Change logs for samba source package in Zesty

  • samba (2:4.5.8+dfsg-0ubuntu0.17.04.8) zesty-security; urgency=medium
    
      * SECURITY UPDATE: Use-after-free vulnerability
        - debian/patches/CVE-2017-14746.patch: fix use-after-free crash bug in
          source3/smbd/process.c, source3/smbd/reply.c.
        - CVE-2017-14746
      * SECURITY UPDATE: Server heap memory information leak
        - debian/patches/CVE-2017-15275.patch: zero out unused grown area in
          source3/smbd/srvstr.c.
        - CVE-2017-15275
    
     -- Marc Deslauriers <email address hidden>  Wed, 15 Nov 2017 15:39:57 -0500
  • samba (2:4.5.8+dfsg-0ubuntu0.17.04.7) zesty-security; urgency=medium
    
      * SECURITY UPDATE: SMB1/2/3 connections may not require signing where
        they should
        - debian/patches/CVE-2017-12150-1.patch: add SMB_SIGNING_REQUIRED to
          source3/lib/util_cmdline.c.
        - debian/patches/CVE-2017-12150-2.patch: add SMB_SIGNING_REQUIRED to
          source3/libsmb/pylibsmb.c.
        - debian/patches/CVE-2017-12150-3.patch: add SMB_SIGNING_REQUIRED to
          libgpo/gpo_fetch.c.
        - debian/patches/CVE-2017-12150-4.patch: add check for
          NTLM_CCACHE/SIGN/SEAL to auth/credentials/credentials.c.
        - debian/patches/CVE-2017-12150-5.patch: add
          smbXcli_conn_signing_mandatory() to libcli/smb/smbXcli_base.*.
        - debian/patches/CVE-2017-12150-6.patch: only fallback to anonymous if
          authentication was not requested in source3/libsmb/clidfs.c.
        - CVE-2017-12150
      * SECURITY UPDATE: SMB3 connections don't keep encryption across DFS
        redirects
        - debian/patches/CVE-2017-12151-1.patch: add
          cli_state_is_encryption_on() helper function to
          source3/libsmb/clientgen.c, source3/libsmb/proto.h.
        - debian/patches/CVE-2017-12151-2.patch: make use of
          cli_state_is_encryption_on() in source3/libsmb/clidfs.c,
          source3/libsmb/libsmb_context.c.
        - CVE-2017-12151
      * SECURITY UPDATE: Server memory information leak over SMB1
        - debian/patches/CVE-2017-12163.patch: prevent client short SMB1 write
          from writing server memory to file in source3/smbd/reply.c.
        - CVE-2017-12163
    
     -- Marc Deslauriers <email address hidden>  Thu, 21 Sep 2017 07:52:29 -0400
  • samba (2:4.5.8+dfsg-0ubuntu0.17.04.6) zesty; urgency=medium
    
      * d/p/bug_1702529_EACCESS_with_rootshare.patch:
        Handle corner case for / shares. (LP: #1702529)
    
     -- Dariusz Gadomski <email address hidden>  Wed, 23 Aug 2017 11:50:15 +0200
  • samba (2:4.5.8+dfsg-0ubuntu0.17.04.5) zesty; urgency=medium
    
      * Remove the fix for LP #1584485 as it builds a broken pam_winbind
        module. There is a revised version of that patch attached to
        #1584485 but it has not been vetted yet, so for now it's best
        to revert (again) so that pam_winbind can be used.
        (LP: #1677329, LP: #1644428)
        - d/p/fix-1584485.patch: drop
        - d/rules: remove winbind static build option
    
     -- Andreas Hasenack <email address hidden>  Thu, 13 Jul 2017 14:44:16 -0300
  • samba (2:4.5.8+dfsg-0ubuntu0.17.04.4) zesty-security; urgency=medium
    
      * SECURITY UPDATE: KDC-REP service name impersonation
        - debian/patches/CVE-2017-11103: use encrypted service name rather
          than unencrypted (and therefore spoofable) version in heimdal
        - CVE-2017-11103
    
     -- Steve Beattie <email address hidden>  Thu, 13 Jul 2017 13:21:50 -0700
  • samba (2:4.5.8+dfsg-0ubuntu0.17.04.3) zesty-security; urgency=medium
    
      * d/p/non-wide-symlinks-to-directories-12860.patch: fix a CVE-2017-2619
        regression which breaks symlinks to directories on certain systems
        (LP: #1701073)
    
     -- Andreas Hasenack <email address hidden>  Fri, 30 Jun 2017 17:02:20 -0300
  • samba (2:4.5.8+dfsg-0ubuntu0.17.04.2) zesty-security; urgency=medium
    
      * SECURITY UPDATE: remote code execution from a writable share
        - debian/patches/CVE-2017-7494.patch: refuse to open pipe names with a
          slash inside in source3/rpc_server/srv_pipe.c.
        - CVE-2017-7494
    
     -- Marc Deslauriers <email address hidden>  Fri, 19 May 2017 14:16:09 -0400
  • samba (2:4.5.8+dfsg-0ubuntu0.17.04.1) zesty-security; urgency=medium
    
      * SECURITY UPDATE: Symlink race allows access outside share definition
        - Updated to new upstream release 4.5.8.
        - CVE-2017-2619
    
     -- Marc Deslauriers <email address hidden>  Fri, 21 Apr 2017 07:33:25 -0400
  • samba (2:4.5.4+dfsg-1ubuntu2) zesty; urgency=medium
    
      * d/control: add libcephfs-dev as b-d to build vfs_ceph
        (LP: #1668940).
    
