[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SRM] 2nd update for samba packages in lenny



Dear Stable Release Managers,

After a first upload which you approved and entered s-p-u, we (Samba
package maintainers) would like to upload a second update for packages
in lenny.

This update's changelog is:

samba (2:3.2.5-4lenny2) stable-proposed-updates; urgency=low

  * Do not abort rename process on valid rename script. Closes: #519974
  * Allow Office 2007 to save files on Samba-mapped drives. Closes: #520284

 -- Christian Perrier <bubulle@debian.org>  Sun, 22 Mar 2009 17:53:21 +0100


Both updates are patches added by upstream to their post-3.2.5
versions (upstream bugs #5957 and #6160). I attached them to this
mail.

Would you agree for this upload to s-p-u?

(I know that the first point release is in the pipes so we might miss
it....then we'll wait for the second point release)

Goal: do not abort rename process on valid rename script

Fixes: #519974

Status wrt upstream: Fixed in 3.2.6

Author: Guenther Deschner <gd@samba.org>

Index: lenny/source/passdb/pdb_ldap.c
===================================================================
--- lenny.orig/source/passdb/pdb_ldap.c
+++ lenny/source/passdb/pdb_ldap.c
@@ -2010,7 +2010,7 @@
 					newname_lower,
 					true,
 					true);
-	if (rename_script) {
+	if (!rename_script) {
 		return NT_STATUS_NO_MEMORY;
 	}
 	rename_script = realloc_string_sub2(rename_script,
Goal: allow Office 2007 to save files on Samba-mapped drives

Fixes: #520284

Status wrt upstream: Fixed in 3.3.1

Author: Jeremy Allison <jra@samba.org>

Index: lenny/source/smbd/open.c
===================================================================
--- lenny.orig/source/smbd/open.c
+++ lenny/source/smbd/open.c
@@ -2126,6 +2126,14 @@
 		return NT_STATUS_NOT_A_DIRECTORY;
 	}
 
+	/* We need to support SeSecurityPrivilege for this. */
+	if (access_mask & SEC_RIGHT_SYSTEM_SECURITY) {
+		DEBUG(10, ("open_directory: open on %s "
+			"failed - SEC_RIGHT_SYSTEM_SECURITY denied.\n",
+			fname));
+		return NT_STATUS_PRIVILEGE_NOT_HELD;
+	}
+
 	switch( create_disposition ) {
 		case FILE_OPEN:
 
@@ -2677,6 +2685,20 @@
 		status = NT_STATUS_PRIVILEGE_NOT_HELD;
 		goto fail;
 	}
+#else
+	/* We need to support SeSecurityPrivilege for this. */
+	if (access_mask & SEC_RIGHT_SYSTEM_SECURITY) {
+		status = NT_STATUS_PRIVILEGE_NOT_HELD;
+		goto fail;
+	}
+	/* Don't allow a SACL set from an NTtrans create until we
+	 * support SeSecurityPrivilege. */
+	if (!VALID_STAT(sbuf) &&
+			lp_nt_acl_support(SNUM(conn)) &&
+			sd && (sd->sacl != NULL)) {
+		status = NT_STATUS_PRIVILEGE_NOT_HELD;
+		goto fail;
+	}
 #endif
 
 	if ((conn->fs_capabilities & FILE_NAMED_STREAMS)

Attachment: signature.asc
Description: Digital signature


Reply to: