UbuntuUpdates.org

Package "samba"

Name: samba

Description:

SMB/CIFS file, print, and login server for Unix

Latest version: 2:4.13.14+dfsg-0ubuntu0.20.04.2
Release: focal (20.04)
Level: updates
Repository: main
Homepage: http://www.samba.org

Links


Download "samba"


Other versions of "samba" in Focal

Repository Area Version
base main 2:4.11.6+dfsg-0ubuntu1
base universe 2:4.11.6+dfsg-0ubuntu1
security main 2:4.13.14+dfsg-0ubuntu0.20.04.1
security universe 2:4.13.14+dfsg-0ubuntu0.20.04.1
updates universe 2:4.13.14+dfsg-0ubuntu0.20.04.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2:4.11.6+dfsg-0ubuntu1.6 2020-11-02 17:06:29 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.6) focal-security; urgency=medium

  * SECURITY UPDATE: Missing handle permissions check in ChangeNotify
    - debian/patches/CVE-2020-14318-*.patch: ensure change notifies can't
      get set unless the directory handle is open for SEC_DIR_LIST in
      source4/torture/smb2/notify.c, source3/smbd/notify.c.
    - CVE-2020-14318
  * SECURITY UPDATE: Unprivileged user can crash winbind
    - debian/patches/CVE-2020-14323-*.patch: fix invalid lookupsids DoS in
      source3/winbindd/winbindd_lookupsids.c,
      source4/torture/winbind/struct_based.c.
    - CVE-2020-14323
  * SECURITY UPDATE: DNS server crash via invalid records
    - debian/patches/CVE-2020-14383-*.patch: ensure variable initialization
      with NULL and do not crash when additional data not found in
      source4/rpc_server/dnsserver/dcerpc_dnsserver.c.
    - CVE-2020-14383

 -- Marc Deslauriers <email address hidden> Fri, 16 Oct 2020 06:48:54 -0400

Source diff to previous version
CVE-2020-14318 Missing handle permissions check in SMB1/2/3 ChangeNotify
CVE-2020-14323 A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could
CVE-2020-14383 An authenticated user can crash the DCE/RPC DNS with easily crafted records

Version: 2:4.11.6+dfsg-0ubuntu1.5 2020-09-30 15:07:23 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.5) focal-security; urgency=medium

  * SECURITY UPDATE: Unauthenticated domain controller compromise by
    subverting Netlogon cryptography (ZeroLogon)
    - debian/patches/zerologon-*.patch: backport upstream patches:
      + For compatibility reasons, allow specifying an insecure netlogon
        configuration per machine. See the following link for examples:
        https://www.samba.org/samba/security/CVE-2020-1472.html
      + Add additional server checks for the protocol attack in the
        client-specified challenge to provide some protection when
        'server schannel = no/auto' and avoid the false-positive results
        when running the proof-of-concept exploit.
    - CVE-2020-1472

 -- Marc Deslauriers <email address hidden> Fri, 18 Sep 2020 12:33:05 -0400

Source diff to previous version
CVE-2020-1472 An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, u

Version: 2:4.11.6+dfsg-0ubuntu1.4 2020-08-10 16:06:33 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.4) focal-security; urgency=medium

  * SECURITY UPDATE: Empty UDP packet DoS in Samba AD DC nbtd
    - debian/patches/CVE-2020-14303.patch: fix busy loop on empty UDP
      packet in libcli/nbt/nbtsocket.c.
    - CVE-2020-14303

 -- Marc Deslauriers <email address hidden> Fri, 07 Aug 2020 13:31:00 -0400

Source diff to previous version
CVE-2020-14303 A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP

Version: 2:4.11.6+dfsg-0ubuntu1.3 2020-07-02 15:08:03 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.3) focal-security; urgency=medium

  * SECURITY UPDATE: NULL pointer de-reference and use-after-free in Samba
    AD DC LDAP Server with ASQ, VLV and paged_results
    - debian/patches/CVE-2020-10730-*.patch: multiple upstream patches to
      fix the issue.
    - CVE-2020-10730
  * SECURITY UPDATE: Parsing and packing of NBT and DNS packets can consume
    excessive CPU
    - debian/patches/CVE-2020-10745-*.patch: multiple upstream patches to
      fix the issue.
    - CVE-2020-10745
  * SECURITY UPDATE: LDAP Use-after-free in Samba AD DC Global Catalog with
    paged_results and VLV
    - debian/patches/CVE-2020-10760-*.patch: multiple upstream patches to
      fix the issue.
    - CVE-2020-10760

 -- Marc Deslauriers <email address hidden> Fri, 19 Jun 2020 08:34:26 -0400

Source diff to previous version

Version: 2:4.11.6+dfsg-0ubuntu1.2 2020-05-21 09:06:32 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.2) focal; urgency=medium

  * Fix "Shared files are shown as folders" (LP: #1872476)
    - d/p/0023-libsmb-Don-t-try-to-find-posix-stat-info-in-SMBC_get.patch:
      Don't obtain stat(2) information if dealing with older protocols on
      UNIX-like systems.

 -- Sergio Durigan Junior <email address hidden> Thu, 30 Apr 2020 15:17:24 -0400

1872476 Shared files are shown as folders



About   -   Send Feedback to @ubuntu_updates