Package "samba"

Name: samba


SMB/CIFS file, print, and login server for Unix

Latest version: 2:4.10.0+dfsg-0ubuntu2.8
Release: disco (19.04)
Level: updates
Repository: main
Homepage: http://www.samba.org


Save this URL for the latest version of "samba": https://www.ubuntuupdates.org/samba

Download "samba"

Other versions of "samba" in Disco

Repository Area Version
base main 2:4.10.0+dfsg-0ubuntu2
base universe 2:4.10.0+dfsg-0ubuntu2
security universe 2:4.10.0+dfsg-0ubuntu2.8
security main 2:4.10.0+dfsg-0ubuntu2.8
updates universe 2:4.10.0+dfsg-0ubuntu2.8

Packages in group

Deleted packages are displayed in grey.


Version: 2:4.10.0+dfsg-0ubuntu2.8 2020-01-21 15:07:17 UTC

  samba (2:4.10.0+dfsg-0ubuntu2.8) disco-security; urgency=medium

  * SECURITY UPDATE: replication of ACLs set to inherit down a subtree on
    AD Directory not automatic
    - debian/patches/CVE-2019-14902-1.patch: add test for replication of
      inherited security descriptors.
    - debian/patches/CVE-2019-14902-2.patch: add test for a special case
      around replicated renames.
    - debian/patches/CVE-2019-14902-3.patch: add test to confirm ACL
      inheritance really happens
    - debian/patches/CVE-2019-14902-4.patch: explain that
      descriptor_sd_propagation_recursive() is protected by a transaction.
    - debian/patches/CVE-2019-14902-5.patch: add comments explaining why SD
      propagation needs to be done here.
    - debian/patches/CVE-2019-14902-6.patch: ensure we honour both
      change->force_self and change->force_children.
    - debian/patches/CVE-2019-14902-7.patch: schedule SD propagation to a
      renamed DN.
    - debian/patches/CVE-2019-14902-8.patch: fix issue where inherited
      Security Descriptors were not replicated.
    - debian/patches/CVE-2019-14902-9.patch: set renamed = true (and so do
      SD inheritance) after any rename.
    - debian/patches/CVE-2019-14902-10.patch: change basis of descriptor module
      deferred processing to be GUIDs.
    - CVE-2019-14902
  * SECURITY UPDATE: Crash after failed character conversion at log level 3
    or above
    - debian/patches/CVE-2019-14907-1.patch: fix Value stored to 'reason'
      is never read warning.
    - debian/patches/CVE-2019-14907-2.patch: do not print the failed to
      convert string into the logs.
    - CVE-2019-14907
  * SECURITY UPDATE: Use after free during DNS zone scavenging in Samba AD DC
    - debian/patches/CVE-2019-19344.patch: fix use after free in
    - CVE-2019-19344

 -- Marc Deslauriers <email address hidden> Tue, 14 Jan 2020 11:02:26 -0500

Source diff to previous version
CVE-2019-14902 Replication of ACLs set to inherit down a subtree on AD Directory not automatic
CVE-2019-14907 Crash after failed character conversion at log level 3 or above
CVE-2019-19344 Use after free during DNS zone scavenging in Samba AD DC

Version: 2:4.10.0+dfsg-0ubuntu2.7 2019-12-10 16:06:29 UTC

  samba (2:4.10.0+dfsg-0ubuntu2.7) disco-security; urgency=medium

  * SECURITY UPDATE: Samba AD DC zone-named record Denial of Service in DNS
    management server
    - debian/patches/CVE-2019-14861-1.patch: confirm sort behaviour in
    - debian/patches/CVE-2019-14861-2.patch: remove special case for @ in
    - debian/patches/CVE-2019-14861-3.patch: avoid crash in ldb_qsort() via
    - debian/patches/CVE-2019-14861-4.patch: test to demonstrate the bug.
    - debian/patches/CVE-2019-14861-5.patch: reduce flapping in
    - CVE-2019-14861
  * SECURITY UPDATE: DelegationNotAllowed not being enforced in protocol
    transition on Samba AD DC
    - debian/patches/CVE-2019-14870-1.patch: add user-sensitive command to
      set not-delegated flag.
    - debian/patches/CVE-2019-14870-2.patch: heimdal: add S4U test for
    - debian/patches/CVE-2019-14870-3.patch: heimdal: enforce
      delegation_not_allowed in S4U2Self.
    - debian/patches/CVE-2019-14870-4.patch: mit-kdc: enforce
      delegation_not_allowed flag.
    - CVE-2019-14870

