LinuxCIFS utils: Difference between revisions

From SambaWiki
(cifs-utils-6.13)
 
(6 intermediate revisions by 2 users not shown)
Line 8: Line 8:


= News =
= News =
* October, 2024: Release 7.1
** LDAP Ping capability
** smbinfo adds gettconinfo command
** Various improvements to man pages
** https://lists.samba.org/archive/samba-technical/2024-October/139146.html
* August, 2022: Release 7.0
** Add GSS-Proxy support
** https://lists.samba.org/archive/samba-technical/2022-August/137528.html
* April, 2022: Release 6.15
** [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27239 CVE-2022-27239]: mount.cifs: fix length check for ip option parsing
** [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29869 CVE-2022-29869]: mount.cifs: fix verbose messages on option parsing
** https://lists.samba.org/archive/samba-technical/2022-April/137335.html
* September, 2021: Release 6.14
** smbinfo is enhanced with capability to display alternate data streams
** setcifsacl is improved to optionally reorder ACEs in preferred order
** cifs.upcall regression in kerberos mount is fixed
** https://lists.samba.org/archive/samba-technical/2021-September/136914.html
* April, 2021: Release 6.13
* April, 2021: Release 6.13
** CVE-2021-20208: cifs.upcall kerberos auth leak in container
** [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20208 CVE-2021-20208]: cifs.upcall kerberos auth leak in container
** https://lists.samba.org/archive/samba-technical/2021-April/136467.html
** https://lists.samba.org/archive/samba-technical/2021-April/136467.html
* December, 2020: Release 6.12
* December, 2020: Release 6.12
Line 17: Line 34:
** https://lists.samba.org/archive/samba-technical/2020-December/136156.html
** https://lists.samba.org/archive/samba-technical/2020-December/136156.html
* September, 2020: Release 6.11
* September, 2020: Release 6.11
** CVE-2020-14342: mount.cifs: fix shell command injection
** [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14342 CVE-2020-14342]: mount.cifs: fix shell command injection
** https://lists.samba.org/archive/samba-technical/2020-September/135747.html
** https://lists.samba.org/archive/samba-technical/2020-September/135747.html
* December 16, 2019: Release 6.10
* December 16, 2019: Release 6.10
Line 106: Line 123:
** mount.cifs now supports the -s option by passing "sloppy" to the kernel in the options string
** mount.cifs now supports the -s option by passing "sloppy" to the kernel in the options string
** cifs.upcall now properly respects the domain_realm section in krb5.conf
** cifs.upcall now properly respects the domain_realm section in krb5.conf
** unprivileged users can no longer mount onto dirs into which they can't chdir (fixes CVE-2012-1586)
** unprivileged users can no longer mount onto dirs into which they can't chdir (fixes [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1586 CVE-2012-1586])
** http://article.gmane.org/gmane.linux.kernel.cifs/5912
** http://article.gmane.org/gmane.linux.kernel.cifs/5912
* January 28, 2012: Release 5.3
* January 28, 2012: Release 5.3

Latest revision as of 00:36, 7 October 2024

Description

The in-kernel CIFS filesystem is generally the preferred method for mounting SMB/CIFS shares on Linux.

The in-kernel CIFS filesystem relies on a set of user-space tools. That package of tools is called cifs-utils. Although not really part of Samba proper, these tools were originally part of the Samba package. For several reasons, shipping these tools as part of Samba was problematic and it was deemed better to split them off into their own package.

See LinuxCIFS for description of the kernel client.

News

Download

A historical set of cifs-utils releases is available in the releases directory.



Documentation



Development

The source code for cifs-utils is managed via git. An example checkout from the main git repo:

$ git clone git://git.samba.org/cifs-utils.git

gitweb access is also available here.



Contact

Questions, suggestions, concerns, and patches should be sent to linux-cifs@vger.kernel.org. Security issues should be sent to security@samba.org to avoid immediate public disclosure.