diff options
Diffstat (limited to 'WHATSNEW.txt')
-rw-r--r-- | WHATSNEW.txt | 377 |
1 files changed, 375 insertions, 2 deletions
diff --git a/WHATSNEW.txt b/WHATSNEW.txt index fae7ac01244..382676dbf22 100644 --- a/WHATSNEW.txt +++ b/WHATSNEW.txt @@ -1,4 +1,377 @@ =============================== + Release Notes for Samba 4.10.18 + September 18, 2020 + =============================== + + +This is a security release in order to address the following defect: + +o CVE-2020-1472: Unauthenticated domain takeover via netlogon ("ZeroLogon"). + +The following applies to Samba used as domain controller only (most +seriously the Active Directory DC, but also the classic/NT4-style DC). + +Installations running Samba as a file server only are not directly +affected by this flaw, though they may need configuration changes to +continue to talk to domain controllers (see "file servers and domain +members" below). + +The netlogon protocol contains a flaw that allows an authentication +bypass. This was reported and patched by Microsoft as CVE-2020-1472. +Since the bug is a protocol level flaw, and Samba implements the +protocol, Samba is also vulnerable. + +However, since version 4.8 (released in March 2018), the default +behaviour of Samba has been to insist on a secure netlogon channel, +which is a sufficient fix against the known exploits. This default is +equivalent to having 'server schannel = yes' in the smb.conf. + +Therefore versions 4.8 and above are not vulnerable unless they have +the smb.conf lines 'server schannel = no' or 'server schannel = auto'. + +Samba versions 4.7 and below are vulnerable unless they have 'server +schannel = yes' in the smb.conf. + +Note each domain controller needs the correct settings in its smb.conf. + +Vendors supporting Samba 4.7 and below are advised to patch their +installations and packages to add this line to the [global] section if +their smb.conf file. + +The 'server schannel = yes' smb.conf line is equivalent to Microsoft's +'FullSecureChannelProtection=1' registry key, the introduction of +which we understand forms the core of Microsoft's fix. + +Some domains employ third-party software that will not work with a +'server schannel = yes'. For these cases patches are available that +allow specific machines to use insecure netlogon. For example, the +following smb.conf: + + server schannel = yes + server require schannel:triceratops$ = no + server require schannel:greywacke$ = no + +will allow only "triceratops$" and "greywacke$" to avoid schannel. + +More details can be found here: +https://www.samba.org/samba/security/CVE-2020-1472.html + + +Changes since 4.10.17 +--------------------- + +o Jeremy Allison <jra@samba.org> + * BUG 14497: CVE-2020-1472(ZeroLogon): s3:rpc_server/netlogon: Protect + netr_ServerPasswordSet2 against unencrypted passwords. + +o Günther Deschner <gd@samba.org> + * BUG 14497: CVE-2020-1472(ZeroLogon): s3:rpc_server/netlogon: Support + "server require schannel:WORKSTATION$ = no" about unsecure configurations. + +o Bjoern Jacke <bjacke@samba.org> + * BUG 14422: util: Fix build on AIX by fixing the order of replace.h include. + +o Gary Lockyer <gary@catalyst.net.nz> + * BUG 14497: CVE-2020-1472(ZeroLogon): s4 torture rpc: repeated bytes in + client challenge. + +o Stefan Metzmacher <metze@samba.org> + * BUG 14497: CVE-2020-1472(ZeroLogon): libcli/auth: Reject weak client + challenges in netlogon_creds_server_init() + "server require schannel:WORKSTATION$ = no" + +o Martin Schwenke <martin@meltin.net> + * BUG 14415: Fix build on FreeBSD. + + +####################################### +Reporting bugs & Development Discussion +####################################### + +Please discuss this release on the samba-technical mailing list or by +joining the #samba-technical IRC channel on irc.freenode.net. + +If you do report problems then please try to send high quality +feedback. If you don't provide vital information to help us track down +the problem then you will probably be ignored. All bug reports should +be filed under the "Samba 4.1 and newer" product in the project's Bugzilla +database (https://bugzilla.samba.org/). + + +====================================================================== +== Our Code, Our Bugs, Our Responsibility. +== The Samba Team +====================================================================== + + +Release notes for older releases follow: +---------------------------------------- + + =============================== + Release Notes for Samba 4.10.17 + July 02, 2020 + =============================== + + +This is a security release in order to address the following