* Re: [Announce] Samba 4.14.2 (4.14.1), 4.13.7 (4.13.6) and 4.12.14 (4.12.13) Security Releases
[not found] <43f64b58-f715-d78e-9755-07f1fb504718@ipfire.org>
@ 2021-03-25 17:50 ` Michael Tremer
2021-03-26 14:18 ` Adolf Belka
0 siblings, 1 reply; 3+ messages in thread
From: Michael Tremer @ 2021-03-25 17:50 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 3201 bytes --]
Great! Thank you.
> On 25 Mar 2021, at 14:44, Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>
> Hi.
>
> I will pick it up.
>
> Adolf.
>
>
>
> On 25/03/2021 10:41, Michael Tremer wrote:
>> Is anyone up for grabbing this?
>>
>> We should not be affected by these security issues, but I do not see any reasons why we should not update - just in case.
>>
>> -Michael
>>
>>> Begin forwarded message:
>>>
>>> From: Karolin Seeger via samba-announce <samba-announce(a)lists.samba.org>
>>> Subject: [Announce] Samba 4.14.2 (4.14.1), 4.13.7 (4.13.6) and 4.12.14 (4.12.13) Security Releases
>>> Date: 24 March 2021 at 12:02:14 GMT
>>> To: samba-announce(a)lists.samba.org, samba(a)lists.samba.org, samba-technical(a)lists.samba.org
>>> Reply-To: kseeger(a)samba.org
>>>
>>> Release Announcements
>>> ---------------------
>>>
>>> These are security releases in order to address the following defects:
>>>
>>> o CVE-2020-27840: Heap corruption via crafted DN strings.
>>> o CVE-2021-20277: Out of bounds read in AD DC LDAP server.
>>>
>>>
>>> =======
>>> Details
>>> =======
>>>
>>> o CVE-2020-27840:
>>> An anonymous attacker can crash the Samba AD DC LDAP server by sending easily
>>> crafted DNs as part of a bind request. More serious heap corruption is likely
>>> also possible.
>>>
>>> o CVE-2021-20277:
>>> User-controlled LDAP filter strings against the AD DC LDAP server may crash
>>> the LDAP server.
>>>
>>> For more details, please refer to the security advisories.
>>>
>>>
>>> #######################################
>>> Reporting bugs & Development Discussion
>>> #######################################
>>>
>>> