Fedora Linux 8816 Published by

A samba security update has been released for Fedora 34.



SECURITY: Fedora 34 Update: samba-4.14.10-2.fc34


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-1d77047c61
2021-12-01 01:12:49.872644
--------------------------------------------------------------------------------

Name : samba
Product : Fedora 34
Version : 4.14.10
Release : 2.fc34
URL :   https://www.samba.org
Summary : Server and Client software to interoperate with Windows machines
Description :
Samba is the standard Windows interoperability suite of programs for Linux and
Unix.

--------------------------------------------------------------------------------
Update Information:

Update to latest samba and libldb release (addressing various CVEs) and rebuild
freeipa
--------------------------------------------------------------------------------
ChangeLog:

* Sat Nov 13 2021 Guenther Deschner - 4.14.10-2
- Fix IPA DC schannel support
* Thu Nov 11 2021 Guenther Deschner - 4.14.10-1
- Fix winbind trusted domain regression
- related: #2021716
* Tue Nov 9 2021 Guenther Deschner - 4.14.10-0
- Update to Samba 4.14.10
- resolves: #2019660, #2021711 - Security fixes for CVE-2016-2124
- resolves: #2019672, #2021716 - Security fixes for CVE-2020-25717
- resolves: #2019726, #2021718 - Security fixes for CVE-2020-25718
- resolves: #2019732, #2021719 - Security fixes for CVE-2020-25719
- resolves: #2021728, #2021729 - Security fixes for CVE-2020-25721
- resolves: #2019764, #2021721 - Security fixes for CVE-2020-25722
- resolves: #2021726, #2021727 - Security fixes for CVE-2021-3738
- resolves: #2019666, #2021715 - Security fixes for CVE-2021-23192
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2019660 - CVE-2016-2124 samba: SMB1 client connections can be downgraded to plaintext authentication
  https://bugzilla.redhat.com/show_bug.cgi?id=2019660
[ 2 ] Bug #2019666 - CVE-2021-23192 samba: Subsequent DCE/RPC fragment injection vulnerability
  https://bugzilla.redhat.com/show_bug.cgi?id=2019666
[ 3 ] Bug #2019672 - CVE-2020-25717 samba: A user in an AD Domain could become root on domain members
  https://bugzilla.redhat.com/show_bug.cgi?id=2019672
[ 4 ] Bug #2019726 - CVE-2020-25718 samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC
  https://bugzilla.redhat.com/show_bug.cgi?id=2019726
[ 5 ] Bug #2019732 - CVE-2020-25719 samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets
  https://bugzilla.redhat.com/show_bug.cgi?id=2019732
[ 6 ] Bug #2019764 - CVE-2020-25722 samba: Samba AD DC did not do sufficient access and conformance checking of data stored
  https://bugzilla.redhat.com/show_bug.cgi?id=2019764
[ 7 ] Bug #2021726 - CVE-2021-3738 samba: Use after free in Samba AD DC RPC server
  https://bugzilla.redhat.com/show_bug.cgi?id=2021726
[ 8 ] Bug #2021728 - CVE-2020-25721 samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid)
  https://bugzilla.redhat.com/show_bug.cgi?id=2021728
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-1d77047c61' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________