[Pkg-samba-maint] r4195 - in branches/samba/backports.org/squeeze/debian: . patches

bubulle at alioth.debian.org bubulle at alioth.debian.org
Sun Feb 3 07:04:42 UTC 2013


tags 696675 pending
tags 683899 pending
thanks

Author: bubulle
Date: 2013-02-03 07:04:41 +0000 (Sun, 03 Feb 2013)
New Revision: 4195

Added:
   branches/samba/backports.org/squeeze/debian/patches/0001-ndr-fix-push-pull-DATA_BLOB-with-NDR_NOALIGN.patch
   branches/samba/backports.org/squeeze/debian/patches/security-CVE-2013-0213.patch
   branches/samba/backports.org/squeeze/debian/patches/security-CVE-2013-0214.patch
Modified:
   branches/samba/backports.org/squeeze/debian/changelog
   branches/samba/backports.org/squeeze/debian/control
   branches/samba/backports.org/squeeze/debian/patches/series
   branches/samba/backports.org/squeeze/debian/rules
Log:
Merge from 2:3.6.6-5

Modified: branches/samba/backports.org/squeeze/debian/changelog
===================================================================
--- branches/samba/backports.org/squeeze/debian/changelog	2013-02-03 06:59:34 UTC (rev 4194)
+++ branches/samba/backports.org/squeeze/debian/changelog	2013-02-03 07:04:41 UTC (rev 4195)
@@ -1,3 +1,27 @@
+samba (2:3.6.6-5) unstable; urgency=high
+
+  * Security update
+  * CVE-2013-0213: Clickjacking issue in SWAT
+  * CVE-2013-0214: Potential XSRF in SWAT
+
+ -- Christian Perrier <bubulle at debian.org>  Wed, 30 Jan 2013 18:49:32 +0100
+
+samba (2:3.6.6-4) unstable; urgency=low
+
+  * Fix printers tdb migration by including an upstream fix
+    from 3.6.7 (upstream bug #9026)
+    Closes: #696675
+
+ -- Christian Perrier <bubulle at debian.org>  Sat, 05 Jan 2013 12:42:02 +0100
+
+samba (2:3.6.6-3) unstable; urgency=low
+
+  [ Ansgar Burchardt ]
+  * debian/rules: Use xz compression for binary packages.
+    Closes: #683899
+
+ -- Christian Perrier <bubulle at debian.org>  Sun, 05 Aug 2012 12:19:12 +0200
+
 samba (2:3.6.6-2~bpo60+1) squeeze-backports; urgency=low
 
   * Backport to squeeze

Modified: branches/samba/backports.org/squeeze/debian/control
===================================================================
--- branches/samba/backports.org/squeeze/debian/control	2013-02-03 06:59:34 UTC (rev 4194)
+++ branches/samba/backports.org/squeeze/debian/control	2013-02-03 07:04:41 UTC (rev 4195)
@@ -21,7 +21,7 @@
 
