Package "samba"

Name: samba


SMB/CIFS file, print, and login server for Unix

Latest version: 2:4.7.6+dfsg~ubuntu-0ubuntu2.17
Release: bionic (18.04)
Level: security
Repository: main
Homepage: http://www.samba.org


Download "samba"

Other versions of "samba" in Bionic

Repository Area Version
base universe 2:4.7.6+dfsg~ubuntu-0ubuntu2
base main 2:4.7.6+dfsg~ubuntu-0ubuntu2
security universe 2:4.7.6+dfsg~ubuntu-0ubuntu2.17
updates main 2:4.7.6+dfsg~ubuntu-0ubuntu2.17
updates universe 2:4.7.6+dfsg~ubuntu-0ubuntu2.17

Packages in group

Deleted packages are displayed in grey.


Version: 2:4.7.6+dfsg~ubuntu-0ubuntu2.17 2020-07-02 15:07:48 UTC

  samba (2:4.7.6+dfsg~ubuntu-0ubuntu2.17) bionic-security; urgency=medium

  * SECURITY UPDATE: NULL pointer de-reference and use-after-free in Samba
    AD DC LDAP Server with ASQ, VLV and paged_results
    - debian/patches/CVE-2020-10730-*.patch: multiple upstream patches to
      fix the issue.
    - CVE-2020-10730
  * SECURITY UPDATE: Parsing and packing of NBT and DNS packets can consume
    excessive CPU
    - debian/patches/CVE-2020-10745-*.patch: multiple upstream patches to
      fix the issue.
    - CVE-2020-10745
  * SECURITY UPDATE: LDAP Use-after-free in Samba AD DC Global Catalog with
    paged_results and VLV
    - debian/patches/CVE-2020-10760-*.patch: multiple upstream patches to
      fix the issue.
    - CVE-2020-10760

 -- Marc Deslauriers <email address hidden> Fri, 19 Jun 2020 08:58:37 -0400

Source diff to previous version

Version: 2:4.7.6+dfsg~ubuntu-0ubuntu2.16 2020-04-28 18:07:26 UTC

  samba (2:4.7.6+dfsg~ubuntu-0ubuntu2.16) bionic-security; urgency=medium

  * SECURITY UPDATE: Stack overflow in AD DC LDAP server
    - debian/patches/CVE-2020-10704-1.patch: add ASN.1 max tree depth in
      auth/gensec/gensec_util.c, lib/util/asn1.c, lib/util/asn1.h,
      lib/util/tests/asn1_tests.c, libcli/auth/spnego_parse.c,
      libcli/cldap/cldap.c, libcli/ldap/ldap_message.c,
      source3/lib/tldap.c, source3/lib/tldap_util.c,
      source3/libsmb/clispnego.c, source4/auth/gensec/gensec_krb5.c,
      source4/ldap_server/ldap_server.c, source4/libcli/ldap/ldap_client.c,
    - debian/patches/CVE-2020-10704-3.patch: check parse tree depth in
    - debian/patches/CVE-2020-10704-6.patch: add max ldap request sizes in
      lib/param/loadparm.c, source3/param/loadparm.c.
    - debian/patches/CVE-2020-10704-7.patch: limit request sizes in
    - debian/patches/CVE-2020-10704-8.patch: add search size limits to
      ldap_decode in docs-xml/smbdotconf/ldap/ldapmaxsearchrequest.xml,
      lib/param/loadparm.c, libcli/cldap/cldap.c,
      libcli/ldap/ldap_message.c, libcli/ldap/ldap_message.h,
      source3/param/loadparm.c, source4/ldap_server/ldap_server.c,
    - debian/patches/CVE-2020-10704-9.patch: check search request lengths
      in lib/util/asn1.c, lib/util/asn1.h, libcli/ldap/ldap_message.c.
    - CVE-2020-10704

