.c, source3/rpc_client/{cli_lsarpc,cli_pipe}.c, source3/rpc_server/{srv_pipe,srv_pipe_hnd}.c, source3/rpcclient/cmd_samr.c, source3/smbd/lanman.c, source3/utils/{net_rpc,net_rpc_join}.c, source3/winbindd/winbindd_rpc.c, source4/libcli/util/{clilsa,nterr}.c, source4/libnet/{groupinfo,groupman,libnet_join,libnet_lookup, libnet_passwd,userinfo,userman}.c, source4/librpc/rpc/{dcerpc,dcerpc_smb,dcerpc_smb2,dcerpc_sock}.c, source4/winbind/wb_async_helpers.c. - CVE-2013-4408 -- Marc Deslauriers <email address hidden> Mon, 09 Dec 2013 12:41:25 -0500
Available diffs
samba (2:3.6.9-1ubuntu1.2) raring-security; urgency=low * SECURITY UPDATE: file restrictions bypass via alternate data streams - debian/patches/CVE-2013-4475.patch: properly check base file access in source3/smbd/open.c. - CVE-2013-4475 * SECURITY UPDATE: pam_winbind access restriction bypass via invalid group names - debian/patches/CVE-2012-6150.patch: ensure valid groups in nsswitch/pam_winbind.c. - CVE-2012-6150 * SECURITY UPDATE: arbitrary code execution via incorrect DCE-RPC fragment length field checking - debian/patches/CVE-2013-4408.patch: apply massive upstream fix to lib/async_req/async_sock.c, libcli/util/tstream.c, librpc/idl/dcerpc.idl, librpc/rpc/dcerpc_util.c, librpc/rpc/rpc_common.h, nsswitch/libwbclient/wbc_sid.c, nsswitch/wbinfo.c, source3/lib/netapi/{group,localgroup,user}.c, source3/lib/util_tsock.c, source3/libnet/libnet_join.c, source3/librpc/rpc/dcerpc_helpers.c, source3/rpc_client/{cli_lsarpc,cli_pipe}.c, source3/rpc_server/netlogon/srv_netlog_nt.c, source3/rpcclient/{cmd_lsarpc,cmd_samr}.c, source3/smbd/lanman.c, source3/utils/net_rpc.c, source3/utils/net_rpc_join.c, source3/winbindd/{wb_lookupsids,winbindd_msrpc,winbindd_rpc}.c, source4/libcli/util/clilsa.c, source4/libnet/{groupinfo,groupman, libnet_join,libnet_lookup,libnet_passwd,userinfo,userman}.c, source4/librpc/rpc/{dcerpc,dcerpc_smb,dcerpc_smb2,dcerpc_sock}.c, source4/winbind/wb_async_helpers.c. - CVE-2013-4408 -- Marc Deslauriers <email address hidden> Mon, 09 Dec 2013 10:32:37 -0500
Available diffs
samba (2:3.6.3-2ubuntu2.9) precise-security; urgency=low * SECURITY UPDATE: file restrictions bypass via alternate data streams - debian/patches/CVE-2013-4475.patch: properly check base file access in source3/smbd/open.c. - CVE-2013-4475 * SECURITY UPDATE: pam_winbind access restriction bypass via invalid group names - debian/patches/CVE-2012-6150.patch: ensure valid groups in nsswitch/pam_winbind.c. - CVE-2012-6150 * SECURITY UPDATE: arbitrary code execution via incorrect DCE-RPC fragment length field checking - debian/patches/CVE-2013-4408.patch: apply massive upstream fix to