UbuntuUpdates.org

Package "python3-samba"

Name: python3-samba

Description:

Python 3 bindings for Samba

Latest version: 2:4.15.13+dfsg-0ubuntu0.20.04.2
Release: focal (20.04)
Level: security
Repository: main
Head package: samba
Homepage: http://www.samba.org

Links


Download "python3-samba"


Other versions of "python3-samba" in Focal

Repository Area Version
base main 2:4.11.6+dfsg-0ubuntu1
updates main 2:4.15.13+dfsg-0ubuntu0.20.04.2

Changelog

Version: 2:4.13.17~dfsg-0ubuntu0.21.04.1 2022-02-01 12:06:28 UTC

  samba (2:4.13.17~dfsg-0ubuntu0.21.04.1) focal-security; urgency=medium

  * Update to 4.13.17 as a security update
    - CVE-2021-43566, CVE-2021-44142, CVE-2022-0336
  * Removed patches included in new version:
    - debian/patches/trusted_domain_regression_fix.patch
    - debian/patches/bug14901-*.patch
    - debian/patches/bug14922.patch

 -- Marc Deslauriers <email address hidden> Mon, 31 Jan 2022 08:11:13 -0500

Source diff to previous version
CVE-2021-43566 All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area o
CVE-2021-44142 Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
CVE-2022-0336 Samba AD users with permission to write to an account can impersonate arbitrary services

Version: 2:4.13.14+dfsg-0ubuntu0.20.04.4 2021-12-13 21:07:23 UTC

  samba (2:4.13.14+dfsg-0ubuntu0.20.04.4) focal-security; urgency=medium

  * SECURITY REGRESSION: Kerberos authentication on standalone server in
    MIT realm broken
    - debian/patches/bug14922.patch: fix MIT Realm regression in
      source3/auth/user_krb5.c.

 -- Marc Deslauriers <email address hidden> Mon, 13 Dec 2021 07:12:25 -0500

Source diff to previous version

Version: 2:4.13.14+dfsg-0ubuntu0.20.04.3 2021-12-06 16:06:20 UTC

  samba (2:4.13.14+dfsg-0ubuntu0.20.04.3) focal-security; urgency=medium

  * SECURITY REGRESSION: undesired side effects for the local nt token
    - debian/patches/bug14901-*.patch: upstream patches to fix some
      mapping issues.
  * SECURITY REGRESSION: backup command raises FileNotFoundError
    (LP: #1952187)
    - debian/patches/bug14918-*.patch: upstream patches to properly handle
      dangling symlinks.

 -- Marc Deslauriers <email address hidden> Thu, 02 Dec 2021 08:03:56 -0500

Source diff to previous version
1952187 backup command raises FileNotFoundError

Version: 2:4.13.14+dfsg-0ubuntu0.20.04.1 2021-11-11 13:06:45 UTC

  samba (2:4.13.14+dfsg-0ubuntu0.20.04.1) focal-security; urgency=medium

  * Update to 4.13.14 as a security update (LP: #1950363)
    - Removed patches included in new version:
      + CVE-*.patch
      + zerologon*.patch
      + 0023-libsmb-Don-t-try-to-find-posix-stat-info-in-SMBC_get.patch
      + build-Remove-tests-for-getdents-and-getdirentries.patch
      + fix-double-free-with-unresolved-credentia-cache.patch
      + wscript-remove-all-checks-for-_FUNC-and-__FUNC.patch
      + wscript-split-function-check-to-one-per-line-and-sor.patch
    - Add/Refresh patches from Hirsute package:
      + Rename-mdfind-to-mdsearch.patch
      + bug_221618_precise-64bit-prototype.patch
      + fix-nfs-service-name-to-nfs-kernel-server.patch
    - debian/control: bump libldb-dev Build-Depends to 2.2.3, bump
      libtalloc to 2.3.1, libtdb to 1.4.3, and libtevent to 0.10.2.
    - debian/*.install, debian/*.symbols: sync with Hirsute package, added
      libdcerpc-pkt-auth.so.0.
    - debian/rules: build with --enable-spotlight, remove --accel-aes as it
      is no longer used with gnutls.
    - debian/control: add libicu-dev to Build-Depends.
    - debian/patches/trusted_domain_regression_fix.patch: fix regression
      introduced in 4.13.14.
    - CVE-2016-2124, CVE-2020-25717, CVE-2020-25718, CVE-2020-25719,
      CVE-2020-25721, CVE-2020-25722, CVE-2021-3738, CVE-2021-23192

 -- Marc Deslauriers <email address hidden> Mon, 01 Nov 2021 07:33:25 -0400

Source diff to previous version
1950363 Nov 2021 security update tracking bug
CVE-2016-2124 SMB1 client connections can be downgraded to plaintext authentication
CVE-2020-25717 A user on the domain can become root on domain members
CVE-2020-25718 An RODC can issue (forge) administrator tickets to other servers
CVE-2020-25719 AD DC Username based races when no PAC is given
CVE-2020-25721 [Kerberos acceptors need easy access to stable AD identifiers (eg objectSid)
CVE-2020-25722 AD DC UPN vs samAccountName not checked
CVE-2021-3738 crash in dsdb stack
CVE-2021-23192 dcerpc requests don't check all fragments against the first auth_state

Version: 2:4.11.6+dfsg-0ubuntu1.8 2021-04-29 18:06:26 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.8) focal-security; urgency=medium

  * SECURITY UPDATE: wrong group entries via negative idmap cache entries
    - debian/patches/CVE-2021-20254.patch: Simplify sids_to_unixids() in
      source3/passdb/lookup_sid.c.
    - CVE-2021-20254

 -- Marc Deslauriers <email address hidden> Wed, 14 Apr 2021 07:02:48 -0400

CVE-2021-20254 Negative idmap cache entries can cause incorrect group entries in the Samba file server process token



About   -   Send Feedback to @ubuntu_updates