Package "samba"

Name: samba


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • clustered database to store temporary data
  • Samba nameservice integration plugins
  • Windows domain authentication integration plugin
  • tools for viewing and manipulating the Windows registry

Latest version: 2:4.3.11+dfsg-0ubuntu0.16.04.18
Release: xenial (16.04)
Level: updates
Repository: universe


Save this URL for the latest version of "samba": https://www.ubuntuupdates.org/samba

Other versions of "samba" in Xenial

Repository Area Version
base main 2:4.3.8+dfsg-0ubuntu1
base universe 2:4.3.8+dfsg-0ubuntu1
security main 2:4.3.11+dfsg-0ubuntu0.16.04.18
security universe 2:4.3.11+dfsg-0ubuntu0.16.04.18
updates main 2:4.3.11+dfsg-0ubuntu0.16.04.18

Packages in group

Deleted packages are displayed in grey.


Version: 2:4.3.11+dfsg-0ubuntu0.16.04.18 2018-11-27 15:07:21 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.18) xenial-security; urgency=medium

  * SECURITY UPDATE: Unprivileged adding of CNAME record causing loop in AD
    Internal DNS server
    - debian/patches/CVE-2018-14629.patch: add CNAME loop prevention using
      counter in source4/dns_server/dns_query.c.
    - CVE-2018-14629
  * SECURITY UPDATE: Double-free in Samba AD DC KDC with PKINIT
    - debian/patches/CVE-2018-16841.patch: fix segfault on PKINIT with
      mis-matching principal in source4/kdc/db-glue.c.
    - CVE-2018-16841
  * SECURITY UPDATE: NULL pointer de-reference in Samba AD DC LDAP server
    - debian/patches/CVE-2018-16851.patch: check ret before manipulating
      blob in source4/ldap_server/ldap_server.c.
    - CVE-2018-16851

 -- Marc Deslauriers <email address hidden> Fri, 16 Nov 2018 08:43:34 -0500

Source diff to previous version
CVE-2018-14629 Unprivileged adding of CNAME record causing loop in AD Internal DNS server
CVE-2018-16841 Double-free in Samba AD DC KDC with PKINIT
CVE-2018-16851 NULL pointer de-reference in Samba AD DC LDAP server

Version: 2:4.3.11+dfsg-0ubuntu0.16.04.17 2018-10-11 10:06:22 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.17) xenial; urgency=medium

  * d/samba.nmbd.init, d/samba.samba-ad-dc.init, d/samba.smbd.init, d/winbind.init
    avoid issues due to init scripts misdetecting services (LP: #1792400)
    - use --pidfile on --start to not block on same binaries running in
    - use --exec on --stop to not cause unintended processes to be acted on,
      if the old process terminated without being able to remove the pid-file.

 -- Christian Ehrhardt <email address hidden> Mon, 24 Sep 2018 12:08:45 +0200

Source diff to previous version
1792400 smbd failed in host when both lxd container and host have smbd

Version: 2:4.3.11+dfsg-0ubuntu0.16.04.16 2018-09-03 09:06:49 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.16) xenial; urgency=medium

  * d/p/bug_1583324_include_with_macro.patch: don't fail parsing the
    config file if it has macros in include directives (LP: #1583324)

 -- Andreas Hasenack <email address hidden> Thu, 02 Aug 2018 18:30:26 -0300

Source diff to previous version
1583324 Samba won't start when an include statement in smb.conf has a variable substitution

Version: 2:4.3.11+dfsg-0ubuntu0.16.04.15 2018-08-14 19:06:48 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.15) xenial-security; urgency=medium

  * SECURITY UPDATE: Insufficient input validation on client directory
    listing in libsmbclient
    - debian/patches/CVE-2018-10858-*.patch: don't overwrite passed in
      buffer in source3/libsmb/libsmb_path.c, add checks to
      source3/libsmb/libsmb_dir.c, source3/libsmb/libsmb_path.c.
    - CVE-2018-10858
  * SECURITY UPDATE: Confidential attribute disclosure AD LDAP server
    - debian/patches/CVE-2018-10919-*.patch: fix access checks.
    - CVE-2018-10919

 -- Marc Deslauriers <email address hidden> Mon, 06 Aug 2018 07:40:17 -0400

Source diff to previous version

Version: 2:4.3.11+dfsg-0ubuntu0.16.04.13 2018-03-13 15:06:22 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.13) xenial-security; urgency=medium

  * SECURITY UPDATE: Denial of Service Attack on external print server
    - debian/patches/CVE-2018-1050.patch: protect against null pointer
      derefs in source3/rpc_server/spoolss/srv_spoolss_nt.c.
    - CVE-2018-1050
  * SECURITY UPDATE: Authenticated users can change other users password
    - debian/patches/CVE-2018-1057-*.patch: fix password changing logic.
    - CVE-2018-1057

 -- Marc Deslauriers <email address hidden> Tue, 06 Mar 2018 16:49:12 +0100

About   -   Send Feedback to @ubuntu_updates