a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package
Like last time, where this caused no complaints.
* BUG 9130: Certain xattrs cause Windows error 0x800700FF.
* BUG 9724: Use is_encrypted_packet() function correctly inside server.
* BUG 9733: Fix 'smbcontrol close-share' is not working.
* BUG 9747: Make sure that we only propogate the INHERITED flag when we are
allowed to.
* BUG 9748: Remove unneeded fstat system call from hot read path.
* BUG 9811: Fix bug in old create temp SMB request. Only use VFS functions.
* BUG 9650: New or deleted CUPS printerqueues are not recognized by Samba.
* BUG 9807: wbinfo: Fix segfault in wbinfo_pam_logon.
* BUG 9727: wkssvc: Fix NULL pointer dereference.
* BUG 9736: smbd: Tune "dir" a bit.
* BUG 9775: Fix segfault for "artificial" conn_structs.
* BUG 9809: RHEL SPEC: Package dbwrap_tool man page.
* BUG 9139: Fix the username map optimization.
* BUG 9699: Fix adding case sensitive spn.
* BUG 9723: Add a tool to migrate latin1 printing tdbs to registry.
* BUG 9735: Fix Winbind separator in upn to username conversion.
* BUG 9766: Cache name_to_sid/sid_to_name correctly.
==============================
Release Notes for Samba 3.6.12
January 30, 2013
==============================
This is a security release in order to address
CVE-2013-0213 (Clickjacking issue in SWAT) and
CVE-2013-0214 (Potential XSRF in SWAT).
o CVE-2013-0213:
All current released versions of Samba are vulnerable to clickjacking in the
Samba Web Administration Tool (SWAT). When the SWAT pages are integrated into
a malicious web page via a frame or iframe and then overlaid by other content,
an attacker could trick an administrator to potentially change Samba settings.
In order to be vulnerable, SWAT must have been installed and enabled
either as a standalone server launched from inetd or xinetd, or as a
CGI plugin to Apache. If SWAT has not been installed or enabled (which
is the default install state for Samba) this advisory can be ignored.
o CVE-2013-0214:
All current released versions of Samba are vulnerable to a cross-site
request forgery in the Samba Web Administration Tool (SWAT). By guessing a
user's password and then tricking a user who is authenticated with SWAT into
clicking a manipulated URL on a different web page, it is possible to manipulate
SWAT.
In order to be vulnerable, the attacker needs to know the victim's password.
Additionally SWAT must have been installed and enabled either as a standalone
server launched from inetd or xinetd, or as a CGI plugin to Apache. If SWAT has
not been installed or enabled (which is the default install state for Samba)
this advisory can be ignored.
Changes since 3.6.11:
--------------------
o Kai Blin <kai@samba.org>
* BUG 9576: CVE-2013-0213: Fix clickjacking issue in SWAT.
* BUG 9577: CVE-2013-0214: Fix potential XSRF in SWAT.
1) Move the INSTALL_TEMPLATES line to the 'winbind' option section.
2) Enable the install script on all platforms.
3) Use the value of ${NSS_WINBIND} in the script as the name of the
library (should work on all platforms).
4) In the install script only create the symlink if ${NSS_WINBIND} doesn't
start with '@comment' (i.e. no nss winbind on this platform) and the
target file exists and the symlink _doesn't_ already exist.
5) Create a DEINSTALL_TEMPLATES to remove the nss winbind symlink if it
exists and point to the correct target.
Bump PKGREVISION.
=============================
Release Notes for Samba 3.6.6
June 25, 2012
=============================
This is is the latest stable release of Samba 3.6.
Major enhancements in Samba 3.6.6 include:
o Fix possible memory leaks in the Samba master process (bug #8970).
o Fix uninitialized memory read in talloc_free().
o Fix joining of XP Pro workstations to 3.6 DCs (bug #8373).
Changes since 3.6.5:
--------------------
o Michael Adam <obnox@samba.org>
* BUG 8738: SMB2 server will not release unused shares.
* BUG 8749: Sign non guest sessions in SessionSetup.
* BUG 8921: Fix race writing registry values.
o Jeremy Allison <jra@samba.org>
* BUG 8373: Fix joining of XP Pro workstations to 3.6 DCs.
* BUG 8627: Fix crash bug in dns_create_probe when dns_create_update fails.
* BUG 8723: Add pthread-based aio VFS module.
* BUG 8784: When calculating the share security mask, take priviliges into
account for the connecting user.
