pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/net/samba4 net/samba4: update to 4.13.16
details: https://anonhg.NetBSD.org/pkgsrc/rev/a4b105f606ed
branches: trunk
changeset: 371459:a4b105f606ed
user: taca <taca%pkgsrc.org@localhost>
date: Mon Jan 10 14:11:16 2022 +0000
description:
net/samba4: update to 4.13.16
===============================
Release Notes for Samba 4.13.16
January 10, 2022
===============================
This is a security release in order to address the following defects:
o CVE-2021-43566: mkdir race condition allows share escape in Samba 4.x.
https://www.samba.org/samba/security/CVE-2021-43566.html
=======
Details
=======
o CVE-2021-43566:
All versions of Samba prior to 4.13.16 are vulnerable to a malicious
client using an SMB1 or NFS symlink race to allow a directory to be
created in an area of the server file system not exported under the
share definition. Note that SMB1 has to be enabled, or the share
also available via NFS in order for this attack to succeed.
Clients that have write access to the exported part of the file system
under a share via SMB1 unix extensions or NFS can create symlinks that
can race the server by renaming an existing path and then replacing it
with a symlink. If the client wins the race it can cause the server to
create a directory under the new symlink target after the exported
share path check has been done. This new symlink target can point to
anywhere on the server file system. The authenticated user must have
permissions to create a directory under the target directory of the
symlink.
This is a difficult race to win, but theoretically possible. Note that
the proof of concept code supplied wins the race only when the server
is slowed down and put under heavy load. Exploitation of this bug has
not been seen in the wild.
Changes since 4.13.15
---------------------
o Jeremy Allison <jra%samba.org@localhost>
* BUG 13979: CVE-2021-43566: mkdir race condition allows share escape in Samba 4.x
diffstat:
net/samba4/Makefile | 4 ++--
net/samba4/distinfo | 8 ++++----
2 files changed, 6 insertions(+), 6 deletions(-)
diffs (34 lines):
diff -r 07bd177b6510 -r a4b105f606ed net/samba4/Makefile
--- a/net/samba4/Makefile Mon Jan 10 11:56:12 2022 +0000
+++ b/net/samba4/Makefile Mon Jan 10 14:11:16 2022 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.134 2021/12/25 03:36:01 taca Exp $
+# $NetBSD: Makefile,v 1.135 2022/01/10 14:11:16 taca Exp $
# WARNING: DO NOT UPDATE WITHOUT RESOLVING THIS ISSUE:
#
@@ -7,7 +7,7 @@
#
# Please do not update without testing on NetBSD 9.2!
#
-DISTNAME= samba-4.13.15
+DISTNAME= samba-4.13.16
CATEGORIES= net
MASTER_SITES= https://download.samba.org/pub/samba/stable/
diff -r 07bd177b6510 -r a4b105f606ed net/samba4/distinfo
--- a/net/samba4/distinfo Mon Jan 10 11:56:12 2022 +0000
+++ b/net/samba4/distinfo Mon Jan 10 14:11:16 2022 +0000
@@ -1,8 +1,8 @@
-$NetBSD: distinfo,v 1.70 2021/12/25 03:36:01 taca Exp $
+$NetBSD: distinfo,v 1.71 2022/01/10 14:11:16 taca Exp $
-BLAKE2s (samba-4.13.15.tar.gz) = a77479237477a75e1400517ba431beb8417d12f2dfab0037ae956f7682fd54a4
-SHA512 (samba-4.13.15.tar.gz) = dc059650831d6f473d510502a92a8122bba9079f2204cecf375873a160b1d8e60434a8aa01ff479d4e1b7d34b0058b1468a7c8600782c4dbddb16717181acad8
-Size (samba-4.13.15.tar.gz) = 18944873 bytes
+BLAKE2s (samba-4.13.16.tar.gz) = c8f818d4334e46db117b152a953f6820868999eca1db5766b60645225fcdf04e
+SHA512 (samba-4.13.16.tar.gz) = 8645248327dbc1329db37f649f7514be02cc75dd6531b599a7dd51714699a6a804313135935ecf1567b5ec58910458819d1f0e1849d1e4cddf4bf9713725ffe3
+Size (samba-4.13.16.tar.gz) = 18943308 bytes
SHA1 (patch-buildtools_wafsamba_samba__conftests.py) = d927db17124d2bb5b382885e70a41f84c3929926
SHA1 (patch-buildtools_wafsamba_samba__install.py) = d801340617da325e3bb70a90350e45cc8e383c2d
SHA1 (patch-buildtools_wafsamba_samba__pidl.py) = e4c0ed3dacfcf5613a5b397b3c6cf88509497da7
Home |
Main Index |
Thread Index |
Old Index