[Samba] [Announce] Samba 4.19.3 Available for Download
Ray Klassen
ray.klassen at icloud.com
Mon Nov 27 20:05:19 UTC 2023
On Mon, 2023-11-27 at 13:27 +0100, Jule Anger via samba wrote:
> Release Announcements
> ---------------------
>
> This is the latest stable release of the Samba 4.19 release series.
> It contains the security-relevant bug CVE-2018-14628:
>
> Wrong ntSecurityDescriptor values for "CN=Deleted Objects"
> allow read of object tombstones over LDAP
> (Administrator action required!)
> https://www.samba.org/samba/security/CVE-2018-14628.html
>
>
> Description of CVE-2018-14628
> -----------------------------
>
> All versions of Samba from 4.0.0 onwards are vulnerable to an
> information leak (compared with the established behaviour of
> Microsoft's Active Directory) when Samba is an Active Directory
> Domain
> Controller.
>
> When a domain was provisioned with an unpatched Samba version,
> the ntSecurityDescriptor is simply inherited from
> Domain/Partition-HEAD-Object
> instead of being very strict (as on a Windows provisioned domain).
>
> This means also non privileged users can use the
> LDAP_SERVER_SHOW_DELETED_OID control in order to view,
> the names and preserved attributes of deleted objects.
>
> No information that was hidden before the deletion is visible, but in
> with the correct ntSecurityDescriptor value in place the whole object
> is also not visible without administrative rights.
>
> There is no further vulnerability associated with this error, merely
> an
> information disclosure.
>
> Action required in order to resolve CVE-2018-14628!
> ---------------------------------------------------
>
> The patched Samba does NOT protect existing domains!
>
> The administrator needs to run the following command
> (on only one domain controller)
> in order to apply the protection to an existing domain:
>
> samba-tool dbcheck --cross-ncs --attrs=nTSecurityDescriptor --fix
>
> The above requires manual interaction in order to review the
> changes before they are applied. Typicall question look like this:
>
> Reset nTSecurityDescriptor on CN=Deleted Objects,DC=samba,DC=org
> back
> to provision default?
> Owner mismatch: SY (in ref) DA(in current)
> Group mismatch: SY (in ref) DA(in current)
> Part dacl is different between reference and current here is
> the detail:
> (A;;LCRPLORC;;;AU) ACE is not present in the
> reference
> (A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY) ACE is not
> present
> in the reference
> (A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;DA) ACE is not
> present
> in the reference
> (A;;CCDCLCSWRPWPSDRCWDWO;;;SY) ACE is not present in
> the current
> (A;;LCRP;;;BA) ACE is not present in the current
> [y/N/all/none] y
> Fixed attribute 'nTSecurityDescriptor' of 'CN=Deleted
> Objects,DC=samba,DC=org'
>
> The change should be confirmed with 'y' for all objects starting with
> 'CN=Deleted Objects'.
>
>
> Changes since 4.19.2
> --------------------
>
> o Douglas Bagnall <douglas.bagnall at catalyst.net.nz>
> * BUG 15520: sid_strings test broken by unix epoch > 1700000000.
>
> o Ralph Boehme <slow at samba.org>
> * BUG 15487: smbd crashes if asked to return full information on
> close of a
> stream handle with delete on close disposition set.
> * BUG 15521: smbd: fix close order of base_fsp and stream_fsp in
> smb_fname_fsp_destructor().
>
> o Pavel Filipenský <pfilipensky at samba.org>
> * BUG 15499: Improve logging for failover scenarios.
>
> o Björn Jacke <bj at sernet.de>
> * BUG 15093: Files without "read attributes" NFS4 ACL permission
> are not
> listed in directories.
>
> o Stefan Metzmacher <metze at samba.org>
> * BUG 13595: CVE-2018-14628 [SECURITY] Deleted Object tombstones
> visible in
> AD LDAP to normal users.
> * BUG 15492: Kerberos TGS-REQ with User2User does not work for
> normal
> accounts.
>
> o Christof Schmitt <cs at samba.org>
> * BUG 15507: vfs_gpfs stat calls fail due to file system
> permissions.
>
> o Andreas Schneider <asn at samba.org>
> * BUG 15513: Samba doesn't build with Python 3.12.
>
>
> #######################################
> Reporting bugs & Development Discussion
> #######################################
>
> Please discuss this release on the samba-technical mailing list or by
> joining the #samba-technical:matrix.org matrix room, or
> #samba-technical IRC channel on irc.libera.chat.
>
> If you do report problems then please try to send high quality
> feedback. If you don't provide vital information to help us track
> down
> the problem then you will probably be ignored. All bug reports
> should
> be filed under the Samba 4.1 and newer product in the project's
> Bugzilla
> database (https://bugzilla.samba.org/).
>
>
> =====================================================================
> =
> == Our Code, Our Bugs, Our Responsibility.
> == The Samba Team
> =====================================================================
> =
>
>
>
> ================
> Download Details
> ================
>
> The uncompressed tarballs and patch files have been signed
> using GnuPG (ID AA99442FB680B620). The source code can be downloaded
> from:
>
> https://download.samba.org/pub/samba/stable/
>
> The release notes are available online at:
>
> https://www.samba.org/samba/history/samba-4.19.3.html
>
> Our Code, Our Bugs, Our Responsibility.
> (https://bugzilla.samba.org/)
>
> --Enjoy
> The Samba Team
>
>
Actually the usual
samba-tool dbcheck --cross-ncs --fix --yes
which I run after every upgrade on every DC
per https://wiki.samba.org/index.php/Dbcheck
found and fixed the permissions in question on the first DC and (as it
says above) the error did not reappear on the other one.
Just in case I ran the dbcheck with --attrs=nTSecurityDescriptor again
as posted and it didn't find anything.
FWIW
More information about the samba
mailing list