Commit Graph

22 Commits

Author SHA1 Message Date
1cad67b499 cifs-utils: update to 6.7 2017-03-07 12:11:03 +01:00
78abcad049 add opt signatures 2016-10-15 13:54:24 +02:00
2ecf398218 cifs-utils: update to 6.6 2016-09-05 09:13:45 +02:00
420afb353d cifs-utils: update to 6.5 2016-02-23 12:11:34 +01:00
dd774fdaf4 cifs-utils: fix source URL 2015-05-23 11:22:30 +02:00
2d154393d9 cifs-utils: update to 6.4 2014-08-10 14:11:32 +02:00
9f6890a63d cifs-utils: update to 6.3 2014-01-11 10:43:51 +01:00
60f55ea9cd cifs-utils: update to 6.2 2013-10-04 19:33:04 +02:00
54887e9145 cifs-utils: update to 6.1 2013-07-10 12:23:37 +02:00
a33f33fc1b cifs-utils: update to 6.0 2013-03-26 09:41:06 +01:00
96f0425c1a cifs-utils: add rc script 2013-01-21 16:37:31 +01:00
fa4904460d cifs-utils: add patch to fix mount when a cred file supplies a username 2013-01-19 18:47:45 +01:00
d0ec99a7f9 cifs-utils: update to 5.9 2013-01-07 18:01:21 +01:00
a34b569bc3 cifs-utils: update to 5.8 2012-11-11 17:12:13 +01:00
669a47159e cifs-utils: update to 5.7 2012-10-11 16:57:28 +02:00
14b0f3111a cifs-utils: update to 5.6 2012-07-27 18:19:51 +02:00
c75700b9cd cifs-utils: update to 5.5 2012-06-27 08:37:50 +02:00
ca2829293b cifs-utils: update to 5.4
We are not affected by CVE-2012-1586 [1][2] because our port
doesn't install the mount.cifs as a setuid binary.

[1] http://article.gmane.org/gmane.linux.kernel.cifs/5912
[2] https://bugzilla.redhat.com/show_bug.cgi?id=807252
2012-04-19 10:13:39 +02:00
0ad16aac23 cifs-utils: update to 5.3 2012-01-28 16:05:29 +01:00
0a8f408a32 cifs-utils: update to 5.2 2011-12-10 18:57:47 +01:00
14bd3cb10c cifs-utils: update to 5.1 2011-09-24 16:10:30 +02:00
caab7a4391 cifs-utils: initial release 2011-09-02 12:01:07 +02:00