A SMB/CIFS File, Print, and Authentication Server
Samba is a suite of programs that allows SMB/CIFS clients to use the
Unix file space, printers, and authentication subsystem.
The package named samba contains all programs that are needed to act as
a server. The binaries expect the configuration file to be found in
/etc/samba/smb.conf
For a more detailed description of Samba, check the samba-doc package
or the Samba.org Web page at http://www.Samba.org/
Please check http://en.openSUSE.org/Samba for general information on
Samba as part of SUSE Linux Enterprise or openSUSE products, links to
binary packages of the most current Samba version, and a bug reporting
how to.
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout SUSE:SLE-15-SP4:GA/samba && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_service | 0000001941 1.9 KB | |
baselibs.conf | 0000001118 1.09 KB | |
samba-4.15.2+git.196.cf71c95e07e.tar.bz2 | 0025422079 24.2 MB | |
samba-client-rpmlintrc | 0000000037 37 Bytes | |
samba.changes | 0000554809 542 KB | |
samba.spec | 0000086804 84.8 KB |
Revision 3 (latest revision is 4)
Stefan Weiberg (suntorytimed)
committed
(revision 3)
- Fix dependency problem upgrading from libndr0 to libndr2 and from libsamba-credentials0 to libsamba-credentials1; (bsc#1192684); - Fix regression introduced by CVE-2020-25717 patches, winbindd does not start when 'allow trusted domains' is off; (bso#14899); - Update to 4.15.2 * CVE-2016-2124: SMB1 client connections can be downgraded to plaintext authentication; (bso#12444); (bsc#1014440); * CVE-2020-25717: A user on the domain can become root on domain members; (bso#14556); (bsc#1192284); * CVE-2020-25718: Samba AD DC did not correctly sandbox Kerberos tickets issued by an RODC; (bso#14558); (bsc#1192246); * CVE-2020-25719: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets; (bso#14561); (bsc#1192247); * CVE-2020-25721: Kerberos acceptors need easy access to stable AD identifiers (eg objectSid); (bso#14557); (bsc#1192505); * CVE-2020-25722: Samba AD DC did not do suffienct access and conformance checking of data stored; (bso#14564); (bsc#1192283); * CVE-2021-3738: Use after free in Samba AD DC RPC server; (bso#14468); (bsc#1192215); * CVE-2021-23192: Subsequent DCE/RPC fragment injection vulnerability; (bso#14875); (bsc#1192214);
Comments 0