 -- Marc Deslauriers <email address hidden> Fri, 29 Nov 2019 07:40:24 -0500

Source diff to previous version
CVE-2019-14861 RESERVED
CVE-2019-14870 RESERVED

Version: 2:4.10.0+dfsg-0ubuntu2.6 2019-10-29 13:06:29 UTC

  samba (2:4.10.0+dfsg-0ubuntu2.6) disco-security; urgency=medium

  * SECURITY UPDATE: client code can return filenames containing path
    - debian/patches/CVE-2019-10218-1.patch: protect SMB1 client code
      from evil server returned names in source3/libsmb/clilist.c,
    - debian/patches/CVE-2019-10218-2.patch: Protect SMB2 client code
      from evil server returned names in source3/libsmb/cli_smb2_fnum.c.
    - CVE-2019-10218
  * SECURITY UPDATE: Samba AD DC check password script does not receive the
    full password
    - debian/patches/CVE-2019-14833-1.patch: use utf8 characters in the
      unacceptable password in selftest/target/Samba4.pm.
    - debian/patches/CVE-2019-14833-2.patch: send full password to check
      password script in source4/dsdb/common/util.c.
    - CVE-2019-14833
  * SECURITY UPDATE: User with "get changes" permission can crash AD DC
    LDAP server via dirsync
    - debian/patches/CVE-2019-14847-1.patch: ensure attrs exist in
    - debian/patches/CVE-2019-14847-2.patch: demonstrate the correct
      interaction of ranged_results style attributes and dirsync in
    - debian/patches/CVE-2019-14847-3.patch: correct behaviour of
      ranged_results when combined with dirsync in
    - CVE-2019-14847

 -- Marc Deslauriers <email address hidden> Mon, 21 Oct 2019 07:40:43 -0400

Source diff to previous version

Version: 2:4.10.0+dfsg-0ubuntu2.4 2019-09-03 22:07:15 UTC

  samba (2:4.10.0+dfsg-0ubuntu2.4) disco-security; urgency=medium

  * SECURITY UPDATE: restricted share escape by user
    - debian/patches/CVE-2019-10197-01-v4-10.patch: smbd: separate
      out impersonation debug info into a new function.
    - debian/patches/CVE-2019-10197-02-v4-10.patch: smbd: make sure that
      change_to_user_internal() always resets current_user.done_chdir
    - debian/patches/CVE-2019-10197-03-v4-10.patch: smbd: make sure we
      reset current_user.{need,done}_chdir in become_root()
    - debian/patches/CVE-2019-10197-04-v4-10.patch: selftest: make
      fsrvp_share its own independent subdirectory
    - debian/patches/CVE-2019-10197-05-v4-10.patch:
      test_smbclient_s3.sh: add regression test for the no permission
      on share root problem
    - debian/patches/CVE-2019-10197-06-v4-10.patch: smbd: split
      change_to_user_impersonate() out of change_to_user_internal()
    - CVE-2019-10197

 -- Steve Beattie <email address hidden> Fri, 30 Aug 2019 11:01:29 -0700

Source diff to previous version
CVE-2019-10197 A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up ...

Version: 2:4.10.0+dfsg-0ubuntu2.3 2019-09-02 10:06:19 UTC

  samba (2:4.10.0+dfsg-0ubuntu2.3) disco; urgency=medium

  * CTDB enablement for NFS HA (LP: #722201) and needed fixes:
    - d/p/ctdb-config-depend-on-etc-default-nodes-file.patch: do not try to
      start daemon without /etc/ctdb/nodes.
    - d/rules: installing provided config examples and helper scripts.
    - Examples of NFS HA CTDB config files + helper script:
      + d/ctdb.example.enable.nfs.sh
      + d/ctdb.example.nfs-common
      + d/ctdb.example.nfs-kernel-server
      + d/ctdb.example.services
      + d/ctdb.example.sysctl-nfs-static-ports.conf
    - d/p/fix-nfs-service-name-to-nfs-kernel-server.patch: change nfs service
      name from nfs to nfs-kernel-server.
    - d/p/ctdb-scripts-fix-tcp_tw_recycle-existence-check.patch: fix
      tcp_tw_recycle existence check.
  * Allow proper ctdb initalization (LP: #1828799):
    - d/ctdb.dirs: added /var/lib/ctdb/* directories
    - d/ctdb.postrm: remove leftovers from
  * d/ctdb.install, d/rules: create ctdb run directory into tmpfiles.d
    to allow pid file to exist (LP: #1821775)

 -- Rafael David Tinoco <email address hidden> Thu, 11 Jul 2019 18:00:50 +0000

722201 CTDB port is not aware of Ubuntu-specific NFS Settings
1828799 Package ctdb does not create directories in /var/lib/ctdb
1821775 ctdb cannot create PID file

About   -   Send Feedback to @ubuntu_updates