 -- Marc Deslauriers <email address hidden> Wed, 22 Apr 2020 11:48:03 -0400

Source diff to previous version

Version: 2:4.7.6+dfsg~ubuntu-0ubuntu2.15 2020-01-21 15:07:12 UTC

  samba (2:4.7.6+dfsg~ubuntu-0ubuntu2.15) bionic-security; urgency=medium

  * SECURITY UPDATE: replication of ACLs set to inherit down a subtree on
    AD Directory not automatic
    - debian/patches/CVE-2019-14902-1.patch: add test for replication of
      inherited security descriptors.
    - debian/patches/CVE-2019-14902-2.patch: add test for a special case
      around replicated renames.
    - debian/patches/CVE-2019-14902-3.patch: add test to confirm ACL
      inheritance really happens
    - debian/patches/CVE-2019-14902-4.patch: explain that
      descriptor_sd_propagation_recursive() is protected by a transaction.
    - debian/patches/CVE-2019-14902-5.patch: add comments explaining why SD
      propagation needs to be done here.
    - debian/patches/CVE-2019-14902-6.patch: ensure we honour both
      change->force_self and change->force_children.
    - debian/patches/CVE-2019-14902-7.patch: schedule SD propagation to a
      renamed DN.
    - debian/patches/CVE-2019-14902-8.patch: fix issue where inherited
      Security Descriptors were not replicated.
    - debian/patches/CVE-2019-14902-9.patch: set renamed = true (and so do
      SD inheritance) after any rename.
    - debian/patches/CVE-2019-14902-10.patch: change basis of descriptor module
      deferred processing to be GUIDs.
    - CVE-2019-14902
  * SECURITY UPDATE: Crash after failed character conversion at log level 3
    or above
    - debian/patches/CVE-2019-14907-1.patch: fix Value stored to 'reason'
      is never read warning.
    - debian/patches/CVE-2019-14907-2.patch: do not print the failed to
      convert string into the logs.
    - CVE-2019-14907

 -- Marc Deslauriers <email address hidden> Tue, 14 Jan 2020 11:11:50 -0500

Source diff to previous version
CVE-2019-14902 Replication of ACLs set to inherit down a subtree on AD Directory not automatic
CVE-2019-14907 Crash after failed character conversion at log level 3 or above

Version: 2:4.7.6+dfsg~ubuntu-0ubuntu2.14 2019-12-10 14:07:05 UTC

  samba (2:4.7.6+dfsg~ubuntu-0ubuntu2.14) bionic-security; urgency=medium

  * SECURITY UPDATE: Samba AD DC zone-named record Denial of Service in DNS
    management server
    - debian/patches/CVE-2019-14861-1.patch: confirm sort behaviour in
    - debian/patches/CVE-2019-14861-2.patch: remove special case for @ in
    - debian/patches/CVE-2019-14861-3.patch: avoid crash in ldb_qsort() via
    - debian/patches/CVE-2019-14861-4.patch: test to demonstrate the bug.
    - debian/patches/CVE-2019-14861-5.patch: reduce flapping in
    - CVE-2019-14861
  * SECURITY UPDATE: DelegationNotAllowed not being enforced in protocol
    transition on Samba AD DC
    - debian/patches/CVE-2019-14870-1.patch: add user-sensitive command to
      set not-delegated flag.
    - debian/patches/CVE-2019-14870-2.patch: heimdal: add S4U test for
    - debian/patches/CVE-2019-14870-3.patch: heimdal: enforce
      delegation_not_allowed in S4U2Self.
    - debian/patches/CVE-2019-14870-4.patch: mit-kdc: enforce
      delegation_not_allowed flag.
    - CVE-2019-14870

 -- Marc Deslauriers <email address hidden> Fri, 29 Nov 2019 08:57:26 -0500

Source diff to previous version
CVE-2019-14861 RESERVED
CVE-2019-14870 RESERVED

Version: 2:4.7.6+dfsg~ubuntu-0ubuntu2.13 2019-10-29 13:06:23 UTC

  samba (2:4.7.6+dfsg~ubuntu-0ubuntu2.13) bionic-security; urgency=medium

  * SECURITY UPDATE: client code can return filenames containing path
    - debian/patches/CVE-2019-10218-1.patch: protect SMB1 client code
      from evil server returned names in source3/libsmb/clilist.c,
    - debian/patches/CVE-2019-10218-2.patch: Protect SMB2 client code
      from evil server returned names in source3/libsmb/cli_smb2_fnum.c.
    - CVE-2019-10218
  * SECURITY UPDATE: Samba AD DC check password script does not receive the
    full password
    - debian/patches/CVE-2019-14833-1.patch: use utf8 characters in the
      unacceptable password in selftest/target/Samba4.pm.
    - debian/patches/CVE-2019-14833-2.patch: send full password to check
      password script in source4/dsdb/common/util.c.
    - CVE-2019-14833
  * SECURITY UPDATE: User with "get changes" permission can crash AD DC
    LDAP server via dirsync
    - debian/patches/CVE-2019-14847-1.patch: ensure attrs exist in
    - debian/patches/CVE-2019-14847-2.patch: demonstrate the correct
      interaction of ranged_results style attributes and dirsync in
    - debian/patches/CVE-2019-14847-3.patch: correct behaviour of
      ranged_results when combined with dirsync in
    - CVE-2019-14847

 -- Marc Deslauriers <email address hidden> Mon, 21 Oct 2019 08:45:35 -0400

About   -   Send Feedback to @ubuntu_updates