     -- Nishanth Aravamudan <email address hidden>  Mon, 06 Mar 2017 11:13:41 -0800
  • samba (2:4.5.4+dfsg-1ubuntu1) zesty; urgency=medium
    
      * Merge from Debian unstable (LP: #1659707, LP: #1639962). Remaining
        changes:
        + debian/VERSION.patch: Update vendor string to "Ubuntu".
        + debian/smb.conf;
          - Add "(Samba, Ubuntu)" to server string.
          - Comment out the default [homes] share, and add a comment about "valid users = %s"
             to show users how to restrict access to \\server\username to only username.
        + debian/samba-common.config:
          - Do not change prioritiy to high if dhclient3 is installed.
        + Add apport hook:
          - Created debian/source_samba.py.
          - debian/rules, debia/samb-common-bin.install: install hook.
        + d/p/krb_zero_cursor.patch - apply proposed-upstream fix for
          pam_winbind krb5_ccache_type=FILE failure (LP #1310919)
        + debian/patches/winbind_trusted_domains.patch: make sure domain members
          can talk to trusted domains DCs.
          [ update patch based upon upstream discussion ]
        + d/p/fix-1584485.patch: Make libnss-winbind and libpam-winbind
          to be statically linked fixes LP #1584485.
        + d/rules: Compile winbindd/winbindd statically.
      * Drop:
        - Delete debian/.gitignore
        [ Previously undocumented ]
        - debian/patches/git_smbclient_cpu.patch:
          + backport upstream patch to fix smbclient users hanging/eating cpu on
            trying to contact a machine which is not there (lp #1572260)
        [ Fixed upstream ]
        - SECURITY UPDATE: remote code execution via heap overflow in NDR parsing
          + debian/patches/CVE-2016-2123.patch: check lengths in
            librpc/ndr/ndr_dnsp.c.
          + CVE-2016-2123
        [ Fixed in Debian ]
        - SECURITY UPDATE: unconditional privilege delegation to Kerberos servers
          + debian/patches/CVE-2016-2125.patch: don't use GSS_C_DELEG_FLAG in
            source4/scripting/bin/nsupdate-gss, source3/librpc/crypto/gse.c,
            source4/auth/gensec/gensec_gssapi.c.
          + CVE-2016-2125
        [ Fixed in Debian ]
        - SECURITY UPDATE: privilege elevation in Kerberos PAC validation
          + debian/patches/CVE-2016-2126.patch: only allow known checksum types
            in auth/kerberos/kerberos_pac.c.
          + CVE-2016-2126
        [ Fixed in Debian ]
    
     -- Nishanth Aravamudan <email address hidden>  Thu, 26 Jan 2017 17:20:15 -0800
  • samba (2:4.4.5+dfsg-2ubuntu7) zesty; urgency=medium
    
      * SECURITY UPDATE: remote code execution via heap overflow in NDR parsing
        - debian/patches/CVE-2016-2123.patch: check lengths in
          librpc/ndr/ndr_dnsp.c.
        - CVE-2016-2123
      * SECURITY UPDATE: unconditional privilege delegation to Kerberos servers
        - debian/patches/CVE-2016-2125.patch: don't use GSS_C_DELEG_FLAG in
          source4/scripting/bin/nsupdate-gss, source3/librpc/crypto/gse.c,
          source4/auth/gensec/gensec_gssapi.c.
        - CVE-2016-2125
      * SECURITY UPDATE: privilege elevation in Kerberos PAC validation
        - debian/patches/CVE-2016-2126.patch: only allow known checksum types
          in auth/kerberos/kerberos_pac.c.
        - CVE-2016-2126
    
     -- Marc Deslauriers <email address hidden>  Fri, 20 Jan 2017 12:32:25 -0500
  • samba (2:4.4.5+dfsg-2ubuntu6) zesty; urgency=high
    
      * d/p/fix-1584485.patch: Make libnss-winbind and libpam-winbind
        to be statically linked fixes LP: #1584485.
    
      * d/rules: Compile winbindd/winbindd statically.
    
     -- Jorge Niedbalski <email address hidden>  Wed, 02 Nov 2016 13:59:10 +0100
  • samba (2:4.4.5+dfsg-2ubuntu5) yakkety; urgency=medium
    
      * No-change rebuild for readline soname change.
    
     -- Matthias Klose <email address hidden>  Sun, 18 Sep 2016 10:26:52 +0000