 Package: samba
 Architecture: any
-Pre-Depends: ${misc:Pre-Depends}
+Pre-Depends: ${misc:Pre-Depends}, dpkg (>= 1.15.6~)
 Depends: samba-common (= ${source:Version}), libwbclient0 (= ${binary:Version}),${shlibs:Depends}, ${misc:Depends}, libpam-runtime (>= 1.0.1-11), libpam-modules, lsb-base (>= 3.2-13), procps, update-inetd, adduser
 Recommends: logrotate, tdb-tools
 Suggests: openbsd-inetd | inet-superserver, smbldap-tools, ldb-tools, ctdb
@@ -45,6 +45,7 @@
 Architecture: any
 Multi-Arch: foreign
 Depends: ${shlibs:Depends}, ${misc:Depends}, samba-common (>= 2:3.4.0~pre1-2)
+Pre-Depends: dpkg (>= 1.15.6~)
 Replaces: samba (<< 3.0.20b-1), samba-common (<< 2:3.4.0~pre1-2)
 Description: common files used by both the Samba server and client
  Samba is an implementation of the SMB/CIFS protocol for Unix systems,
@@ -57,7 +58,7 @@
 Package: samba-common
 Architecture: all
 Multi-Arch: foreign
-Pre-Depends: ${misc:Pre-Depends}
+Pre-Depends: ${misc:Pre-Depends}, dpkg (>= 1.15.6~)
 Depends: ucf, ${misc:Depends}
 Replaces: samba (<< 3.0.20b-1), samba4-common (<< 4.0.0~alpha7-1)
 Conflicts: samba4-common (<< 4.0.0~alpha7-1)
@@ -72,6 +73,7 @@
 Package: samba-tools
 Architecture: any
 Depends: ${shlibs:Depends}, ${misc:Depends}
+Pre-Depends: dpkg (>= 1.15.6~)
 Conflicts: samba4, samba4-testsuite
 Description: Samba testing utilities
  Samba is an implementation of the SMB/CIFS protocol for Unix systems,
@@ -84,6 +86,7 @@
 Package: smbclient
 Architecture: any
 Depends: samba-common (= ${source:Version}), ${shlibs:Depends}, ${misc:Depends}
+Pre-Depends: dpkg (>= 1.15.6~)
 Replaces: samba (<< 2.999+3.0.alpha21-4), smbget
 Provides: samba-client
 Suggests: cifs-utils
@@ -101,6 +104,7 @@
 Package: swat
 Architecture: any
 Depends: samba (= ${binary:Version}), ${shlibs:Depends}, ${misc:Depends}, openbsd-inetd | inet-superserver
+Pre-Depends: dpkg (>= 1.15.6~)
 Recommends: samba-doc (= ${source:Version})
 Description: Samba Web Administration Tool
  Samba is an implementation of the SMB/CIFS protocol for Unix systems,
@@ -121,6 +125,7 @@
 Architecture: all
 Suggests: samba-doc-pdf
 Depends: ${misc:Depends}
+Pre-Depends: dpkg (>= 1.15.6~)
 Description: Samba documentation
  Samba is an implementation of the SMB/CIFS protocol for Unix systems,
  providing support for cross-platform file and printer sharing with
@@ -133,6 +138,7 @@
 Section: doc
 Architecture: all
 Depends: ${misc:Depends}
+Pre-Depends: dpkg (>= 1.15.6~)
 Description: Samba documentation in PDF format
  Samba is an implementation of the SMB/CIFS protocol for Unix systems,
  providing support for cross-platform file and printer sharing with
@@ -147,6 +153,7 @@
 Multi-Arch: same
 Depends: ${shlibs:Depends}, samba-common (= ${source:Version}), ${misc:Depends},
 	 libpam-runtime (>= 1.0.1-6)
+Pre-Depends: dpkg (>= 1.15.6~)
 Suggests: samba
 Description: pluggable authentication module for Samba
