Chapter 1. Package Updates
232
This package addresses the following bugs:
* previously, the man pages and usage messages for rpcclient, smbcacls, samba-client, smbget,
smbtree, and pdbedit contained errors, omissions, and outdated information. Users could not therefore
rely on the provided documentation to use these programs. The documentation for each of these
components has been reviewed and corrected and no longer contains misleading information.
(
BZ#457082
1859
,
BZ#457096
1860
,
BZ#457097
1861
,
BZ#457192
1862
,
BZ#457195
1863
,
BZ#457203
1864
,
BZ#457384
1865
,
BZ#457385
1866
)
* Samba stores its own Kerberos configuration in /var/cache/samba/smb_krb5. Previously, although
the "net ads join" command used this configuration and was able to join an Active Directory, "net ads
testjoin" and "net ads leave" ignored the samba- specific file and tried to use the configuration in /etc/
krb5.conf instead. These commands would therefore fail when authentication through Kerberos was
needed. "net ads testjoin" and "net ads leave" now use /var/cache/samba/smb_krb5 and therefore
work with authenticated Active Directory resources. (
BZ#509170
1867
)
* cifs.upcall performs certain CIFS-related tasks for the kernel in user space. The version of cifs.upcall
included with previous versions of Samba could not provide the kernel with the credentials cache path
stored in the KRB5CCNAME environment variable. Attempts to mount CIFS shares through fstab as
a normal user would therefore fail. The version of cifs.upcall included with Red Hat Enterprise Linux
5.5 can now provide the kernel with the credentials cache path, and CIFS shares can therefore be
mounted for normal users. (
BZ#517195
1868
)
* previously, when handling a POSIX open call, Samba did not account for the SMB_O_CREAT,
SMB_O_EXCL, or SMB_O_TRUNC flags. As a result, Samba would respond with
STATUS_INVALID_PARAMETER to any of these flags instead of honoring the call. Samba now
recognizes these flags and honors POSIX open calls that use them. (
BZ#522866
1869
)
* when setting the "allow trusted domain = no" parameter on a Samba server it would not have any
effect on the configuration and Samba would still attempt to contact trusted domains. By refreshing
the trusted domain cache only if the parameter "allow trusted domain = yes" is set, Samba no longer
attempts to contact trusted domains when "allow trusted domain = no". (
BZ#526065
1870
)
* mount.cifs would fail to correctly authenticate when a credentials file was used. As a result,
any mount operation that used a credentials file would fail. By correcting the newlines during the
parsing routines during mounting the issue has been fixed. mount.cifs now works correctly when
authenticating with a credentials file. (
BZ#532153
1871
)
* mounting and unmounting a CIFS filesystem quickly would eventually lead to the CIFS mounts
becoming unmountable. The issue has been corrected by linking mtab.o to the building of mount.cifs
1859
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=457082
1860
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=457096
1861
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=457097
1862
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=457192
1863
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=457195
1864
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=457203
1865
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=457384
1866
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=457385
1867
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=509170
1868
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=517195
1869
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=522866
1870
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=526065
1871
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=532153
Summary of Contents for ENTERPRISE LINUX 5.5 - S 2010
Page 10: ...x ...
Page 308: ...298 ...
Page 310: ...300 ...
Page 468: ...458 ...
Page 470: ...460 ...