[SCM] Samba Shared Repository - annotated tag samba-4.13.0rc6 created
Stefan Metzmacher
metze at samba.org
Fri Sep 18 13:14:48 UTC 2020
The annotated tag, samba-4.13.0rc6 has been created
at 490dae0a691b97957ade16b43576feb7f64ab60d (tag)
tagging 09ef8ab5099ce8fe42638c351ba8ccd4507361e1 (commit)
replaces samba-4.13.0rc5
tagged by Stefan Metzmacher
on Fri Sep 18 15:14:14 2020 +0200
- Log -----------------------------------------------------------------
samba: tag release samba-4.13.0rc6
-----BEGIN PGP SIGNATURE-----
iF0EABECAB0WIQRS+8C4bZVLCEMyTNxvM5FbZWi36gUCX2SypgAKCRBvM5FbZWi3
6kRlAJ9dGZFO56fCaUCPDZNxgQJA3/cRaQCguidXoLtL5LnC6+xT5Hc64XZReMk=
=GP36
-----END PGP SIGNATURE-----
Gary Lockyer (2):
CVE-2020-1472(ZeroLogon): s4 torture rpc: Test empty machine acct pwd
CVE-2020-1472(ZeroLogon): s4 torture rpc: repeated bytes in client challenge
Günther Deschner (3):
CVE-2020-1472(ZeroLogon): s3:rpc_server/netlogon: refactor dcesrv_netr_creds_server_step_check()
CVE-2020-1472(ZeroLogon): s3:rpc_server/netlogon: support "server require schannel:WORKSTATION$ = no"
CVE-2020-1472(ZeroLogon): s3:rpc_server/netlogon: log warnings about unsecure configurations
Jeremy Allison (2):
CVE-2020-1472(ZeroLogon): s3:rpc_server/netlogon: Fix mem leak onto p->mem_ctx in error path of _netr_ServerPasswordSet2().
CVE-2020-1472(ZeroLogon): s3:rpc_server/netlogon: protect netr_ServerPasswordSet2 against unencrypted passwords
Karolin Seeger (1):
VERSION: Bump version up to 4.13.0rc5...
Stefan Metzmacher (16):
CVE-2020-1472(ZeroLogon): libcli/auth: add netlogon_creds_random_challenge()
CVE-2020-1472(ZeroLogon): s4:torture/rpc: make use of netlogon_creds_random_challenge()
CVE-2020-1472(ZeroLogon): libcli/auth: make use of netlogon_creds_random_challenge() in netlogon_creds_cli.c
CVE-2020-1472(ZeroLogon): s3:rpc_server:netlogon: make use of netlogon_creds_random_challenge()
CVE-2020-1472(ZeroLogon): s4:rpc_server:netlogon: make use of netlogon_creds_random_challenge()
CVE-2020-1472(ZeroLogon): libcli/auth: add netlogon_creds_is_random_challenge() to avoid weak values
CVE-2020-1472(ZeroLogon): libcli/auth: reject weak client challenges in netlogon_creds_server_init()
CVE-2020-1472(ZeroLogon): s4:rpc_server/netlogon: protect netr_ServerPasswordSet2 against unencrypted passwords
CVE-2020-1472(ZeroLogon): s4:rpc_server/netlogon: refactor dcesrv_netr_creds_server_step_check()
CVE-2020-1472(ZeroLogon): s4:rpc_server/netlogon: support "server require schannel:WORKSTATION$ = no"
CVE-2020-1472(ZeroLogon): s4:rpc_server/netlogon: log warnings about unsecure configurations
CVE-2020-1472(ZeroLogon): docs-xml: document 'server require schannel:COMPUTERACCOUNT'
WHATSNEW: document the 'smb2 disable oplock break retry' option
WHATSNEW: document the planed removal of "server schannel"
WHATSNEW: Add release notes for Samba 4.13.0rc6.
VERSION: Disable GIT_SNAPSHOT for the 4.13.0rc6 release.
-----------------------------------------------------------------------
--
Samba Shared Repository
More information about the samba-cvs
mailing list