  This is a module for PAM that enables a system administrator to migrate
@@ -161,7 +168,7 @@
 Priority: optional
 Architecture: any
 Multi-Arch: same
-Pre-Depends: ${misc:Pre-Depends}
+Pre-Depends: ${misc:Pre-Depends}, dpkg (>= 1.15.6~)
 Depends: ${shlibs:Depends}, ${misc:Depends}
 Description: shared library for communication with SMB/CIFS servers
  This package provides a shared library that enables client applications
@@ -174,6 +181,7 @@
 Architecture: any
 Multi-Arch: same
 Depends: libsmbclient (= ${binary:Version}), ${misc:Depends}
+Pre-Depends: dpkg (>= 1.15.6~)
 Description: development files for libsmbclient
  This package provides the development files (static library and headers)
  required for building applications against libsmbclient, a library that
@@ -186,6 +194,7 @@
 Architecture: any
 Multi-Arch: foreign
 Depends: ${shlibs:Depends}, ${misc:Depends}, libwbclient0 (= ${binary:Version}), samba-common (= ${source:Version}), lsb-base (>= 3.0-6), adduser
+Pre-Depends: dpkg (>= 1.15.6~)
 Recommends: libpam-winbind, libnss-winbind
 Replaces: samba (<= 2.2.3-2)
 Description: Samba nameservice integration server
@@ -209,7 +218,7 @@
 Priority: optional
 Architecture: any
 Multi-Arch: same
-Pre-Depends: ${misc:Pre-Depends}
+Pre-Depends: ${misc:Pre-Depends}, dpkg (>= 1.15.6~)
 Depends: ${shlibs:Depends}, ${misc:Depends}, winbind (= ${binary:Version}), libwbclient0 (= ${binary:Version}), samba-common (= ${source:Version}), libpam-runtime (>= 1.0.1-6), libpam0g
 Recommends: libnss-winbind
 Breaks: winbind (<< 2:3.5.11~dfsg-3)
@@ -229,7 +238,7 @@
 Priority: optional
 Architecture: any
 Multi-Arch: same
-Pre-Depends: ${misc:Pre-Depends}
+Pre-Depends: dpkg (>= 1.15.6~)
 Depends: ${shlibs:Depends}, ${misc:Depends}, winbind (= ${binary:Version}), libwbclient0 (= ${binary:Version}), samba-common (= ${source:Version})
 Breaks: libpam-winbind (<< 2:3.6.5-2), winbind (<< 2:3.5.11~dfsg-3)
 Replaces: libpam-winbind (<< 2:3.6.5-2), samba (<= 2.2.3-2), winbind (<< 2:3.5.11~dfsg-3)
@@ -251,6 +260,7 @@
 Priority: extra
 Architecture: any
 Depends: samba (= ${binary:Version}), ${misc:Depends}
+Pre-Depends: dpkg (>= 1.15.6~)
 Description: Samba debugging symbols
  Samba is an implementation of the SMB/CIFS protocol for Unix systems,
  providing support for cross-platform file and printer sharing with
@@ -265,7 +275,7 @@
 Priority: optional
 Architecture: any
 Multi-Arch: same
-Pre-Depends: ${misc:Pre-Depends}
+Pre-Depends: ${misc:Pre-Depends}, dpkg (>= 1.15.6~)
 Depends: ${shlibs:Depends}, ${misc:Depends}
 Breaks:
  libpam-smbpass (<< 2:3.4.1),
@@ -291,6 +301,7 @@
 Architecture: any
 Multi-Arch: same
 Depends: ${shlibs:Depends}, ${misc:Depends}, libwbclient0 (= ${binary:Version})
+Pre-Depends: dpkg (>= 1.15.6~)
 Description: Samba winbind client library - development files
  Samba is an implementation of the SMB/CIFS protocol for Unix systems,
  providing support for cross-platform file and printer sharing with

