ipfire-3.x/samba
Adolf Belka 91f30fafa1 samba: Update to version 4.19.3
- IPFire-3.x
- Upfate from version 4.19.0 to 4.19.3
- Changelog
    4.19.3
	This is the latest stable release of the Samba 4.19 release series.
	It contains the security-relevant bugfix CVE-2018-14628:
	    Wrong ntSecurityDescriptor values for "CN=Deleted Objects"
	    allow read of object tombstones over LDAP
	    (Administrator action required!)
	    https://www.samba.org/samba/security/CVE-2018-14628.html
	Description of CVE-2018-14628
	All versions of Samba from 4.0.0 onwards are vulnerable to an
	 information leak (compared with the established behaviour of
	 Microsoft's Active Directory) when Samba is an Active Directory Domain
	 Controller.
	When a domain was provisioned with an unpatched Samba version,
	 the ntSecurityDescriptor is simply inherited from Domain/Partition-HEAD-Object
	 instead of being very strict (as on a Windows provisioned domain).
	This means also non privileged users can use the
	 LDAP_SERVER_SHOW_DELETED_OID control in order to view,
	 the names and preserved attributes of deleted objects.
	No information that was hidden before the deletion is visible, but in
	 with the correct ntSecurityDescriptor value in place the whole object
	 is also not visible without administrative rights.
	There is no further vulnerability associated with this error, merely an
	 information disclosure.
	Action required in order to resolve CVE-2018-14628!
	The patched Samba does NOT protect existing domains!
	The administrator needs to run the following command
	(on only one domain controller)
	in order to apply the protection to an existing domain:
	  samba-tool dbcheck --cross-ncs --attrs=nTSecurityDescriptor --fix
	The above requires manual interaction in order to review the
	changes before they are applied. Typicall question look like this:
	  Reset nTSecurityDescriptor on CN=Deleted Objects,DC=samba,DC=org back to provision default?
	        Owner mismatch: SY (in ref) DA(in current)
	        Group mismatch: SY (in ref) DA(in current)
	        Part dacl is different between reference and current here is the detail:
	                (A;;LCRPLORC;;;AU) ACE is not present in the reference
	                (A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY) ACE is not present in the reference
	                (A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;DA) ACE is not present in the reference
	                (A;;CCDCLCSWRPWPSDRCWDWO;;;SY) ACE is not present in the current
	                (A;;LCRP;;;BA) ACE is not present in the current
	   [y/N/all/none] y
	  Fixed attribute 'nTSecurityDescriptor' of 'CN=Deleted Objects,DC=samba,DC=org'
	The change should be confirmed with 'y' for all objects starting with
	'CN=Deleted Objects'.
    4.19.2
	o  Jeremy Allison <jra@samba.org>
	   * BUG 15423: Use-after-free in aio_del_req_from_fsp during smbd shutdown
	     after failed IPC FSCTL_PIPE_TRANSCEIVE.
	   * BUG 15426: clidfs.c do_connect() missing a "return" after a cli_shutdown()
	     call.
	o  Ralph Boehme <slow@samba.org>
	   * BUG 15463: macOS mdfind returns only 50 results.
	o  Volker Lendecke <vl@samba.org>
	   * BUG 15481: GETREALFILENAME_CACHE can modify incoming new filename with
	     previous cache entry value.
	o  Stefan Metzmacher <metze@samba.org>
	   * BUG 15464: libnss_winbind causes memory corruption since samba-4.18,
	     impacts sendmail, zabbix, potentially more.
	o  Martin Schwenke <mschwenke@ddn.com>
	   * BUG 15479: ctdbd: setproctitle not initialized messages flooding logs.
	o  Joseph Sutton <josephsutton@catalyst.net.nz>
	   * BUG 15491: CVE-2023-5568 Heap buffer overflow with freshness tokens in the
	     Heimdal KDC in Samba 4.19
	   * BUG 15477: The heimdal KDC doesn't detect s4u2self correctly when fast is
	     in use.
    4.19.1
	This is a security release in order to address the following defects:
	o CVE-2023-3961:  Unsanitized pipe names allow SMB clients to connect as root to
	                  existing unix domain sockets on the file system.
	                  https://www.samba.org/samba/security/CVE-2023-3961.html
	o CVE-2023-4091:  SMB client can truncate files to 0 bytes by opening files with
	                  OVERWRITE disposition when using the acl_xattr Samba VFS
	                  module with the smb.conf setting
	                  "acl_xattr:ignore system acls = yes"
	                  https://www.samba.org/samba/security/CVE-2023-4091.html
	o CVE-2023-4154:  An RODC and a user with the GET_CHANGES right can view all
	                  attributes, including secrets and passwords.  Additionally,
	                  the access check fails open on error conditions.
	                  https://www.samba.org/samba/security/CVE-2023-4154.html
	o CVE-2023-42669: Calls to the rpcecho server on the AD DC can request that the
                          server block for a user-defined amount of time, denying
	                  service.
	                  https://www.samba.org/samba/security/CVE-2023-42669.html
	o CVE-2023-42670: Samba can be made to start multiple incompatible RPC
	                  listeners, disrupting service on the AD DC.
	                  https://www.samba.org/samba/security/CVE-2023-42670.html

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-11-30 16:52:50 +00:00
..
systemd samba: Remove the pidfiles from systemd file since they are not needed 2012-05-01 15:08:42 +02:00
samba.nm samba: Update to version 4.19.3 2023-11-30 16:52:50 +00:00
samba.pamd samba: Added samba systemd files and a default config. 2012-04-28 14:57:39 +02:00
smb.conf samba: Added samba systemd files and a default config. 2012-04-28 14:57:39 +02:00