UbuntuUpdates.org

Package "samba"

Name: samba

Description:

SMB/CIFS file, print, and login server for Unix

Latest version: 2:4.13.14+dfsg-0ubuntu0.20.04.4
Release: focal (20.04)
Level: security
Repository: main
Homepage: http://www.samba.org

Links


Download "samba"


Other versions of "samba" in Focal

Repository Area Version
base main 2:4.11.6+dfsg-0ubuntu1
base universe 2:4.11.6+dfsg-0ubuntu1
security universe 2:4.13.14+dfsg-0ubuntu0.20.04.4
updates universe 2:4.13.14+dfsg-0ubuntu0.20.04.4
updates main 2:4.13.14+dfsg-0ubuntu0.20.04.4

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2:4.13.14+dfsg-0ubuntu0.20.04.4 2021-12-13 21:07:23 UTC

  samba (2:4.13.14+dfsg-0ubuntu0.20.04.4) focal-security; urgency=medium

  * SECURITY REGRESSION: Kerberos authentication on standalone server in
    MIT realm broken
    - debian/patches/bug14922.patch: fix MIT Realm regression in
      source3/auth/user_krb5.c.

 -- Marc Deslauriers <email address hidden> Mon, 13 Dec 2021 07:12:25 -0500

Source diff to previous version

Version: 2:4.13.14+dfsg-0ubuntu0.20.04.3 2021-12-06 16:06:20 UTC

  samba (2:4.13.14+dfsg-0ubuntu0.20.04.3) focal-security; urgency=medium

  * SECURITY REGRESSION: undesired side effects for the local nt token
    - debian/patches/bug14901-*.patch: upstream patches to fix some
      mapping issues.
  * SECURITY REGRESSION: backup command raises FileNotFoundError
    (LP: #1952187)
    - debian/patches/bug14918-*.patch: upstream patches to properly handle
      dangling symlinks.

 -- Marc Deslauriers <email address hidden> Thu, 02 Dec 2021 08:03:56 -0500

Source diff to previous version
1952187 backup command raises FileNotFoundError

Version: 2:4.13.14+dfsg-0ubuntu0.20.04.1 2021-11-11 13:06:45 UTC

  samba (2:4.13.14+dfsg-0ubuntu0.20.04.1) focal-security; urgency=medium

  * Update to 4.13.14 as a security update (LP: #1950363)
    - Removed patches included in new version:
      + CVE-*.patch
      + zerologon*.patch
      + 0023-libsmb-Don-t-try-to-find-posix-stat-info-in-SMBC_get.patch
      + build-Remove-tests-for-getdents-and-getdirentries.patch
      + fix-double-free-with-unresolved-credentia-cache.patch
      + wscript-remove-all-checks-for-_FUNC-and-__FUNC.patch
      + wscript-split-function-check-to-one-per-line-and-sor.patch
    - Add/Refresh patches from Hirsute package:
      + Rename-mdfind-to-mdsearch.patch
      + bug_221618_precise-64bit-prototype.patch
      + fix-nfs-service-name-to-nfs-kernel-server.patch
    - debian/control: bump libldb-dev Build-Depends to 2.2.3, bump
      libtalloc to 2.3.1, libtdb to 1.4.3, and libtevent to 0.10.2.
    - debian/*.install, debian/*.symbols: sync with Hirsute package, added
      libdcerpc-pkt-auth.so.0.
    - debian/rules: build with --enable-spotlight, remove --accel-aes as it
      is no longer used with gnutls.
    - debian/control: add libicu-dev to Build-Depends.
    - debian/patches/trusted_domain_regression_fix.patch: fix regression
      introduced in 4.13.14.
    - CVE-2016-2124, CVE-2020-25717, CVE-2020-25718, CVE-2020-25719,
      CVE-2020-25721, CVE-2020-25722, CVE-2021-3738, CVE-2021-23192

 -- Marc Deslauriers <email address hidden> Mon, 01 Nov 2021 07:33:25 -0400

Source diff to previous version
1950363 Nov 2021 security update tracking bug
CVE-2016-2124 SMB1 client connections can be downgraded to plaintext authentication
CVE-2020-25717 A user on the domain can become root on domain members
CVE-2020-25718 An RODC can issue (forge) administrator tickets to other servers
CVE-2020-25719 AD DC Username based races when no PAC is given
CVE-2020-25721 [Kerberos acceptors need easy access to stable AD identifiers (eg objectSid)
CVE-2020-25722 AD DC UPN vs samAccountName not checked
CVE-2021-3738 crash in dsdb stack
CVE-2021-23192 dcerpc requests don't check all fragments against the first auth_state

Version: 2:4.11.6+dfsg-0ubuntu1.8 2021-04-29 18:06:26 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.8) focal-security; urgency=medium

  * SECURITY UPDATE: wrong group entries via negative idmap cache entries
    - debian/patches/CVE-2021-20254.patch: Simplify sids_to_unixids() in
      source3/passdb/lookup_sid.c.
    - CVE-2021-20254

 -- Marc Deslauriers <email address hidden> Wed, 14 Apr 2021 07:02:48 -0400

Source diff to previous version
CVE-2021-20254 Negative idmap cache entries can cause incorrect group entries in the Samba file server process token

Version: 2:4.11.6+dfsg-0ubuntu1.6 2020-11-02 15:07:02 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.6) focal-security; urgency=medium

  * SECURITY UPDATE: Missing handle permissions check in ChangeNotify
    - debian/patches/CVE-2020-14318-*.patch: ensure change notifies can't
      get set unless the directory handle is open for SEC_DIR_LIST in
      source4/torture/smb2/notify.c, source3/smbd/notify.c.
    - CVE-2020-14318
  * SECURITY UPDATE: Unprivileged user can crash winbind
    - debian/patches/CVE-2020-14323-*.patch: fix invalid lookupsids DoS in
      source3/winbindd/winbindd_lookupsids.c,
      source4/torture/winbind/struct_based.c.
    - CVE-2020-14323
  * SECURITY UPDATE: DNS server crash via invalid records
    - debian/patches/CVE-2020-14383-*.patch: ensure variable initialization
      with NULL and do not crash when additional data not found in
      source4/rpc_server/dnsserver/dcerpc_dnsserver.c.
    - CVE-2020-14383

 -- Marc Deslauriers <email address hidden> Fri, 16 Oct 2020 06:48:54 -0400

CVE-2020-14318 Missing handle permissions check in SMB1/2/3 ChangeNotify
CVE-2020-14323 A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could
CVE-2020-14383 An authenticated user can crash the DCE/RPC DNS with easily crafted records



About   -   Send Feedback to @ubuntu_updates