Added: branches/samba/backports.org/squeeze/debian/patches/0001-ndr-fix-push-pull-DATA_BLOB-with-NDR_NOALIGN.patch
===================================================================
--- branches/samba/backports.org/squeeze/debian/patches/0001-ndr-fix-push-pull-DATA_BLOB-with-NDR_NOALIGN.patch	                        (rev 0)
+++ branches/samba/backports.org/squeeze/debian/patches/0001-ndr-fix-push-pull-DATA_BLOB-with-NDR_NOALIGN.patch	2013-02-03 07:04:41 UTC (rev 4195)
@@ -0,0 +1,134 @@
+Description: ndr: fix push/pull DATA_BLOB with NDR_NOALIGN
+Author: David Disseldorp <ddiss at samba.org>
+Bug-Debian: http://bugs.debian.org/696675
+Forwarded: https://bugzilla.samba.org/show_bug.cgi?id=9026
+
+From 447802bbde046dddf30ed8292bb309cfc92f75d4 Mon Sep 17 00:00:00 2001
+From: David Disseldorp <ddiss at samba.org>
+Date: Fri, 6 Jul 2012 14:00:27 +0200
+Subject: [PATCH] ndr: fix push/pull DATA_BLOB with NDR_NOALIGN
+
+This change addresses bug 9026.
+There are 3 use cases for DATA_BLOB marshalling/unmarshalling:
+
+1)
+ndr_push_DATA_BLOB and ndr_pull_DATA_BLOB when called with
+LIBNDR_FLAG_ALIGN* alignment flags set, are used to push/pull padding
+bytes _only_. The length is determined by the alignment required and
+the current ndr offset.
+e.g. dcerpc.idl:
+        typedef struct {
+...
+                [flag(NDR_ALIGN8)]    DATA_BLOB _pad;
+        } dcerpc_request;
+
+2)
+When called with the LIBNDR_FLAG_REMAINING flag, all remaining bytes in
+the ndr buffer are pushed/pulled.
+e.g. dcerpc.idl:
+        typedef struct {
+...
+                [flag(NDR_REMAINING)] DATA_BLOB stub_and_verifier;
+        } dcerpc_request;
+
+3)
+When called without alignment flags, push/pull a uint32 length _and_ a
+corresponding byte array to/from the ndr buffer.
+e.g. drsblobs.idl
+        typedef [public] struct {
+...
+                DATA_BLOB data;
+        } DsCompressedChunk;
+
+The fix for bug 8373 changed the definition of "alignment flags", such
+that when called with LIBNDR_FLAG_NOALIGN ndr_push/pull_DATA_BLOB
+behaves as (1: padding bytes) rather than (3: uint32 length + byte
+array).
+
+This breaks marshalling/unmarshalling for the following structures.
+eventlog.idl:
+        typedef [flag(NDR_NOALIGN|NDR_PAHEX),public] struct {
+...
+                DATA_BLOB sid;
+...
+        } eventlog_Record_tdb;
+
+ntprinting.idl:
+        typedef [flag(NDR_NOALIGN),public] struct {
+...
+                DATA_BLOB *nt_dev_private;
+        } ntprinting_devicemode;
+
+        typedef [flag(NDR_NOALIGN),public] struct {
+...
+                DATA_BLOB data;
+        } ntprinting_printer_data;
+---
+ librpc/ndr/ndr_basic.c |   34 ++++++++++++++++++++++------------
+ 1 files changed, 22 insertions(+), 12 deletions(-)
+
+diff --git a/librpc/ndr/ndr_basic.c b/librpc/ndr/ndr_basic.c
+index 7a4e22a..1887838 100644
+--- a/librpc/ndr/ndr_basic.c
++++ b/librpc/ndr/ndr_basic.c
+@@ -1247,16 +1247,21 @@ _PUBLIC_ void ndr_print_DATA_BLOB(struct ndr_print *ndr, const char *name, DATA_
+ 
+ 
+ /*
+-  push a DATA_BLOB onto the wire. 
+-*/
++ * Push a DATA_BLOB onto the wire.
++ * 1) When called with LIBNDR_FLAG_ALIGN* alignment flags set, push padding
++ *    bytes _only_. The length is determined by the alignment required and the
++ *    current ndr offset.
++ * 2) When called with the LIBNDR_FLAG_REMAINING flag, push the byte array to
++ *    the ndr buffer.
++ * 3) Otherwise, push a uint32 length _and_ a corresponding byte array to the
++ *    ndr buffer.
++ */
+ _PUBLIC_ enum ndr_err_code ndr_push_DATA_BLOB(struct ndr_push *ndr, int ndr_flags, DATA_BLOB blob)
+ {
+ 	if (ndr->flags & LIBNDR_FLAG_REMAINING) {
+ 		/* nothing to do */
+-	} else if (ndr->flags & LIBNDR_ALIGN_FLAGS) {
+-		if (ndr->flags & LIBNDR_FLAG_NOALIGN) {
+-			blob.length = 0;
+-		} else if (ndr->flags & LIBNDR_FLAG_ALIGN2) {
++	} else if (ndr->flags & (LIBNDR_ALIGN_FLAGS & ~LIBNDR_FLAG_NOALIGN)) {
++		if (ndr->flags & LIBNDR_FLAG_ALIGN2) {
+ 			blob.length = NDR_ALIGN(ndr, 2);
+ 		} else if (ndr->flags & LIBNDR_FLAG_ALIGN4) {
+ 			blob.length = NDR_ALIGN(ndr, 4);
+@@ -1273,18 +1278,23 @@ _PUBLIC_ enum ndr_err_code ndr_push_DATA_BLOB(struct ndr_push *ndr, int ndr_flag
+ }
+ 
+ /*
+-  pull a DATA_BLOB from the wire. 
+-*/
++ * Pull a DATA_BLOB from the wire.
++ * 1) when called with LIBNDR_FLAG_ALIGN* alignment flags set, pull padding
++ *    bytes _only_. The length is determined by the alignment required and the
++ *    current ndr offset.
++ * 2) When called with the LIBNDR_FLAG_REMAINING flag, pull all remaining bytes
++ *    from the ndr buffer.
++ * 3) Otherwise, pull a uint32 length _and_ a corresponding byte array from the
++ *    ndr buffer.
++ */
+ _PUBLIC_ enum ndr_err_code ndr_pull_DATA_BLOB(struct ndr_pull *ndr, int ndr_flags, DATA_BLOB *blob)
+ {
+ 	uint32_t length = 0;
+ 
+ 	if (ndr->flags & LIBNDR_FLAG_REMAINING) {
+ 		length = ndr->data_size - ndr->offset;
+-	} else if (ndr->flags & LIBNDR_ALIGN_FLAGS) {
+-		if (ndr->flags & LIBNDR_FLAG_NOALIGN) {
+-			length = 0;
+-		} else if (ndr->flags & LIBNDR_FLAG_ALIGN2) {
++	} else if (ndr->flags & (LIBNDR_ALIGN_FLAGS & ~LIBNDR_FLAG_NOALIGN)) {
++		if (ndr->flags & LIBNDR_FLAG_ALIGN2) {
+ 			length = NDR_ALIGN(ndr, 2);
+ 		} else if (ndr->flags & LIBNDR_FLAG_ALIGN4) {
+ 			length = NDR_ALIGN(ndr, 4);
+-- 
+1.7.1
+

Added: branches/samba/backports.org/squeeze/debian/patches/security-CVE-2013-0213.patch
===================================================================
--- branches/samba/backports.org/squeeze/debian/patches/security-CVE-2013-0213.patch	                        (rev 0)
+++ branches/samba/backports.org/squeeze/debian/patches/security-CVE-2013-0213.patch	2013-02-03 07:04:41 UTC (rev 4195)
@@ -0,0 +1,34 @@
+From 72672f8074c0a65918756ad89a8ecc2befc72cf0 Mon Sep 17 00:00:00 2001
+From: Kai Blin <kai at samba.org>
+Date: Fri, 18 Jan 2013 23:11:07 +0100
+Subject: [PATCH] swat: Use X-Frame-Options header to avoid clickjacking
+
+Jann Horn reported a potential clickjacking vulnerability in SWAT where
+the SWAT page could be embedded into an attacker's page using a frame or
+iframe and then used to trick the user to change Samba settings.
+
+Avoid this by telling the browser to refuse the frame embedding via the
+X-Frame-Options: DENY header.
+
+Signed-off-by: Kai Blin <kai at samba.org>
+---
+ source3/web/swat.c |    3 ++-
+ 1 files changed, 2 insertions(+), 1 deletions(-)
+
+diff --git a/source3/web/swat.c b/source3/web/swat.c
+index 90e4af9..1eb191d 100644
+--- a/source3/web/swat.c
++++ b/source3/web/swat.c
+@@ -269,7 +269,8 @@ static void print_header(void)
+ 	if (!cgi_waspost()) {
+ 		printf("Expires: 0\r\n");
+ 	}
+-	printf("Content-type: text/html\r\n\r\n");
++	printf("Content-type: text/html\r\n");
++	printf("X-Frame-Options: DENY\r\n\r\n");
+ 
+ 	if (!include_html("include/header.html")) {
+ 		printf("<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 3.2//EN\">\n");
+-- 
+1.7.0.4
+

