Jeff Layton
2014-Jul-11 15:31 UTC
[Samba] ANNOUNCE: cifs-utils release 6.4 ready for download
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Wow, about 6 months since last cifs-utils release. How time flies. With Guenter's fix for the uppercasing of device names last week, it's probably a good time to go ahead make a new one. There's not much activity this cycle so this is mostly bugfixes, though there is a new autoconf option to allow you to configure the PAM installation directory from Lars. Go forth and download! webpage: https://wiki.samba.org/index.php/LinuxCIFS_utils tarball: ftp://ftp.samba.org/pub/linux-cifs/cifs-utils/ git: git://git.samba.org/cifs-utils.git gitweb: http://git.samba.org/?p=cifs-utils.git;a=summary Detailed list of changes since 6.4 was released: commit 594f03a5c053d2a539ffb8e2889832829ee542ee Author: Jeff Layton <jlayton at samba.org> Date: Wed Apr 2 10:21:10 2014 -0400 autoconf: set version to 6.3.1 for interim builds Signed-off-by: Jeff Layton <jlayton at samba.org> commit 00a1cee869fce5b6aa79683da19a2529c2cfd690 Author: Lars M?ller <lars at samba.org> Date: Mon Apr 7 14:35:10 2014 -0400 autoconf: allow PAM security install directory to be configurable Allow the pam module install directory to be set at build time. Signed-off-by: Jeff Layton <jlayton at samba.org> commit a016e18969d10e3c777f35fe21b1c1f8c1d70880 Author: Jeff Layton <jlayton at samba.org> Date: Mon Apr 7 14:35:17 2014 -0400 cifs: use krb5_kt_default() to determine default keytab location ...don't assume that it's in /etc/krb5.keytab. Reported-by: Konstantin Lepikhov <klepikho at redhat.com> Signed-off-by: Jeff Layton <jlayton at samba.org> commit 0c521d5060035da655107001374e08873ac5dde8 Author: Sebastian Krahmer <krahmer at suse.de> Date: Mon Apr 14 11:39:41 2014 +0200 cifskey: better use snprintf() Prefer snprintf() over sprintf() in cifskey.c Projects that fork the code (pam_cifscreds) can't rely on the max-size parameters. [jlayton: removed unneeded initialization of "len" in key_add] Signed-off-by: Sebastian Krahmer <krahmer at suse.de> commit 3da4c43b575498be86c87a2ac3f3142e3cab1c59 Author: Jeff Layton <jlayton at samba.org> Date: Sun Apr 20 20:41:05 2014 -0400 cifscreds: better error handling when key_search fails If we ended up getting a bogus string that would have overflowed, then make key_search set errno to EINVAL before returning. The callers can then test to see if the returned error is what was expected or something else and handle it appropriately. Cc: Sebastian Krahmer <krahmer at suse.de> Signed-off-by: Jeff Layton <jlayton at samba.org> commit 382ec63757c1d8d4d399d17ccc927c4897d4cfc9 Author: Jeff Layton <jlayton at samba.org> Date: Sun Apr 20 20:41:05 2014 -0400 cifscreds: better error handling for key_add If the string buffers would have been overrun, set errno to EINVAL before returning. Then, have the callers report the errors to stderr or syslog as appropriate. Cc: Sebastian Krahmer <krahmer at suse.de> Signed-off-by: Jeff Layton <jlayton at samba.org> commit 43fd65ba0fca85a86a79e84bb2bc42b531d858e6 Author: Guenter Kukkukk <kukks at samba.org> Date: Tue Jul 1 17:43:55 2014 +0200 mount.cifs: on 2nd try mount.cifs must also uppercase "orig_dev" Recent kernels now ignore "unc=..." mount option. mount.cifs, when getting errno=ENXIO, retries the mount with uppercased hostname, sharename and prefixpath in the "unc=..." mount option, which is ignored now in the kernel. Used e.g. during OS/2 mounts, which fail now. Also uppercase the now used "orig_dev" parameter. Signed-off-by: Guenter Kukkukk <kukks at samba.org> commit 487f46da737291877867cbd3acb40fea087d3863 Author: Jeff Layton <jlayton at samba.org> Date: Fri Jul 11 11:14:06 2014 -0400 autoconf: set version to 6.4 Signed-off-by: Jeff Layton <jlayton at samba.org> - -- Jeff Layton <jlayton at samba.org> -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBAgAGBQJTwANrAAoJEAAOaEEZVoIV1UMQAKh0sdf+oHqAf0f45hqvF/oT DwbgdfECIFpXSCXbJolRqGiGo2P72tWs/hr9Y3xAhduo4cvy5gjjdYFxy1ktjRlU wytniraRWPL2c4UndJLiJmlSTSt8/tffqGYcuaFZcZgo8S3A/tAhIkSHFo63tV8R +T+8L25sEhDO1Pia5Ybt+P+My4OdJtOXzR2Iwet195d1Q10Hm4Zdc8ShLIO58XmY X2dIWKzQXDjEBW0S4a3YLblHZO8U7pKWoTh2/UoF72xCsZRFrU/Fh12O8nWYsawQ xGsb/sPtpL77WeuQNXc0PtHnrSLsbJ3kMh/UNng3iECltUOtwDm/Z8O4V1EUcBvE TFuXKtxPjdy0qo6gFzfPFYMEK6peztGXdM1nkpS/ZXaXsYgaWjQqGNrtxJ0CGe2T UVCXNgw7u0/nC6RelWLi7LmKnOaJ9mODtffdvIW9LFws0/PwHad84eekcd0bT1QH jx4Zwv6QoggBcZDchfznjH+ELUZkkMIJ2/eMurBDWITSdQ+fBxNzo2YtPpZq6LpT 2X4ShDE/EcaOiAt6eYeLh10qX4HTo0hE1hVR1xE5MBTe1tEVasmuxiV9VBFlkFRs 36gQN4m3TZk/8bftS3KsarysFLkXkN4PhOsLKp2zV+er0uZkIyOfnh/yb4oLvcQ7 bZw03/z9u15k3W3d8FRF =1qK1 -----END PGP SIGNATURE-----
Seemingly Similar Threads
- ANNOUNCE: cifs-utils release 5.3 is ready for download
- ANNOUNCE: cifs-utils release 6.3 ready for download
- ANNOUNCE: cifs-utils release 5.6 is ready for download
- ANNOUNCE: cifs-utils release 4.7 available for download
- cifs-utils release 6.8 ready for download