* BUG 8811: sd_has_inheritable_components segfaults on an SD that
se_access_check accepts.
* BUG 8837: Fix crash in smbd when deleting directory and veto files are
enabled.
* BUG 8857: Setting traverse rights fails to enable directory traversal when
acl_xattr in use.
* BUG 8882: Broken processing of %U with vfs_full_audit when force user is
set.
* BUG 8897: Make winbind_krb5_locator not only returning one IP address.
* BUG 8910: resolve_ads() code can return zero addresses and miss valid
DC IP addresses.
* BUG 8922: smbclient's tarmode insists on listing excluded directories.
* BUG 8953: Winbind can hang as nbt_getdc() has no timeout.
* BUG 8957: Typo in pam_winbindd code MUST fix.
* BUG 8970: Fix possible memory leaks in the Samba master process.
* BUG 8971: cleanup_timeout_fn() is called too often, on exiting when an
smbd is idle.
* BUG 8972: Directory group write permission bit is set if unix extensions
are enabled.
o Christian Ambach <ambi@samba.org>
* BUG 8406: Fix a return code check in Winbind.
* BUG 8807: Fix crash in dcerpc_lsa_lookup_sids_noalloc() crashes when
groups has more than 1000 groups.
o Andrew Bartlett <abartlet@samba.org>
* BUG 8599: Only use SamLogonEx when we can get unencrypted session keys.
* BUG 8727: Fix smbclients with posix large reads.
* BUG 8943: Slow but responsive DC can lock up Winbind for > 10 minutes
at a time.
o Björn Baumbach <bb@sernet.de>
* BUG 7564: Fix default name resolve order in the manpage.
* BUG 8554, 8612, 8748: Add new printers to registry.
* BUG 8789: Remove whitespace in example samba.ldif.
o Alexander Bokovoy <ab@samba.org>
* BUG 8988: Avoid crash with MIT krb5 1.10.0 in gss_get_name_attribute().
o Alejandro Escanero Blanco <aescanero@gmail.com>
* BUG 8798: The primary rid should be in the groups rid array.
o Ira Cooper <samba@ira.wakeful.net>
* BUG 8729: Fix getpass regressions on Solaris/Illumos.
* BUG 8743: Fix configure.developer builds on Solaris.
* BUG 8910: Fix bad bugfix for bug #8910.
* BUG 8952: Fix negative SID->uid/gid cache handling.
* BUG 8995: Use fsp_persistent_id() as persistent_file_id part for SMB2.
o David Disseldorp <ddiss@samba.org>
* BUG 8762: Fix crash in printer_list_set_printer().
o Olaf Flebbe <o.flebbe@science-computing.de>
* BUG 8859: Fix assertion in reg_parse.
o Björn Jacke <bj@sernet.de>
* BUG 8732: Fix compile of krb5 locator on Solaris.
* BUG 8869: Remove outdated netscape ds 5 schema file.
* BUG 8978: Remove dependency on automake for 'make everything'.
o Steve Langasek <steve.langasek@ubuntu.com>
* BUG 8920: Fix null dereference in pdb_interface.
o Volker Lendecke <vl@samba.org>
* Fix uninitialized memory read in talloc_free().
* BUG 8567: Fix segfault in dom_sid_compare.
* BUG 8733: Delete streams on directories (streams_depot).
* BUG 8760: Add SERVERID_UNIQUE_ID_NOT_TO_VERIFY.
* BUG 8836: Fix segfaults on "smbcontrol close-share" in aio_fork.
* BUG 8861: Fix a segfault with debug level 3 on Solaris.
* BUG 8904: Fix Winbind crash triggered by 'wbinfo --lookup-sids ""'.
* BUG 8998: Notify code can miss a ChDir.
o Stefan Metzmacher <metze@samba.org>
* BUG 8139: Ignore SMBecho errors (the server may not support it).
* BUG 8527: db_ctdb_traverse fails to traverse records created within the
current transaction.
* BUG 8311: Winzip occasionally can not read files out of an open winzip
dialog.
* BUG 8739: Fill the sids array of the info in
wbcAuthUserInfo_to_netr_SamInfo3().
* BUG 8749: Sign non guest sessions in SessionSetup.
* BUG 8995: Use fsp_persistent_id() as persistent_file_id part for SMB2.
o Matthieu Patou <mat@matws.net>
* BUG 8599: Set the can_do_validation6 also for trusted domain.
