[SCM] Samba Website Repository - branch master updated

Jule Anger janger at samba.org
Tue Oct 10 15:38:51 UTC 2023


The branch, master has been updated
       via  385462c add missing release notes
      from  8c8039a NEWS[4.19.1]: Samba 4.19.1, 4.18.8 and 4.17.12 Security Releases are available for Download

https://git.samba.org/?p=samba-web.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit 385462c9a7bebf1e8a3cd9e0ded74fdb9205c777
Author: Jule Anger <janger at samba.org>
Date:   Tue Oct 10 17:26:51 2023 +0200

    add missing release notes
    
    Signed-off-by: Jule Anger <janger at samba.org>

-----------------------------------------------------------------------

Summary of changes:
 history/samba-4.17.12.html | 83 ++++++++++++++++++++++++++++++++++++++++++++++
 history/samba-4.18.8.html  | 77 ++++++++++++++++++++++++++++++++++++++++++
 history/samba-4.19.1.html  | 71 +++++++++++++++++++++++++++++++++++++++
 3 files changed, 231 insertions(+)
 create mode 100644 history/samba-4.17.12.html
 create mode 100644 history/samba-4.18.8.html
 create mode 100644 history/samba-4.19.1.html


Changeset truncated at 500 lines:

diff --git a/history/samba-4.17.12.html b/history/samba-4.17.12.html
new file mode 100644
index 0000000..9290251
--- /dev/null
+++ b/history/samba-4.17.12.html
@@ -0,0 +1,83 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+<head>
+<title>Samba 4.17.12 - Release Notes</title>
+</head>
+<body>
+<H2>Samba 4.17.12 Available for Download</H2>
+<p>
+<a href="https://download.samba.org/pub/samba/stable/samba-4.17.12.tar.gz">Samba 4.17.12 (gzipped)</a><br>
+<a href="https://download.samba.org/pub/samba/stable/samba-4.17.12.tar.asc">Signature</a>
+</p>
+<p>
+<a href="https://download.samba.org/pub/samba/patches/samba-4.17.11-4.17.12.diffs.gz">Patch (gzipped) against Samba 4.17.11</a><br>
+<a href="https://download.samba.org/pub/samba/patches/samba-4.17.11-4.17.12.diffs.asc">Signature</a>
+</p>
+<p>
+<pre>
+                   ===============================
+                   Release Notes for Samba 4.17.12
+                          October 10, 2023
+                   ===============================
+
+
+This is a security release in order to address the following defects:
+
+
+o CVE-2023-3961:  Unsanitized pipe names allow SMB clients to connect as root to
+                  existing unix domain sockets on the file system.
+                  https://www.samba.org/samba/security/CVE-2023-3961.html
+
+o CVE-2023-4091:  SMB client can truncate files to 0 bytes by opening files with
+                  OVERWRITE disposition when using the acl_xattr Samba VFS
+                  module with the smb.conf setting
+                  "acl_xattr:ignore system acls = yes"
+                  https://www.samba.org/samba/security/CVE-2023-4091.html
+
+o CVE-2023-4154:  An RODC and a user with the GET_CHANGES right can view all
+                  attributes, including secrets and passwords.  Additionally,
+                  the access check fails open on error conditions.
+                  https://www.samba.org/samba/security/CVE-2023-4154.html
+
+o CVE-2023-42669: Calls to the rpcecho server on the AD DC can request that the
+                  server block for a user-defined amount of time, denying
+                  service.
+                  https://www.samba.org/samba/security/CVE-2023-42669.html
+
+o CVE-2023-42670: Samba can be made to start multiple incompatible RPC
+                  listeners, disrupting service on the AD DC.
+                  https://www.samba.org/samba/security/CVE-2023-42670.html
+
+
+Changes since 4.17.11
+---------------------
+
+o  Jeremy Allison <jra at samba.org>
+   * BUG 15422: CVE-2023-3961.
+
+o  Andrew Bartlett <abartlet at samba.org>
+   * BUG 15424: CVE-2023-4154.
+   * BUG 15473: CVE-2023-42670.
+   * BUG 15474: CVE-2023-42669.
+
+o  Ralph Boehme <slow at samba.org>
+   * BUG 15439: CVE-2023-4091.
+
+o  Christian Merten <christian at merten.dev>
+   * BUG 15424: CVE-2023-4154.
+
+o  Stefan Metzmacher <metze at samba.org>
+   * BUG 15424: CVE-2023-4154.
+
+o  Andreas Schneider <asn at samba.org>
+   * BUG 15424: CVE-2023-4154.
+
+o  Joseph Sutton <josephsutton at catalyst.net.nz>
+   * BUG 15424: CVE-2023-4154.
+
+
+</pre>
+</p>
+</body>
+</html>
diff --git a/history/samba-4.18.8.html b/history/samba-4.18.8.html
new file mode 100644
index 0000000..bc6d4ee
--- /dev/null
+++ b/history/samba-4.18.8.html
@@ -0,0 +1,77 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+<head>
+<title>Samba 4.18.8 - Release Notes</title>
+</head>
+<body>
+<H2>Samba 4.18.8 Available for Download</H2>
+<p>
+<a href="https://download.samba.org/pub/samba/stable/samba-4.18.8.tar.gz">Samba 4.18.8 (gzipped)</a><br>
+<a href="https://download.samba.org/pub/samba/stable/samba-4.18.8.tar.asc">Signature</a>
+</p>
+<p>
+<a href="https://download.samba.org/pub/samba/patches/samba-4.18.7-4.18.8.diffs.gz">Patch (gzipped) against Samba 4.18.7</a><br>
+<a href="https://download.samba.org/pub/samba/patches/samba-4.18.7-4.18.8.diffs.asc">Signature</a>
