samba (2:3.6.25-0ubuntu0.12.04.21) precise-security; urgency=medium
[ Marc Deslauriers ]
* SECURITY UPDATE: Empty UDP packet DoS in Samba AD DC nbtd
- debian/patches/CVE-2020-14303.patch: fix busy loop on empty UDP
packet in libcli/nbt/nbtsocket.c.
- CVE-2020-14303
samba (2:3.6.25-0ubuntu0.12.04.20) precise-security; urgency=medium
[ Marc Deslauriers ]
* SECURITY UPDATE: Parsing and packing of NBT and DNS packets can consume
excessive CPU
- debian/patches/CVE-2020-10745-*.patch: multiple upstream patches to
fix the issue.
- CVE-2020-10745
samba (2:3.6.25-0ubuntu0.12.04.19) precise-security; urgency=medium
* SECURITY UPDATE: client code can return filenames containing path
separators
- debian/patches/CVE-2019-10218.patch: protect SMB1 client code
from evil server returned names in source3/libsmb/clilist.c,
source3/libsmb/proto.h.
- CVE-2019-10218
samba (2:3.6.25-0ubuntu0.12.04.18) precise-security; urgency=medium
[ Marc Deslauriers ]
* SECURITY UPDATE: Samba AD DC S4U2Self/S4U2Proxy unkeyed checksum
- debian/patches/CVE-2018-16860.patch: reject PA-S4U2Self with unkeyed
checksum in source4/heimdal/kdc/krb5tgs.c.
- CVE-2018-16860
samba (2:3.6.25-0ubuntu0.12.04.17) precise-security; urgency=medium
* SECURITY UPDATE: save registry file outside share as unprivileged user
- debian/patches/CVE-2019-3880.patch: remove implementations of
SaveKey/RestoreKey in source3/rpc_server/winreg/srv_winreg_nt.c.
- CVE-2019-3880
samba (2:3.6.25-0ubuntu0.12.04.16) precise-security; urgency=medium
* SECURITY UPDATE: Unprivileged adding of CNAME record causing loop in AD
Internal DNS server
- debian/patches/CVE-2018-14629.patch: add CNAME loop prevention using
counter in source4/dns_server/dns_query.c.
- CVE-2018-14629
* SECURITY UPDATE: Double-free in Samba AD DC KDC with PKINIT
- debian/patches/CVE-2018-16841.patch: fix segfault on PKINIT with
mis-matching principal in source4/kdc/db-glue.c.
- CVE-2018-16841
* SECURITY UPDATE: NULL pointer de-reference in Samba AD DC LDAP server
- debian/patches/CVE-2018-16851.patch: check ret before manipulating
blob in source4/ldap_server/ldap_server.c.
- CVE-2018-16851
samba (2:3.6.25-0ubuntu0.12.04.15) precise-security; urgency=medium
[ Marc Deslauriers ]
* SECURITY UPDATE: Denial of Service Attack on external print server
- debian/patches/CVE-2018-1050.patch: protect against null pointer
derefs in source3/rpc_server/spoolss/srv_spoolss_nt.c.
- CVE-2018-1050
samba (2:3.6.25-0ubuntu0.12.04.14) precise-security; urgency=medium
* SECURITY UPDATE: Server heap memory information leak
- debian/patches/CVE-2017-15275.patch: zero out unused grown area in
source3/smbd/srvstr.c.
- CVE-2017-15275
samba (2:3.6.25-0ubuntu0.12.04.13) precise-security; urgency=medium
* SECURITY UPDATE: SMB1/2/3 connections may not require signing where they
should
- debian/patches/CVE-2017-12150.patch: fixing in libgpo/gpo_fetch.c,
source3/lib/util_cmdline.c, source3/libsmb/clidfs.c.
- CVE-2017-12150
* SECURITY UPDATE: Client with write access to a share can cause server
memory contents to be written into a file or printer.
- debian/patches/CVE-2017-12163.patch: prevent client short SMB1 write
from writing server memory to file in source3/smdb/reply.c
- CVE-2017-12163
samba (2:3.6.25-0ubuntu0.12.04.12) precise-security; urgency=medium
* SECURITY UPDATE: avoiding server impersonation and other attacks
through unauthenticated portions of kerberos tickets
- debian/patches/CVE-2017-11103.patch: this patch assures that
the KDC-REP service name is obtained from encrypted version.
- CVE-2017-11103
samba (2:3.6.25-0ubuntu0.12.04.11) precise-security; urgency=medium
* SECURITY UPDATE: remote code execution from a writable share
- debian/patches/CVE-2017-7494.patch: refuse to open pipe names with a
slash inside in source3/rpc_server/srv_pipe.c.
- CVE-2017-7494
Date: 2020-08-10 16:01:13.843588+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
Signed-By: Ubuntu Archive Robot <ubuntu-archive-ro...@lists.canonical.com>
https://launchpad.net/ubuntu/+source/samba/2:3.6.25-0ubuntu0.12.04.21
Sorry, changesfile not available.
--
Precise-changes mailing list
Precise-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/precise-changes