-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2021-1d77047c61 2021-12-01 01:12:49.872644 --------------------------------------------------------------------------------
Name : samba Product : Fedora 34 Version : 4.14.10 Release : 2.fc34 URL : https://www.samba.org Summary : Server and Client software to interoperate with Windows machines Description : Samba is the standard Windows interoperability suite of programs for Linux and Unix.
-------------------------------------------------------------------------------- Update Information:
Update to latest samba and libldb release (addressing various CVEs) and rebuild freeipa -------------------------------------------------------------------------------- ChangeLog:
* Sat Nov 13 2021 Guenther Deschner gdeschner@redhat.com - 4.14.10-2 - Fix IPA DC schannel support * Thu Nov 11 2021 Guenther Deschner gdeschner@redhat.com - 4.14.10-1 - Fix winbind trusted domain regression - related: #2021716 * Tue Nov 9 2021 Guenther Deschner gdeschner@redhat.com - 4.14.10-0 - Update to Samba 4.14.10 - resolves: #2019660, #2021711 - Security fixes for CVE-2016-2124 - resolves: #2019672, #2021716 - Security fixes for CVE-2020-25717 - resolves: #2019726, #2021718 - Security fixes for CVE-2020-25718 - resolves: #2019732, #2021719 - Security fixes for CVE-2020-25719 - resolves: #2021728, #2021729 - Security fixes for CVE-2020-25721 - resolves: #2019764, #2021721 - Security fixes for CVE-2020-25722 - resolves: #2021726, #2021727 - Security fixes for CVE-2021-3738 - resolves: #2019666, #2021715 - Security fixes for CVE-2021-23192 -------------------------------------------------------------------------------- References:
[ 1 ] Bug #2019660 - CVE-2016-2124 samba: SMB1 client connections can be downgraded to plaintext authentication https://bugzilla.redhat.com/show_bug.cgi?id=2019660 [ 2 ] Bug #2019666 - CVE-2021-23192 samba: Subsequent DCE/RPC fragment injection vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=2019666 [ 3 ] Bug #2019672 - CVE-2020-25717 samba: A user in an AD Domain could become root on domain members https://bugzilla.redhat.com/show_bug.cgi?id=2019672 [ 4 ] Bug #2019726 - CVE-2020-25718 samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC https://bugzilla.redhat.com/show_bug.cgi?id=2019726 [ 5 ] Bug #2019732 - CVE-2020-25719 samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets https://bugzilla.redhat.com/show_bug.cgi?id=2019732 [ 6 ] Bug #2019764 - CVE-2020-25722 samba: Samba AD DC did not do sufficient access and conformance checking of data stored https://bugzilla.redhat.com/show_bug.cgi?id=2019764 [ 7 ] Bug #2021726 - CVE-2021-3738 samba: Use after free in Samba AD DC RPC server https://bugzilla.redhat.com/show_bug.cgi?id=2021726 [ 8 ] Bug #2021728 - CVE-2020-25721 samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid) https://bugzilla.redhat.com/show_bug.cgi?id=2021728 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2021-1d77047c61' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------
package-announce@lists.fedoraproject.org