Пакет samba-vfs-snapper: Информация
Default inline alert: Версия в репозитории: 4.20.0-alt1
Бинарный пакет: samba-vfs-snapper
Версия: 4.14.9-alt1
Архитектура: aarch64
Собран: 4 ноября 2021 г. 7:42 в задании #288702
Исходный пакет: samba
Категория: Система/Библиотеки
Сообщить об ошибке в пакетеДомашняя страница: http://www.samba.org/
О пакете: Samba VFS module exposes snapshots managed by snapper as shadow-copies
Описание:
Samba VFS module for exposes snapshots managed by snapper for use by Samba. This provides the ability for remote SMB clients to access shadow-copies via Windows Explorer using the "previous versions" dialog. Snapshots can also be created and remove remotely, using the File Server Remote VSS Protocol (FSRVP). Snapshot creation and deletion requests are forwarded to snapper via DBus
Сопровождающий: Evgeny Sinelnikov
Список участников:
Evgeny Sinelnikov
Ivan A. Melnikov
Michael Shigorin
Grigory Ustinov
Alexey Shabalin
Alexey Sheplyakov
Andrey Cherepanov
Igor Vlasenko
Vitaly Kuznetsov
Evgeny Sinelnikov
Ivan A. Melnikov
Michael Shigorin
Grigory Ustinov
Alexey Shabalin
Alexey Sheplyakov
Andrey Cherepanov
Igor Vlasenko
Vitaly Kuznetsov
Последнее изменение
1 ноября 2021 г. Evgeny Sinelnikov 4.14.9-alt1
- Update to latest security release of Samba 4.14 - Backport bronze bit fixes, tests, and selftest improvements. Provide a fix for MS in Samba [SECURITY] 'Bronze bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal (Fixes: CVE-2020-17049).
6 октября 2021 г. Evgeny Sinelnikov 4.14.8-alt1
- Update to latest security release of Samba 4.14 - Fix performance regressions in lsa_LookupSids3/LookupNames4 since Samba 4.9 by using an explicit database handle cache and address a signifcant in database access in the AD DC since Samba 4.12. - Fix an unuthenticated user can crash the AD DC KDC by omitting the server name in a TGS-REQ (Fixes: CVE-2021-3671).
5 октября 2021 г. Evgeny Sinelnikov 4.14.7-alt5
- Add pythonarchdir repplacement due compatibility with alt security python trust mode (enabled if /etc/alt/security/python-trust exists).