Commit graph

4 commits

Author SHA1 Message Date
asau
22f7c5eacb Update to Samba 3.5.11 from net/samba35, part of Samba packages rearrangement. 2011-12-16 11:05:24 +00:00
jlam
2a085db787 Update net/samba to 3.0.1. Major changes from version 2.2.8anb6 include:
* Active Directory support.  Samba is able to join a ADS realm as
    a member server and authenticate using LDAP/Kerberos.
  * Unicode support.
  * New, more flexible authentication (passdb) system.
  * A new "net" command that is similar to the "net" command in Windows.
  * Samba now negotiates NT-style status32 codes on the wire, which
    greatly improves error handling.
  * Better Windows 2K/2K3/XP printing support.
  * Loadable module support for passdb backends and character sets.
  * More performant winbindd.
  * Support for migrating from a Windows NT4 domain to a Samba domain
    and maintaining user, group, and domain SIDs.
  * Support for establishing trust relationships with Windows NT4 DCs.
  * Initial support for a distributed Winbind architecture using an
    LDAP directory for storing SID-to-uid/gid mappings.
  * Major updates to the Samba documentation tree.
  * Full support for client and server SMB signing to ensure
    compatibility with default Windows 2K3 security settings.
  * Improvement of ACL mapping features.
2004-01-11 02:26:30 +00:00
martti
43620ece71 Updated samba to 2.2.8
****************************************
* IMPORTANT: Security bugfix for Samba *
****************************************

The SuSE security audit team, in particular Sebastian Krahmer
<krahmer@suse.de>, has found a flaw in the Samba main smbd code which
could allow an external attacker to remotely and anonymously gain
Super User (root) privileges on a server running a Samba server.

This flaw exists in previous versions of Samba from 2.0.x to 2.2.7a
inclusive.  This is a serious problem and all sites should either
upgrade to Samba 2.2.8 immediately or prohibit access to TCP ports 139
and 445. Advice created by Andrew Tridgell, the leader of the Samba
Team, on how to protect an unpatched Samba server is given at the end
of this section.

The SMB/CIFS protocol implemented by Samba is vulnerable to many
attacks, even without specific security holes.  The TCP ports 139 and
the new port 445 (used by Win2k and the Samba 3.0 alpha code in
particular) should never be exposed to untrusted networks.
2003-03-16 07:57:43 +00:00
jdolecek
6376a67187 open_file_shared(): when falling back to O_RDONLY open_file() call after
O_RDWR fails in fcbopen case, remember the errno from previous open_file()
call and set errno back to this value if the second open_file() call
fails too

this makes samba report EACCESS instead of confusing ENOENT if creation
of file fails due to insufficient permissions for SMBcreate/SMBmknew call

bump package revision
2003-02-18 11:25:57 +00:00