lib/async_req/async_sock.c, libcli/util/tstream.c, librpc/idl/dcerpc.idl, librpc/rpc/dcerpc_util.c, librpc/rpc/rpc_common.h, nsswitch/libwbclient/wbc_sid.c, nsswitch/wbinfo.c, source3/lib/netapi/{group,localgroup,user}.c, source3/lib/util_tsock.c, source3/libnet/libnet_join.c, source3/librpc/rpc/dcerpc_helpers.c, source3/rpc_client/{cli_lsarpc,cli_pipe}.c, source3/rpc_server/netlogon/srv_netlog_nt.c, source3/rpcclient/{cmd_lsarpc,cmd_samr}.c, source3/smbd/lanman.c, source3/utils/net_rpc.c, source3/utils/net_rpc_join.c, source3/winbindd/{wb_lookupsids,winbindd_msrpc,winbindd_rpc}.c, source4/libcli/util/clilsa.c, source4/libnet/{groupinfo,groupman, libnet_join,libnet_lookup,libnet_passwd,userinfo,userman}.c, source4/librpc/rpc/{dcerpc,dcerpc_smb,dcerpc_smb2,dcerpc_sock}.c, source4/winbind/wb_async_helpers.c. - CVE-2013-4408 -- Marc Deslauriers <email address hidden> Mon, 09 Dec 2013 11:07:25 -0500
Available diffs
samba (2:3.6.6-3ubuntu5.3) quantal-security; urgency=low * SECURITY UPDATE: file restrictions bypass via alternate data streams - debian/patches/CVE-2013-4475.patch: properly check base file access in source3/smbd/open.c. - CVE-2013-4475 * SECURITY UPDATE: pam_winbind access restriction bypass via invalid group names - debian/patches/CVE-2012-6150.patch: ensure valid groups in nsswitch/pam_winbind.c. - CVE-2012-6150 * SECURITY UPDATE: arbitrary code execution via incorrect DCE-RPC fragment length field checking - debian/patches/CVE-2013-4408.patch: apply massive upstream fix to lib/async_req/async_sock.c, libcli/util/tstream.c, librpc/idl/dcerpc.idl, librpc/rpc/dcerpc_util.c, librpc/rpc/rpc_common.h, nsswitch/libwbclient/wbc_sid.c, nsswitch/wbinfo.c, source3/lib/netapi/{group,localgroup,user}.c, source3/lib/util_tsock.c, source3/libnet/libnet_join.c, source3/librpc/rpc/dcerpc_helpers.c, source3/rpc_client/{cli_lsarpc,cli_pipe}.c, source3/rpc_server/netlogon/srv_netlog_nt.c, source3/rpcclient/{cmd_lsarpc,cmd_samr}.c, source3/smbd/lanman.c, source3/utils/net_rpc.c, source3/utils/net_rpc_join.c, source3/winbindd/{wb_lookupsids,winbindd_msrpc,winbindd_rpc}.c, source4/libcli/util/clilsa.c, source4/libnet/{groupinfo,groupman, libnet_join,libnet_lookup,libnet_passwd,userinfo,userman}.c, source4/librpc/rpc/{dcerpc,dcerpc_smb,dcerpc_smb2,dcerpc_sock}.c, source4/winbind/wb_async_helpers.c. - CVE-2013-4408 -- Marc Deslauriers <email address hidden> Mon, 09 Dec 2013 10:34:07 -0500
Available diffs
samba (2:3.6.18-1ubuntu3.1) saucy-security; urgency=low * SECURITY UPDATE: file restrictions bypass via alternate data streams - debian/patches/CVE-2013-4475.patch: properly check base file access in source3/smbd/open.c. - CVE-2013-4475 * SECURITY UPDATE: pam_winbind access restriction bypass via invalid group names - debian/patches/CVE-2012-6150.patch: ensure valid groups in nsswitch/pam_winbind.c. - CVE-2012-6150 * SECURITY UPDATE: arbitrary code execution via incorrect DCE-RPC fragment length field checking - debian/patches/CVE-2013-4408.patch: apply massive upstream fix to lib/async_req/async_sock.c, libcli/util/tstream.c, librpc/idl/dcerpc.idl, librpc/rpc/dcerpc_util.c, librpc/rpc/rpc_common.h, nsswitch/libwbclient/wbc_sid.c, nsswitch/wbinfo.c, source3/lib/netapi/{group,localgroup,user}.c, source3/lib/util_tsock.c, source3/libnet/libnet_join.c, source3/librpc/rpc/dcerpc_helpers.c, source3/rpc_client/{cli_lsarpc,cli_pipe}.c, source3/rpc_server/netlogon/srv_netlog_nt.c, source3/rpcclient/{cmd_lsarpc,cmd_samr}.c, source3/smbd/lanman.c, source3/utils/net_rpc.c, source3/utils/net_rpc_join.c, source3/winbindd/{wb_lookupsids,winbindd_msrpc,winbindd_rpc}.c, source4/libcli/util/clilsa.c, source4/libnet/{groupinfo,groupman, libnet_join,libnet_lookup,libnet_passwd,userinfo,userman}.c, source4/librpc/rpc/{dcerpc,dcerpc_smb,dcerpc_smb2,dcerpc_sock}.c, source4/winbind/wb_async_helpers.c. - CVE-2013-4408 -- Marc Deslauriers <email address hidden> Mon, 09 Dec 2013 10:13:51 -0500
Available diffs
samba (2:4.0.10+dfsg-4ubuntu2) trusty; urgency=low * Set sbmclients conflicts with samba4-clients less than 4.0.3+dfsg1-0.1ubuntu4, first dummy transitional package version. -- Dmitrijs Ledkovs <email address hidden> Wed, 27 Nov 2013 21:50:43 +0000
Available diffs
Superseded in trusty-proposed |
samba (2:4.0.10+dfsg-4ubuntu1) trusty; urgency=low * Merge from Debian Unstable: - debian/VERSION.patch: Update vendor string to "Ubuntu". * debian/smb.conf; - Add "(Samba, Ubuntu)" to server string. - Comment out the default [homes] share, and add a comment about "valid users = %s" to show users how to restrict access to \\server\username to only username. + debian/samba-common.config: - Do not change prioritiy to high if dhclient3 is installed. + debian/control: - Don't build against or suggest ctdb and tdb. + debian/rules: - Drop explicit configuration options for ctdb and tdb. + Add ufw integration: - Created debian/samba.ufw.profile: - debian/rules, debian/samba.install: install profile + Add apport hook: - Created debian/source_samba.py. - debian/rules, debia/samb-common-bin.install: install hook. + debian/samba.logrotate: call upstart interfaces unconditionally instead of hacking arround with pid files. -- Chuck Short <email address hidden> Fri, 08 Nov 2013 13:47:46 +0800
Available diffs
Superseded in trusty-release |
Obsolete in saucy-release |
Deleted in saucy-proposed (Reason: moved to release) |
samba (2:3.6.18-1ubuntu3) saucy; urgency=low * Update config.{guess,sub} for AArch64. -- Matthias Klose <email address hidden> Wed, 09 Oct 2013 12:01:48 +0200
Available diffs
samba (2:3.4.7~dfsg-1ubuntu3.12) lucid-security; urgency=low * SECURITY UPDATE: denial of service via integer wrap in EA list reading - debian/patches/CVE-2013-4124.patch: check offsets in source3/smbd/nttrans.c. - CVE-2013-4124 * This packages does _not_ contain the changes from 2:3.4.7~dfsg-1ubuntu3.11 in lucid-proposed. -- Marc Deslauriers <email address hidden> Tue, 24 Sep 2013 11:39:37 -0400
Available diffs
samba (2:3.6.9-1ubuntu1.1) raring-security; urgency=low * SECURITY UPDATE: denial of service via integer wrap in EA list reading - debian/patches/CVE-2013-4124.patch: check offsets in source3/smbd/nttrans.c. - CVE-2013-4124 * debian/patches/waf-as-source.patch: removed part that fails to apply using saucy's quilt. -- Marc Deslauriers <email address hidden> Mon, 23 Sep 2013 14:59:01 -0400
Available diffs
samba (2:3.6.3-2ubuntu2.8) precise-security; urgency=low * SECURITY UPDATE: denial of service via integer wrap in EA list reading - debian/patches/CVE-2013-4124.patch: check offsets in source3/smbd/nttrans.c. - CVE-2013-4124 -- Marc Deslauriers <email address hidden> Mon, 23 Sep 2013 15:03:56 -0400
Available diffs
samba (2:3.6.6-3ubuntu5.2) quantal-security; urgency=low * SECURITY UPDATE: denial of service via integer wrap in EA list reading - debian/patches/CVE-2013-4124.patch: check offsets in source3/smbd/nttrans.c. - CVE-2013-4124 * debian/patches/waf-as-source.patch: removed part that fails to apply using saucy's quilt. * This package does _not_ contain the changes from 2:3.6.6-3ubuntu5.1 in quantal-proposed. -- Marc Deslauriers <email address hidden> Mon, 23 Sep 2013 15:02:09 -0400
Available diffs
samba (2:3.6.18-1ubuntu2) saucy; urgency=low * /etc/init.d/samba exists again as an init script, so drop ill-fated code which tries to remove it in the postinst. LP: #1216438. -- Steve Langasek <email address hidden> Sun, 25 Aug 2013 10:04:09 -0700
Available diffs
- diff from 2:3.6.18-1ubuntu1 to 2:3.6.18-1ubuntu2 (574 bytes)
samba (2:3.6.18-1ubuntu1) saucy; urgency=low * Merge from Debian unstable. Remaining changes: + debian/patches/VERSION.patch: - set SAMBA_VERSION_SUFFIX to Ubuntu. + debian/smb.conf: - add "(Samba, Ubuntu)" to server string. - comment out the default [homes] share, and add a comment about "valid users = %S" to show users how to restrict access to \\server\username to only username. + debian/samba-common.config: - Do not change priority to high if dhclient3 is installed. - Use priority medium instead of high for the workgroup question. + debian/control: - Don't build against or suggest ctdb. - Add dependency on samba-common-bin to samba. + Add ufw integration: - Created debian/samba.ufw.profile - debian/rules, debian/samba.install: install profile. - debian/control: have samba suggest ufw. + Add apport hook: - Created debian/source_samba.py. - debian/rules, debian/samba-common-bin.install: install hook. + d/rules: Drop explicit configuration options for ctdb. + debian/samba.logrotate: call upstart interfaces unconditionally instead of hacking around with pid files.
Available diffs
samba (2:3.6.15-1ubuntu2) saucy; urgency=low * Cherry-pick 0383e7b04138ad94545a2191019873f26ae3e351 from Debian's packaging repository to fix waf-as-source patch fuzz causing the package to fail to unpack. -- Iain Lane <email address hidden> Thu, 15 Aug 2013 13:30:54 +0100
Available diffs
- diff from 2:3.6.15-1ubuntu1 to 2:3.6.15-1ubuntu2 (666 bytes)
Deleted in quantal-proposed (Reason: moved to -updates) |
samba (2:3.6.6-3ubuntu5.1) quantal-proposed; urgency=low * Fix login with expiring user passwords (LP: #1003296) - Fixed in Samba 3.6.9 (Samba bug: 9013) -- Bryan Quigley <email address hidden> Wed, 10 Jul 2013 14:45:45 -0400
Available diffs
samba (2:3.6.3-2ubuntu2.7) precise-proposed; urgency=low * Fix login with expiring user passwords (LP: #1003296) - Fixed in Samba 3.6.9 (Samba bug: 9013) -- Bryan Quigley <email address hidden> Wed, 10 Jul 2013 12:25:17 -0400
Available diffs
301 → 375 of 640 results | First • Previous • Next • Last |