defects: + +o CVE-2020-10730: NULL pointer de-reference and use-after-free in Samba AD DC + LDAP Server with ASQ, VLV and paged_results. +o CVE-2020-10745: Parsing and packing of NBT and DNS packets can consume + excessive CPU +o CVE-2020-10760: LDAP Use-after-free in Samba AD DC Global Catalog with + paged_results and VLV. +o CVE-2020-14303: Empty UDP packet DoS in Samba AD DC nbtd. + + +======= +Details +======= + +o CVE-2020-10730: + A client combining the 'ASQ' and 'VLV' LDAP controls can cause a NULL pointer + de-reference and further combinations with the LDAP paged_results feature can + give a use-after-free in Samba's AD DC LDAP server. + +o CVE-2020-10745: Parsing and packing of NBT and DNS packets can consume + excessive CPU. + +o CVE-2020-10760: + The use of the paged_results or VLV controls against the Global Catalog LDAP + server on the AD DC will cause a use-after-free. + +o CVE-2020-14303: + The AD DC NBT server in Samba 4.0 will enter a CPU spin and not process + further requests once it receives an empty (zero-length) UDP packet to + port 137. + +For more details, please refer to the security advisories. + + +Changes since 4.10.16 +--------------------- + +o Douglas Bagnall <douglas.bagnall@catalyst.net.nz> + * BUG 14378: CVE-2020-10745: Invalid DNS or NBT queries containing dots use + several seconds of CPU each. + +o Andrew Bartlett <abartlet@samba.org> + * BUG 14364: CVE-2020-10730: NULL de-reference in AD DC LDAP server when ASQ + and VLV combined. + * BUG 14402: CVE-2020-10760: Fix use-after-free in AD DC Global Catalog LDAP + server with paged_result or VLV. + * BUG 14417: CVE-2020-14303: Fix endless loop from empty UDP packet sent to + AD DC nbt_server. + +o Gary Lockyer <gary@catalyst.net.nz> + * BUG 14364: CVE-2020-10730: NULL de-reference in AD DC LDAP server when ASQ + and VLV combined, ldb: Bump version to 1.5.8. + + +####################################### +Reporting bugs & Development Discussion +####################################### + +Please discuss this release on the samba-technical mailing list or by +joining the #samba-technical IRC channel on irc.freenode.net. + +If you do report problems then please try to send high quality +feedback. If you don't provide vital information to help us track down +the problem then you will probably be ignored. All bug reports should +be filed under the "Samba 4.1 and newer" product in the project's Bugzilla +database (https://bugzilla.samba.org/). + + +====================================================================== +== Our Code, Our Bugs, Our Responsibility. +== The Samba Team +====================================================================== + + +---------------------------------------------------------------------- + + + =============================== + Release Notes for Samba 4.10.16 + May 25, 2020 + =============================== + + +This is the last stable release of the Samba 4.10 release series. + + +Changes since 4.10.15 +--------------------- + +o Jeremy Allison <jra@samba.org> + * s3: lib: Paranoia around use of snprintf copying into a fixed-size buffer + from a getenv() pointer. + +o Amit Kumar <amitkuma@redhat.com> + * BUG 14345: lib:util: Fix smbclient -l basename dir. + +o Volker Lendecke <vl@samba.org> + * BUG 14366: Malicous SMB1 server can crash libsmbclient. + +o Andreas Schneider <asn@samba.org> + * BUG 14336: s3:libads: Fix ads_get_upn(). + * BUG 14358: docs-xml: Fix usernames in pam_winbind manpages. + * BUG 14370: Client tools are not able to read gencache anymore since 4.10. + + +####################################### +Reporting bugs & Development Discussion +####################################### + +Please discuss this release on the samba-technical mailing list or by +joining the #samba-technical IRC channel on irc.freenode.net. + +If you do report problems then please try to send high quality +feedback. If you don't provide vital information to help us track down +the problem then you will probably be ignored. All bug reports should +be filed under the "Samba 4.1 and newer" product in the project's Bugzilla +database (https://bugzilla.samba.org/). + + +====================================================================== +== Our Code, Our Bugs, Our Responsibility. +== The Samba Team +====================================================================== + + +---------------------------------------------------------------------- + + + =============================== + Release Notes for Samba 4.10.15 + April 28, 2020 + =============================== + + +This is a security release in order to address the following defects: + +o CVE-2020-10700: Use-after-free in Samba AD DC LDAP Server with ASQ +o CVE-2020-10704: LDAP Denial of Service (stack overflow) in Samba AD DC + + +======= +Details +======= + +o CVE-2020-10700: + A client combining the 'ASQ' and 'Paged Results' LDAP controls can cause a + use-after-free in Samba's AD DC LDAP server. +o CVE-2020-10704: + A deeply nested filter in an un-authenticated LDAP search can exhaust the + LDAP server's stack memory causing a SIGSEGV. + +For more details, please refer to the security advisories. + + +Changes since 4.10.14 +--------------------- + +o Andrew Bartlett <abartlet@samba.org> + * BUG 14331: CVE-2020-10700: Fix use-after-free in AD DC LDAP server when + ASQ and paged_results combined. + +o Gary Lockyer <gary@catalyst.net.nz> + * BUG 20454: CVE-2020-10704: Fix LDAP Denial of Service (stack overflow) in + Samba AD DC. + + +####################################### +Reporting bugs & Development Discussion +####################################### + +Please discuss this release on the samba-technical mailing list or by +joining the #samba-technical IRC channel on irc.freenode.net. + +If you do report problems then please try to send high quality +feedback. If you don't provide vital information to help us track down +the problem then you will probably be ignored. All bug reports should +be filed under the "Samba 4.1 and newer" product in the project's Bugzilla +database (https://bugzilla.samba.org/). + + +====================================================================== +== Our Code, Our Bugs, Our Responsibility. +== The Samba Team +====================================================================== + + +---------------------------------------------------------------------- + + + =============================== + Release Notes for Samba 4.10.14 + March 26, 2020 + =============================== + + +This is the last bugfix release of the Samba 4.10 release series. There will be +security releases only beyond this point. + + +Changes since 4.10.13 +--------------------- + +o Jeremy Allison <jra@samba.org> + * BUG 14239: s3: lib: nmblib. Clean up and harden nmb packet processing. + * BUG 14283: s3: VFS: full_audit. Use system session_info if called from a + temporary share definition. + +o Douglas Bagnall <douglas.bagnall@catalyst.net.nz> + * BUG 20193: nmblib: Avoid undefined behaviour in handle_name_ptrs(). + +o Andrew Bartlett <abartlet@samba.org> + * BUG 14258: dsdb: Correctly handle memory in objectclass_attrs. + +o Volker Lendecke <vl@samba.org> + * BUG 14247: auth: Fix CID 1458418 Null pointer dereferences (REVERSE_INULL), + auth: Fix CID 1458420 Null pointer dereferences (REVERSE_INULL). + +o Stefan Metzmacher <metze@samba.org> + * BUG 14247: winbind member (source3) fails local SAM auth with empty domain + name. + * BUG 14265: winbindd: Handling missing idmap in getgrgid(). + +o Andreas Schneider <asn@samba.org> + * BUG 14253: lib:util: Log mkdir error on correct debug levels. + * BUG 14266: wafsamba: Do not use 'rU' as the 'U' is deprecated in + Python 3.9. + +o Martin Schwenke <martin@meltin.net> + * BUG 14274: ctdb-tcp: Make error handling for outbound connection + consistent. + * BUG 14295: Starting ctdb node that was powered off hard before results in + recovery loop. + + +####################################### +Reporting bugs & Development Discussion +####################################### + +Please discuss this release on the samba-technical mailing list or by +joining the #samba-technical IRC channel on irc.freenode.net. + +If you do report problems then please try to send high quality +feedback. If you don't provide vital information to help us track down +the problem then you will probably be ignored. All bug reports should +be filed under the "Samba 4.1 and newer" product in the project's Bugzilla +database (https://bugzilla.samba.org/). + + +====================================================================== +== Our Code, Our Bugs, Our Responsibility. +== The Samba Team +====================================================================== + + +---------------------------------------------------------------------- + + + =============================== Release Notes for Samba 4.10.13 January 23, 2020 =============================== @@ -96,8 +469,8 @@ database (https://bugzilla.samba.org/). ====================================================================== -Release notes for older releases follow: ----------------------------------------- +---------------------------------------------------------------------- + =============================== Release Notes for Samba 4.10.12 |