-
samba (2:4.5.8+dfsg-0ubuntu0.17.04.8) zesty-security; urgency=medium
* SECURITY UPDATE: Use-after-free vulnerability
- debian/patches/CVE-2017-14746.patch: fix use-after-free crash bug in
source3/smbd/process.c, source3/smbd/reply.c.
- CVE-2017-14746
* SECURITY UPDATE: Server heap memory information leak
- debian/patches/CVE-2017-15275.patch: zero out unused grown area in
source3/smbd/srvstr.c.
- CVE-2017-15275
-- Marc Deslauriers <email address hidden> Wed, 15 Nov 2017 15:39:57 -0500
-
samba (2:4.5.8+dfsg-0ubuntu0.17.04.7) zesty-security; urgency=medium
* SECURITY UPDATE: SMB1/2/3 connections may not require signing where
they should
- debian/patches/CVE-2017-12150-1.patch: add SMB_SIGNING_REQUIRED to
source3/lib/util_cmdline.c.
- debian/patches/CVE-2017-12150-2.patch: add SMB_SIGNING_REQUIRED to
source3/libsmb/pylibsmb.c.
- debian/patches/CVE-2017-12150-3.patch: add SMB_SIGNING_REQUIRED to
libgpo/gpo_fetch.c.
- debian/patches/CVE-2017-12150-4.patch: add check for
NTLM_CCACHE/SIGN/SEAL to auth/credentials/credentials.c.
- debian/patches/CVE-2017-12150-5.patch: add
smbXcli_conn_signing_mandatory() to libcli/smb/smbXcli_base.*.
- debian/patches/CVE-2017-12150-6.patch: only fallback to anonymous if
authentication was not requested in source3/libsmb/clidfs.c.
- CVE-2017-12150
* SECURITY UPDATE: SMB3 connections don't keep encryption across DFS
redirects
- debian/patches/CVE-2017-12151-1.patch: add
cli_state_is_encryption_on() helper function to
source3/libsmb/clientgen.c, source3/libsmb/proto.h.
- debian/patches/CVE-2017-12151-2.patch: make use of
cli_state_is_encryption_on() in source3/libsmb/clidfs.c,
source3/libsmb/libsmb_context.c.
- CVE-2017-12151
* SECURITY UPDATE: Server memory information leak over SMB1
- debian/patches/CVE-2017-12163.patch: prevent client short SMB1 write
from writing server memory to file in source3/smbd/reply.c.
- CVE-2017-12163
-- Marc Deslauriers <email address hidden> Thu, 21 Sep 2017 07:52:29 -0400
-
samba (2:4.5.8+dfsg-0ubuntu0.17.04.6) zesty; urgency=medium
* d/p/bug_1702529_EACCESS_with_rootshare.patch:
Handle corner case for / shares. (LP: #1702529)
-- Dariusz Gadomski <email address hidden> Wed, 23 Aug 2017 11:50:15 +0200
-
samba (2:4.5.8+dfsg-0ubuntu0.17.04.5) zesty; urgency=medium
* Remove the fix for LP #1584485 as it builds a broken pam_winbind
module. There is a revised version of that patch attached to
#1584485 but it has not been vetted yet, so for now it's best
to revert (again) so that pam_winbind can be used.
(LP: #1677329, LP: #1644428)
- d/p/fix-1584485.patch: drop
- d/rules: remove winbind static build option
-- Andreas Hasenack <email address hidden> Thu, 13 Jul 2017 14:44:16 -0300
-
samba (2:4.5.8+dfsg-0ubuntu0.17.04.4) zesty-security; urgency=medium
* SECURITY UPDATE: KDC-REP service name impersonation
- debian/patches/CVE-2017-11103: use encrypted service name rather
than unencrypted (and therefore spoofable) version in heimdal
- CVE-2017-11103
-- Steve Beattie <email address hidden> Thu, 13 Jul 2017 13:21:50 -0700
-
samba (2:4.5.8+dfsg-0ubuntu0.17.04.3) zesty-security; urgency=medium
* d/p/non-wide-symlinks-to-directories-12860.patch: fix a CVE-2017-2619
regression which breaks symlinks to directories on certain systems
(LP: #1701073)
-- Andreas Hasenack <email address hidden> Fri, 30 Jun 2017 17:02:20 -0300
-
samba (2:4.5.8+dfsg-0ubuntu0.17.04.2) zesty-security; urgency=medium
* SECURITY UPDATE: remote code execution from a writable share
- debian/patches/CVE-2017-7494.patch: refuse to open pipe names with a
slash inside in source3/rpc_server/srv_pipe.c.
