Dear Stable Release Managers, After a first upload which you approved and entered s-p-u, we (Samba package maintainers) would like to upload a second update for packages in lenny.
This update's changelog is: samba (2:3.2.5-4lenny2) stable-proposed-updates; urgency=low * Do not abort rename process on valid rename script. Closes: #519974 * Allow Office 2007 to save files on Samba-mapped drives. Closes: #520284 -- Christian Perrier <bubu...@debian.org> Sun, 22 Mar 2009 17:53:21 +0100 Both updates are patches added by upstream to their post-3.2.5 versions (upstream bugs #5957 and #6160). I attached them to this mail. Would you agree for this upload to s-p-u? (I know that the first point release is in the pipes so we might miss it....then we'll wait for the second point release)
Goal: do not abort rename process on valid rename script Fixes: #519974 Status wrt upstream: Fixed in 3.2.6 Author: Guenther Deschner <g...@samba.org> Index: lenny/source/passdb/pdb_ldap.c =================================================================== --- lenny.orig/source/passdb/pdb_ldap.c +++ lenny/source/passdb/pdb_ldap.c @@ -2010,7 +2010,7 @@ newname_lower, true, true); - if (rename_script) { + if (!rename_script) { return NT_STATUS_NO_MEMORY; } rename_script = realloc_string_sub2(rename_script,
Goal: allow Office 2007 to save files on Samba-mapped drives Fixes: #520284 Status wrt upstream: Fixed in 3.3.1 Author: Jeremy Allison <j...@samba.org> Index: lenny/source/smbd/open.c =================================================================== --- lenny.orig/source/smbd/open.c +++ lenny/source/smbd/open.c @@ -2126,6 +2126,14 @@ return NT_STATUS_NOT_A_DIRECTORY; } + /* We need to support SeSecurityPrivilege for this. */ + if (access_mask & SEC_RIGHT_SYSTEM_SECURITY) { + DEBUG(10, ("open_directory: open on %s " + "failed - SEC_RIGHT_SYSTEM_SECURITY denied.\n", + fname)); + return NT_STATUS_PRIVILEGE_NOT_HELD; + } + switch( create_disposition ) { case FILE_OPEN: @@ -2677,6 +2685,20 @@ status = NT_STATUS_PRIVILEGE_NOT_HELD; goto fail; } +#else + /* We need to support SeSecurityPrivilege for this. */ + if (access_mask & SEC_RIGHT_SYSTEM_SECURITY) { + status = NT_STATUS_PRIVILEGE_NOT_HELD; + goto fail; + } + /* Don't allow a SACL set from an NTtrans create until we + * support SeSecurityPrivilege. */ + if (!VALID_STAT(sbuf) && + lp_nt_acl_support(SNUM(conn)) && + sd && (sd->sacl != NULL)) { + status = NT_STATUS_PRIVILEGE_NOT_HELD; + goto fail; + } #endif if ((conn->fs_capabilities & FILE_NAMED_STREAMS)
signature.asc
Description: Digital signature