* BUG 8714: Catch with pid filename's change when config file is not
smb.conf.
* BUG 8734: Don't try to do clever thing if the username is not found while
authenticating through Winbind.
* BUG 8771: Winbind takes up to 20 minutes to change from DC 1 to DC 2.
* BUG 8975: Call dump_core_setup after command line option has been parsed.
o SATOH Fumiyasu <fumiyas@osstech.co.jp>
* BUG 8826: Prepend '/' to filename argument (docs).
o Andreas Schneider <asn@samba.org>
* BUG 8944 and 8567: Don't lookup the system user in pdb.
o Richard Sharpe <realrichardsharpe@gmail.com>
* BUG 8768: Honor SeTakeOwnershipPrivilege when file opened with
SEC_STD_WRITE_OWNER.
* BUG 8797: Correctly handle DENY ACEs when privileges apply.
* BUG 8822: Fix building out-of-tree modules.
* BUG 8945: vfs_acl_common discards errors from writing to the underlying
storage.
* BUG 8970: Fix possible memory leaks in the Samba master process.
o Simo Sorce <idra@samba.org>
* BUG 8915: Fix pam_winbind build against newer iniparser library.
o Joseph Tam <jtam.home@gmail.com>
* BUG 8877: Syslog broken owing to mistyping of debug_settings.syslog.
o Ralph Wuerthner <ralph.wuerthner@de.ibm.com>
* BUG 8845: Move print_backend_init() behind init_system_info().
=============================
Release Notes for Samba 3.6.5
April 30, 2012
=============================
This is a security release in order to address
CVE-2012-2111 (Incorrect permission checks when granting/removing
privileges can compromise file server security).
o CVE-2012-2111:
Samba 3.4.x to 3.6.4 are affected by a
vulnerability that allows arbitrary users
to modify privileges on a file server.
This is a security release in order to address
CVE-2012-1182 ("root" credential remote code execution).
o CVE-2012-1182:
Samba 3.0.x to 3.6.3 are affected by a
vulnerability that allows remote code
execution as the "root" user.
Changes since 3.6.3:
--------------------
o Stefan Metzmacher <metze@samba.org>
*BUG 8815: PIDL based autogenerated code allows overwriting beyond of
allocated array (CVE-2012-1182).
1) Correct the path to the nsswitch directory in the samba-nss-winbind-install
and samba-nss-wins-install targets so they work again.
2) Switch back to using the the above mentioned targets for installing
nss-winbind and nss_wins. (These targets work on all platforms.)
3) Switch back to using ${NSS_WINBIND} and ${NSS_WINS} in the PLIST as
these work on all platforms.
Bump PKGREVISION
Samba 3.6.3:
This is a security release in order to address
CVE-2012-0817 (Memory leak/Denial of service).
o CVE-2012-0817:
The Samba File Serving daemon (smbd) in Samba versions
3.6.0 to 3.6.2 is affected by a memory leak that can
cause a server denial of service.
Samba 3.6.2:
Major enhancements in Samba 3.6.2 include:
o Make Winbind receive user/group information (bug #8371).
o Several SMB2 fixes.
For complete changes, please refer
http://www.samba.org/samba/history/samba-3.6.2.html and
http://www.samba.org/samba/history/samba-3.6.3.html.
Major enhancements in Samba 3.6.1 include:
o Fix smbd crashes triggered by Windows XP clients (bug #8384).
o Fix a Winbind race leading to 100% CPU load (bug #8409).
o Several SMB2 fixes.
o The VFS ACL modules are no longer experimental but production-ready.
Full release notes at http://www.samba.org/samba/history/samba-3.6.1.html
Major enhancements in Samba 3.6.0 include:
- Changed security defaults:
client ntlmv2 auth = yes
client use spnego principal = no
send spnego principal = no
- SMB2 support (fully functional with one omission)
- Internal Winbind passdb changes
- New Spoolss code
- ID Mapping Changes
- Endpoint Mapper
- Internal restructuring
- SMB Traffic Analyzer (http://holger123.wordpress.com/smb-traffic-analyzer/)
- NFS quota backend on Linux
Full release notes at http://www.samba.org/samba/history/samba-3.6.0.html
Samba 3.0 and 3.3. They were completely broken before this.
Bump PKGREVISION for both samba and samba33.
Fix from PR pkg/38961 by Makoto Fujiwara <makoto at ki dot nu>.