The annotated tag, samba-4.6.8 has been created at 4a3bb952f9fac1b3a1b691eacbc6dea2a79d11c7 (tag) tagging be2ffca00a983bc3e599e0eb84ab35c517e9d07c (commit) replaces samba-4.6.7 tagged by Karolin Seeger on Wed Sep 13 13:09:12 2017 -0700
- Log ----------------------------------------------------------------- samba: tag release samba-4.6.8 -----BEGIN PGP SIGNATURE----- iEYEABECAAYFAlm5kGkACgkQbzORW2Vot+odjgCeNBQmGwEEIsplv4/U+LQBoQfo XCwAoLynLKomS8M39jyhcBj/zrJYnhtn =Q0cb -----END PGP SIGNATURE----- Jeremy Allison (1): CVE-2017-12163: s3:smbd: Prevent client short SMB1 write from writing server memory to file. Karolin Seeger (3): VERSION: Bump version up to 4.6.8... WHATSNEW: Add release notes for Samba 4.6.8. VERSION: Disable GIT_SNAPSHOTS for the 4.6.8 release. Stefan Metzmacher (10): CVE-2017-12150: s3:popt_common: don't turn a guessed username into a specified one CVE-2017-12150: s3:lib: get_cmdline_auth_info_signing_state smb_encrypt SMB_SIGNING_REQUIRED CVE-2017-12150: s3:pylibsmb: make use of SMB_SIGNING_DEFAULT for 'samba.samba3.libsmb_samba_internal' CVE-2017-12150: libgpo: make use of SMB_SIGNING_REQUIRED in gpo_connect_server() CVE-2017-12150: auth/credentials: cli_credentials_authentication_requested() should check for NTLM_CCACHE/SIGN/SEAL CVE-2017-12150: libcli/smb: add smbXcli_conn_signing_mandatory() CVE-2017-12150: s3:libsmb: only fallback to anonymous if authentication was not requested CVE-2017-12151: s3:libsmb: add cli_state_is_encryption_on() helper function CVE-2017-12151: s3:libsmb: make use of cli_state_is_encryption_on() selftest: make samba3.blackbox.smbclient_s3.*follow.symlinks.*no as flapping ----------------------------------------------------------------------- -- Samba Shared Repository