|
c6be290a95
|
cifs-utils: update to 7.0
|
2022-08-12 11:50:00 +02:00 |
|
|
a66253b384
|
[notify] cifs-utils: update to 6.15, fix for CVE-2022-{27239,29869}
|
2022-04-30 12:22:08 +02:00 |
|
|
7ec3413039
|
cifs-utils: update to 6.14
|
2021-09-24 17:59:59 +02:00 |
|
|
850db4a978
|
cifs-utils: move pam module to /lib/security
|
2021-05-18 16:30:43 +02:00 |
|
|
47fb1875fe
|
cifs-utils: update to 6.13
|
2021-04-13 10:23:15 +02:00 |
|
|
fa0026c777
|
cifs-utils: update to 6.12
|
2021-01-02 14:48:12 +01:00 |
|
|
22ff61e7f0
|
cifs-utils: update to 6.11
|
2020-09-04 12:27:09 +02:00 |
|
|
0f80c03df4
|
move several https: to https: URLs
|
2020-06-06 13:00:05 +02:00 |
|
|
a00522158f
|
cifs-utils: update to 6.10
|
2019-12-20 14:27:31 +01:00 |
|
|
ceb98b7386
|
cifs-utils: update for use of linux-pam
|
2019-04-09 14:52:23 +02:00 |
|
|
d322849827
|
cifs-utils: update to 6.9
|
2019-04-09 14:28:11 +02:00 |
|
|
b9baf128bd
|
opt: remove all .md5sum
|
2018-08-24 12:44:37 +02:00 |
|
|
f60fbd4d81
|
cifs-utils: update to 6.8
|
2018-03-15 15:15:08 +01:00 |
|
|
1cad67b499
|
cifs-utils: update to 6.7
|
2017-03-07 12:11:03 +01:00 |
|
|
78abcad049
|
add opt signatures
|
2016-10-15 13:54:24 +02:00 |
|
|
2ecf398218
|
cifs-utils: update to 6.6
|
2016-09-05 09:13:45 +02:00 |
|
|
420afb353d
|
cifs-utils: update to 6.5
|
2016-02-23 12:11:34 +01:00 |
|
|
dd774fdaf4
|
cifs-utils: fix source URL
|
2015-05-23 11:22:30 +02:00 |
|
|
2d154393d9
|
cifs-utils: update to 6.4
|
2014-08-10 14:11:32 +02:00 |
|
|
9f6890a63d
|
cifs-utils: update to 6.3
|
2014-01-11 10:43:51 +01:00 |
|
|
60f55ea9cd
|
cifs-utils: update to 6.2
|
2013-10-04 19:33:04 +02:00 |
|
|
54887e9145
|
cifs-utils: update to 6.1
|
2013-07-10 12:23:37 +02:00 |
|
|
a33f33fc1b
|
cifs-utils: update to 6.0
|
2013-03-26 09:41:06 +01:00 |
|
|
96f0425c1a
|
cifs-utils: add rc script
|
2013-01-21 16:37:31 +01:00 |
|
|
fa4904460d
|
cifs-utils: add patch to fix mount when a cred file supplies a username
|
2013-01-19 18:47:45 +01:00 |
|
|
d0ec99a7f9
|
cifs-utils: update to 5.9
|
2013-01-07 18:01:21 +01:00 |
|
|
a34b569bc3
|
cifs-utils: update to 5.8
|
2012-11-11 17:12:13 +01:00 |
|
|
669a47159e
|
cifs-utils: update to 5.7
|
2012-10-11 16:57:28 +02:00 |
|
|
14b0f3111a
|
cifs-utils: update to 5.6
|
2012-07-27 18:19:51 +02:00 |
|
|
c75700b9cd
|
cifs-utils: update to 5.5
|
2012-06-27 08:37:50 +02:00 |
|
|
ca2829293b
|
cifs-utils: update to 5.4
We are not affected by CVE-2012-1586 [1][2] because our port
doesn't install the mount.cifs as a setuid binary.
[1] http://article.gmane.org/gmane.linux.kernel.cifs/5912
[2] https://bugzilla.redhat.com/show_bug.cgi?id=807252
|
2012-04-19 10:13:39 +02:00 |
|
|
0ad16aac23
|
cifs-utils: update to 5.3
|
2012-01-28 16:05:29 +01:00 |
|
|
0a8f408a32
|
cifs-utils: update to 5.2
|
2011-12-10 18:57:47 +01:00 |
|
|
14bd3cb10c
|
cifs-utils: update to 5.1
|
2011-09-24 16:10:30 +02:00 |
|
|
caab7a4391
|
cifs-utils: initial release
|
2011-09-02 12:01:07 +02:00 |
|