Added: branches/samba/backports.org/squeeze/debian/patches/security-CVE-2013-0214.patch
===================================================================
--- branches/samba/backports.org/squeeze/debian/patches/security-CVE-2013-0214.patch	                        (rev 0)
+++ branches/samba/backports.org/squeeze/debian/patches/security-CVE-2013-0214.patch	2013-02-03 07:04:41 UTC (rev 4195)
@@ -0,0 +1,116 @@
+From f102cb2316b9590c91a248ccd77f335d0cd99764 Mon Sep 17 00:00:00 2001
+From: Kai Blin <kai at samba.org>
+Date: Mon, 28 Jan 2013 21:41:07 +0100
+Subject: [PATCH] swat: Use additional nonce on XSRF protection
+
+If the user had a weak password on the root account of a machine running
+SWAT, there still was a chance of being targetted by an XSRF on a
+malicious web site targetting the SWAT setup.
+
+Use a random nonce stored in secrets.tdb to close this possible attack
+window. Thanks to Jann Horn for reporting this issue.
+
+Signed-off-by: Kai Blin <kai at samba.org>
+---
+ source3/web/cgi.c        |   40 ++++++++++++++++++++++++++--------------
+ source3/web/swat.c       |    2 ++
+ source3/web/swat_proto.h |    1 +
+ 3 files changed, 29 insertions(+), 14 deletions(-)
+
+Index: wheezy/source3/web/cgi.c
+===================================================================
+--- wheezy.orig/source3/web/cgi.c
++++ wheezy/source3/web/cgi.c
+@@ -48,6 +48,7 @@
+ static char *pathinfo;
+ static char *C_user;
+ static char *C_pass;
++static char *C_nonce;
+ static bool inetd_server;
+ static bool got_request;
+ 
+@@ -329,20 +330,7 @@
+ 	C_user = SMB_STRDUP(user);
+ 
+ 	if (!setuid(0)) {
+-		C_pass = secrets_fetch_generic("root", "SWAT");
+-		if (C_pass == NULL) {
+-			char *tmp_pass = NULL;
+-			tmp_pass = generate_random_password(talloc_tos(),
+-							    16, 16);
+-			if (tmp_pass == NULL) {
+-				printf("%sFailed to create random nonce for "
+-				       "SWAT session\n<br>%s\n", head, tail);
+-				exit(0);
+-			}
+-			secrets_store_generic("root", "SWAT", tmp_pass);
+-			C_pass = SMB_STRDUP(tmp_pass);
+-			TALLOC_FREE(tmp_pass);
+-		}
++		C_pass = SMB_STRDUP(cgi_nonce());
+ 	}
+ 	setuid(pwd->pw_uid);
+ 	if (geteuid() != pwd->pw_uid || getuid() != pwd->pw_uid) {
+@@ -459,6 +447,30 @@
+ }
+ 
+ /***************************************************************************
++return a ptr to the nonce
++  ***************************************************************************/
++char *cgi_nonce(void)
++{
++	const char *head = "Content-Type: text/html\r\n\r\n<HTML><BODY><H1>SWAT installation Error</H1>\n";
++	const char *tail = "</BODY></HTML>\r\n";
++	C_nonce = secrets_fetch_generic("root", "SWAT");
++	if (C_nonce == NULL) {
++		char *tmp_pass = NULL;
++		tmp_pass = generate_random_password(talloc_tos(),
++						    16, 16);
++		if (tmp_pass == NULL) {
++			printf("%sFailed to create random nonce for "
++			       "SWAT session\n<br>%s\n", head, tail);
++			exit(0);
++		}
++		secrets_store_generic("root", "SWAT", tmp_pass);
++		C_nonce = SMB_STRDUP(tmp_pass);
++		TALLOC_FREE(tmp_pass);
++	}
++        return(C_nonce);
++}
++
++/***************************************************************************
+ handle a file download
+   ***************************************************************************/
+ static void cgi_download(char *file)
+Index: wheezy/source3/web/swat.c
+===================================================================
+--- wheezy.orig/source3/web/swat.c
++++ wheezy/source3/web/swat.c
+@@ -154,6 +154,7 @@
+ 	struct MD5Context md5_ctx;
+ 	uint8_t token[16];
+ 	int i;
++	char *nonce = cgi_nonce();
+ 
+ 	token_str[0] = '\0';
+ 	ZERO_STRUCT(md5_ctx);
+@@ -167,6 +168,7 @@
+ 	if (pass != NULL) {
+ 		MD5Update(&md5_ctx, (uint8_t *)pass, strlen(pass));
+ 	}
++	MD5Update(&md5_ctx, (uint8_t *)nonce, strlen(nonce));
+ 
+ 	MD5Final(token, &md5_ctx);
+ 
+Index: wheezy/source3/web/swat_proto.h
+===================================================================
+--- wheezy.orig/source3/web/swat_proto.h
++++ wheezy/source3/web/swat_proto.h
+@@ -32,6 +32,7 @@
+ bool am_root(void);
+ char *cgi_user_name(void);
+ char *cgi_user_pass(void);
++char *cgi_nonce(void);
+ void cgi_setup(const char *rootdir, int auth_required);
+ const char *cgi_baseurl(void);
+ const char *cgi_pathinfo(void);

Modified: branches/samba/backports.org/squeeze/debian/patches/series
===================================================================
--- branches/samba/backports.org/squeeze/debian/patches/series	2013-02-03 06:59:34 UTC (rev 4194)
+++ branches/samba/backports.org/squeeze/debian/patches/series	2013-02-03 07:04:41 UTC (rev 4195)
@@ -21,3 +21,6 @@
 libutil_drop_AI_ADDRCONFIG.patch
 shadow_copy2_backport.patch
 only_export_public_symbols.patch
+0001-ndr-fix-push-pull-DATA_BLOB-with-NDR_NOALIGN.patch
+security-CVE-2013-0213.patch
+security-CVE-2013-0214.patch

Modified: branches/samba/backports.org/squeeze/debian/rules
===================================================================
--- branches/samba/backports.org/squeeze/debian/rules	2013-02-03 06:59:34 UTC (rev 4194)
+++ branches/samba/backports.org/squeeze/debian/rules	2013-02-03 07:04:41 UTC (rev 4195)
@@ -143,3 +143,6 @@
 
 override_dh_compress:
 	dh_compress -XWHATSNEW.txt
+
+override_dh_builddeb:
+	dh_builddeb -- -Zxz





More information about the Pkg-samba-maint mailing list