Jule Anger
2023-Jul-19 14:55 UTC
[Announce] Samba 4.18.5, 4.17.10., 4.16.11 Security Releases are available for Download
Release Announcements --------------------- This are security releases in order to address the following defects: o CVE-2022-2127:? When winbind is used for NTLM authentication, a maliciously ????????????????? crafted request can trigger an out-of-bounds read in winbind ????????????????? and possibly crash it. https://www.samba.org/samba/security/CVE-2022-2127.html o CVE-2023-3347:? SMB2 packet signing is not enforced if an admin configured ????????????????? "server signing = required" or for SMB2 connections to Domain ????????????????? Controllers where SMB2 packet signing is mandatory. https://www.samba.org/samba/security/CVE-2023-3347.html o CVE-2023-34966: An infinite loop bug in Samba's mdssvc RPC service for ????????????????? Spotlight can be triggered by an unauthenticated attacker by ????????????????? issuing a malformed RPC request. https://www.samba.org/samba/security/CVE-2023-34966.html o CVE-2023-34967: Missing type validation in Samba's mdssvc RPC service for ????????????????? Spotlight can be used by an unauthenticated attacker to ????????????????? trigger a process crash in a shared RPC mdssvc worker process. https://www.samba.org/samba/security/CVE-2023-34967.html o CVE-2023-34968: As part of the Spotlight protocol Samba discloses the server- ????????????????? side absolute path of shares and files and directories in ????????????????? search results. https://www.samba.org/samba/security/CVE-2023-34968.html Changes ------- o? Ralph Boehme <slow at samba.org> ?? * BUG 15072: CVE-2022-2127. ?? * BUG 15340: CVE-2023-34966. ?? * BUG 15341: CVE-2023-34967. ?? * BUG 15388: CVE-2023-34968. ?? * BUG 15397: CVE-2023-3347. o? Samuel Cabrero <scabrero at samba.org> ?? * BUG 15072: CVE-2022-2127. o? Volker Lendecke <vl at samba.org> ?? * BUG 15072: CVE-2022-2127. o? Stefan Metzmacher <metze at samba.org> ?? * BUG 15418: Secure channel faulty since Windows 10/11 update 07/2023. ####################################### Reporting bugs & Development Discussion ####################################### Please discuss this release on the samba-technical mailing list or by joining the #samba-technical:matrix.org matrix room, or #samba-technical IRC channel on irc.libera.chat. If you do report problems then please try to send high quality feedback. If you don't provide vital information to help us track down the problem then you will probably be ignored.? All bug reports should be filed under the Samba 4.1 and newer product in the project's Bugzilla database (https://bugzilla.samba.org/). ======================================================================= Our Code, Our Bugs, Our Responsibility. == The Samba Team ===================================================================== ===============Download Details =============== The uncompressed tarballs and patch files have been signed using GnuPG (ID AA99442FB680B620).? The source code can be downloaded from: ??????? https://download.samba.org/pub/samba/stable/ The release notes are available online at: ??????? https://www.samba.org/samba/history/samba-4.18.5.html ??????? https://www.samba.org/samba/history/samba-4.17.10.html https://www.samba.org/samba/history/samba-4.16.11.html Our Code, Our Bugs, Our Responsibility. (https://bugzilla.samba.org/) ??????????????????????? --Enjoy ??????????????????????? The Samba Team
Michael Tokarev
2023-Jul-19 15:51 UTC
[Samba] [Announce] Samba 4.18.5, 4.17.10., 4.16.11 Security Releases are available for Download
19.07.2023 17:55, Jule Anger via samba weote:> Release Announcements > --------------------- > > This are security releases in order to address the following defects: > > o CVE-2022-2127:? When winbind is used for NTLM authentication, a maliciously > ????????????????? crafted request can trigger an out-of-bounds read in winbind > ????????????????? and possibly crash it. > https://www.samba.org/samba/security/CVE-2022-2127.html > > o CVE-2023-3347:? SMB2 packet signing is not enforced if an admin configured > ????????????????? "server signing = required" or for SMB2 connections to Domain > ????????????????? Controllers where SMB2 packet signing is mandatory. > https://www.samba.org/samba/security/CVE-2023-3347.html > > o CVE-2023-34966: An infinite loop bug in Samba's mdssvc RPC service for > ????????????????? Spotlight can be triggered by an unauthenticated attacker by > ????????????????? issuing a malformed RPC request. > https://www.samba.org/samba/security/CVE-2023-34966.html > > o CVE-2023-34967: Missing type validation in Samba's mdssvc RPC service for > ????????????????? Spotlight can be used by an unauthenticated attacker to > ????????????????? trigger a process crash in a shared RPC mdssvc worker process. > https://www.samba.org/samba/security/CVE-2023-34967.html > > o CVE-2023-34968: As part of the Spotlight protocol Samba discloses the server- > ????????????????? side absolute path of shares and files and directories in > ????????????????? search results. > https://www.samba.org/samba/security/CVE-2023-34968.html > > > Changes > ------- > > o? Ralph Boehme <slow at samba.org> > ?? * BUG 15072: CVE-2022-2127. > ?? * BUG 15340: CVE-2023-34966. > ?? * BUG 15341: CVE-2023-34967. > ?? * BUG 15388: CVE-2023-34968. > ?? * BUG 15397: CVE-2023-3347. > > o? Samuel Cabrero <scabrero at samba.org> > ?? * BUG 15072: CVE-2022-2127. > > o? Volker Lendecke <vl at samba.org> > ?? * BUG 15072: CVE-2022-2127. > > o? Stefan Metzmacher <metze at samba.org> > ?? * BUG 15418: Secure channel faulty since Windows 10/11 update 07/2023.Thank you for the good work! Updated binary packages for samba 4.18.5, 4.17.10 and 4.16.11 for actual Debian and Ubuntu releases are available in my apt repository at http://www.corpit.ru/mjt/packages/samba/ as usual. Thanks, /mjt