- CVE-2017-7494
-- Marc Deslauriers <email address hidden> Fri, 19 May 2017 14:16:09 -0400
-
samba (2:4.5.8+dfsg-0ubuntu0.17.04.1) zesty-security; urgency=medium
* SECURITY UPDATE: Symlink race allows access outside share definition
- Updated to new upstream release 4.5.8.
- CVE-2017-2619
-- Marc Deslauriers <email address hidden> Fri, 21 Apr 2017 07:33:25 -0400
-
samba (2:4.5.4+dfsg-1ubuntu2) zesty; urgency=medium
* d/control: add libcephfs-dev as b-d to build vfs_ceph
(LP: #1668940).
-- Nishanth Aravamudan <email address hidden> Mon, 06 Mar 2017 11:13:41 -0800
-
samba (2:4.5.4+dfsg-1ubuntu1) zesty; urgency=medium
* Merge from Debian unstable (LP: #1659707, LP: #1639962). Remaining
changes:
+ debian/VERSION.patch: Update vendor string to "Ubuntu".
+ debian/smb.conf;
- Add "(Samba, Ubuntu)" to server string.
- Comment out the default [homes] share, and add a comment about "valid users = %s"
to show users how to restrict access to \\server\username to only username.
+ debian/samba-common.config:
- Do not change prioritiy to high if dhclient3 is installed.
+ Add apport hook:
- Created debian/source_samba.py.
- debian/rules, debia/samb-common-bin.install: install hook.
+ d/p/krb_zero_cursor.patch - apply proposed-upstream fix for
pam_winbind krb5_ccache_type=FILE failure (LP #1310919)
+ debian/patches/winbind_trusted_domains.patch: make sure domain members
can talk to trusted domains DCs.
[ update patch based upon upstream discussion ]
+ d/p/fix-1584485.patch: Make libnss-winbind and libpam-winbind
to be statically linked fixes LP #1584485.
+ d/rules: Compile winbindd/winbindd statically.
* Drop:
- Delete debian/.gitignore
[ Previously undocumented ]
- debian/patches/git_smbclient_cpu.patch:
+ backport upstream patch to fix smbclient users hanging/eating cpu on
trying to contact a machine which is not there (lp #1572260)
[ Fixed upstream ]
- SECURITY UPDATE: remote code execution via heap overflow in NDR parsing
+ debian/patches/CVE-2016-2123.patch: check lengths in
librpc/ndr/ndr_dnsp.c.
+ CVE-2016-2123
[ Fixed in Debian ]
- SECURITY UPDATE: unconditional privilege delegation to Kerberos servers
+ debian/patches/CVE-2016-2125.patch: don't use GSS_C_DELEG_FLAG in
source4/scripting/bin/nsupdate-gss, source3/librpc/crypto/gse.c,
source4/auth/gensec/gensec_gssapi.c.
+ CVE-2016-2125
[ Fixed in Debian ]
- SECURITY UPDATE: privilege elevation in Kerberos PAC validation
+ debian/patches/CVE-2016-2126.patch: only allow known checksum types
in auth/kerberos/kerberos_pac.c.
+ CVE-2016-2126
[ Fixed in Debian ]
-- Nishanth Aravamudan <email address hidden> Thu, 26 Jan 2017 17:20:15 -0800
-
samba (2:4.4.5+dfsg-2ubuntu7) zesty; urgency=medium
* SECURITY UPDATE: remote code execution via heap overflow in NDR parsing
- debian/patches/CVE-2016-2123.patch: check lengths in
librpc/ndr/ndr_dnsp.c.
- CVE-2016-2123
* SECURITY UPDATE: unconditional privilege delegation to Kerberos servers
- debian/patches/CVE-2016-2125.patch: don't use GSS_C_DELEG_FLAG in
source4/scripting/bin/nsupdate-gss, source3/librpc/crypto/gse.c,
source4/auth/gensec/gensec_gssapi.c.
- CVE-2016-2125
* SECURITY UPDATE: privilege elevation in Kerberos PAC validation
- debian/patches/CVE-2016-2126.patch: only allow known checksum types
in auth/kerberos/kerberos_pac.c.
- CVE-2016-2126
-- Marc Deslauriers <email address hidden> Fri, 20 Jan 2017 12:32:25 -0500
-
samba (2:4.4.5+dfsg-2ubuntu6) zesty; urgency=high
* d/p/fix-1584485.patch: Make libnss-winbind and libpam-winbind
to be statically linked fixes LP: #1584485.
* d/rules: Compile winbindd/winbindd statically.
-- Jorge Niedbalski <email address hidden> Wed, 02 Nov 2016 13:59:10 +0100
-
samba (2:4.4.5+dfsg-2ubuntu5) yakkety; urgency=medium
* No-change rebuild for readline soname change.
-- Matthias Klose <email address hidden> Sun, 18 Sep 2016 10:26:52 +0000