enterprise-support team mailing list archive
-
enterprise-support team
-
Mailing list archive
-
Message #09010
[Bug 1993380] [NEW] Merge samba from Debian unstable for l-series
Public bug reported:
Scheduled-For: ubuntu-22.12
Upstream: 4.16.5
Debian: 2:4.16.5+dfsg-2 2:4.17.0+dfsg-2
Ubuntu: 2:4.16.4+dfsg-2ubuntu1
Debian new has 2:4.17.0+dfsg-2
### New Debian Changes ###
samba (2:4.16.5+dfsg-2) unstable; urgency=medium
[ Michael Tokarev ]
* d/tests/util: use printf for formatting password for smbpasswd,
not non-standard echo /n (mr !60)
* introduce LDB_2.4.4 version symbol (Closes: #1021371)
Create an empty ABI file just to make the scripts run during the build
stage to introduce LDB_2.4.4 version symbol into libldb.so, and remove
this empty file in the clean target. It is a bit hackish but works fine.
This is only needed to upgrade from bullseye to bookworm, from
4.13.13+dfsg-1~deb11u5+ to the next release, 4.16+.
Remove this for bookworm+.
* dont-ignore-errors-in-random-number-generation-CVE-2022-1615.patch:
GnuTLS gnutls_rnd() can fail and give predictable random values.
Closes: #1021024, CVE-2022-1615
[ John Paul Adrian Glaubitz ]
* disable ceph support on ppc64 and x32 (Closes: #1020781, #1012165)
-- Michael Tokarev <mjt@xxxxxxxxxx> Sat, 08 Oct 2022 15:11:15 +0300
samba (2:4.16.5+dfsg-1) unstable; urgency=medium
* new (minor) upstream release 4.16.5
* removed fix-samba-tool-domain-join-segfault.patch (included upstream)
* d/gbp.conf: no need to filter orig.tar: uscan already does that
-- Michael Tokarev <mjt@xxxxxxxxxx> Thu, 08 Sep 2022 12:44:38 +0300
samba (2:4.16.4+dfsg-2) unstable; urgency=medium
* d/libldb2.symbols: include newly added symbols
-- Michael Tokarev <mjt@xxxxxxxxxx> Mon, 01 Aug 2022 15:43:11 +0300
samba (2:4.16.4+dfsg-1) unstable; urgency=high
* new upstream security release fixing:
o CVE-2022-2031: Samba AD users can bypass certain restrictions associated
with changing passwords.
https://www.samba.org/samba/security/CVE-2022-2031.html
o CVE-2022-32742: Server memory information leak via SMB1.
https://www.samba.org/samba/security/CVE-2022-32742.html
o CVE-2022-32744: Samba AD users can forge password change requests
for any user.
https://www.samba.org/samba/security/CVE-2022-32744.html
o CVE-2022-32745: Samba AD users can crash the server process with an LDAP
add or modify request.
https://www.samba.org/samba/security/CVE-2022-32745.html
o CVE-2022-32746: Samba AD users can induce a use-after-free in the server
process with an LDAP add or modify request.
https://www.samba.org/samba/security/CVE-2022-32746.html
* Closes: #1016449, CVE-2022-2031 CVE-2022-32742, CVE-2022-32744,
CVE-2022-32745, CVE-2022-32746
-- Michael Tokarev <mjt@xxxxxxxxxx> Wed, 27 Jul 2022 18:35:53 +0300
samba (2:4.16.3+dfsg-1) unstable; urgency=medium
[ Michael Tokarev ]
* new upstream minor/bugfix releae. See WHATSNEW.txt for details.
* d/watch: add the forgotten repacksuffix=+dfsg
[ Andreas Hasenack ]
* update nfs configuration examples for ctdb
-- Michael Tokarev <mjt@xxxxxxxxxx> Mon, 18 Jul 2022 17:15:07 +0300
samba (2:4.16.2+dfsg-1) unstable; urgency=medium
* new upstream minor/bugfix release.
* removed waf-add-support-for-GNU-kFreeBSD.patch (applied upstream)
* new minor version of libldb
(no code changes, just the build system update to support python 3.11)
* move samba-dcerpcd from samba package to samba-common-bin due to winbind
New in 4.16 samba-dcerpcd binary is used by smbd and winbind, so putting
it to samba package makes winbind unable to run it without samba.
For now, in order to fix this issue, move this binary from samba to
samba-common-bin package. It might be worth creating its own package
for this binary (or maybe some more binaries), once it is clear where
upstream is going to. Making this binary a part of samba-common-bin
adds some more files to smbclient-only setup.
(Closes: #1012240)
* remove mksmbpasswd script and manpage: we have smbpasswd whcih can add
entries to smbpasswd file if needed, and can handle other passwod storage
formats too
-- Michael Tokarev <mjt@xxxxxxxxxx> Mon, 13 Jun 2022 19:08:44 +0300
samba (2:4.16.1+dfsg-8) unstable; urgency=medium
* fix the Breaks/Replaces versions in the previous upload for moving
libsamba-utils.so, and use the same Breaks/Replaces for the -dev
packages too
-- Michael Tokarev <mjt@xxxxxxxxxx> Tue, 07 Jun 2022 14:11:09 +0300
samba (2:4.16.1+dfsg-7) unstable; urgency=medium
* drop libunwind-dev build dependency again: it turned out the
### Old Ubuntu Delta ###
samba (2:4.16.4+dfsg-2ubuntu1) kinetic; urgency=medium
* Merge with Debian unstable. Remaining changes:
- d/p/VERSION.patch: Update vendor string to 'Ubuntu'.
- debian/smb.conf;
+ Add '(Samba, Ubuntu)' to server string.
+ Comment out the default [homes] share, and add a comment about
'valid users = %s' to show users how to restrict access to
/server/username to only username.
- debian/control: Ubuntu i386 binary compatibility:
+ drop ceph support
- d/control: enable the liburing vfs module, except on i386 where
liburing is not available
- d/t/{cifs-share-access-uring,smbclient-share-access-uring}:
Skip running the tests if on i386 platform, because the uring
package is not available there.
- d/t/util: fix setting the password of the smb test user
(LP #1955851)
- d/rules: in Ubuntu, glusterfs is not built for i386, so don't
enable the samba glusterfs vfs mofule in that case
- d/control: build-depend on libglusterfs-dev only on !i386 arches
-- Andreas Hasenack <andreas@xxxxxxxxxxxxx> Tue, 02 Aug 2022 09:30:05
-0300
** Affects: samba (Ubuntu)
Importance: Undecided
Status: New
** Tags: needs-merge upgrade-software-version
--
You received this bug notification because you are a member of Ubuntu
Server/Client Support Team, which is subscribed to samba in Ubuntu.
Matching subscriptions: Ubuntu Server/Client Support Team
https://bugs.launchpad.net/bugs/1993380
Title:
Merge samba from Debian unstable for l-series
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1993380/+subscriptions
Follow ups