+</p>
+<p>
+<pre>
+                   ==============================
+                   Release Notes for Samba 4.18.8
+                          October 10, 2023
+                   ==============================
+
+
+This is a security release in order to address the following defects:
+
+
+o CVE-2023-3961:  Unsanitized pipe names allow SMB clients to connect as root to
+                  existing unix domain sockets on the file system.
+                  https://www.samba.org/samba/security/CVE-2023-3961.html
+
+o CVE-2023-4091:  SMB client can truncate files to 0 bytes by opening files with
+                  OVERWRITE disposition when using the acl_xattr Samba VFS
+                  module with the smb.conf setting
+                  "acl_xattr:ignore system acls = yes"
+                  https://www.samba.org/samba/security/CVE-2023-4091.html
+
+o CVE-2023-4154:  An RODC and a user with the GET_CHANGES right can view all
+                  attributes, including secrets and passwords.  Additionally,
+                  the access check fails open on error conditions.
+                  https://www.samba.org/samba/security/CVE-2023-4154.html
+
+o CVE-2023-42669: Calls to the rpcecho server on the AD DC can request that the
+                  server block for a user-defined amount of time, denying
+                  service.
+                  https://www.samba.org/samba/security/CVE-2023-42669.html
+
+o CVE-2023-42670: Samba can be made to start multiple incompatible RPC
+                  listeners, disrupting service on the AD DC.
+                  https://www.samba.org/samba/security/CVE-2023-42670.html
+
+
+Changes since 4.18.7
+--------------------
+
+o  Jeremy Allison <jra at samba.org>
+   * BUG 15422: CVE-2023-3961.
+
+o  Andrew Bartlett <abartlet at samba.org>
+   * BUG 15424: CVE-2023-4154.
+   * BUG 15473: CVE-2023-42670.
+   * BUG 15474: CVE-2023-42669.
+
+o  Ralph Boehme <slow at samba.org>
+   * BUG 15439: CVE-2023-4091.
+
+o  Stefan Metzmacher <metze at samba.org>
+   * BUG 15424: CVE-2023-4154.
+
+o  Joseph Sutton <josephsutton at catalyst.net.nz>
+   * BUG 15424: CVE-2023-4154.
+
+
+</pre>
+</p>
+</body>
+</html>
diff --git a/history/samba-4.19.1.html b/history/samba-4.19.1.html
new file mode 100644
index 0000000..68ce3ed
--- /dev/null
+++ b/history/samba-4.19.1.html
@@ -0,0 +1,71 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+<head>
+<title>Samba 4.19.1 - Release Notes</title>
+</head>
+<body>
+<H2>Samba 4.19.1 Available for Download</H2>
+<p>
+<a href="https://download.samba.org/pub/samba/stable/samba-4.19.1.tar.gz">Samba 4.19.1 (gzipped)</a><br>
+<a href="https://download.samba.org/pub/samba/stable/samba-4.19.1.tar.asc">Signature</a>
+</p>
+<p>
+<a href="https://download.samba.org/pub/samba/patches/samba-4.19.0-4.19.1.diffs.gz">Patch (gzipped) against Samba 4.19.0</a><br>
+<a href="https://download.samba.org/pub/samba/patches/samba-4.19.0-4.19.1.diffs.asc">Signature</a>
+</p>
+<p>
+<pre>
+                   ==============================
+                   Release Notes for Samba 4.19.1
+                          October 10, 2023
+                   ==============================
+
+
+This is a security release in order to address the following defects:
+
+
+o CVE-2023-3961:  Unsanitized pipe names allow SMB clients to connect as root to
+                  existing unix domain sockets on the file system.
+                  https://www.samba.org/samba/security/CVE-2023-3961.html
+
+o CVE-2023-4091:  SMB client can truncate files to 0 bytes by opening files with
+                  OVERWRITE disposition when using the acl_xattr Samba VFS
+                  module with the smb.conf setting
+                  "acl_xattr:ignore system acls = yes"
+                  https://www.samba.org/samba/security/CVE-2023-4091.html
+
+o CVE-2023-4154:  An RODC and a user with the GET_CHANGES right can view all
+                  attributes, including secrets and passwords.  Additionally,
+                  the access check fails open on error conditions.
+                  https://www.samba.org/samba/security/CVE-2023-4154.html
+
+o CVE-2023-42669: Calls to the rpcecho server on the AD DC can request that the
+                  server block for a user-defined amount of time, denying
+                  service.
+                  https://www.samba.org/samba/security/CVE-2023-42669.html
+
+o CVE-2023-42670: Samba can be made to start multiple incompatible RPC
+                  listeners, disrupting service on the AD DC.
+                  https://www.samba.org/samba/security/CVE-2023-42670.html
+
+
+Changes since 4.19.0
+--------------------
+
+o  Jeremy Allison <jra at samba.org>
+   * BUG 15422: CVE-2023-3961.
+
+o  Andrew Bartlett <abartlet at samba.org>
+   * BUG 15424: CVE-2023-4154.
+   * BUG 15473: CVE-2023-42670.
+   * BUG 15474: CVE-2023-42669.
+
+o  Ralph Boehme <slow at samba.org>
+   * BUG 15439: CVE-2023-4091.
+
+
+</pre>
+</p>
+</body>
+</html>


-- 
Samba Website Repository



More information about the samba-cvs mailing list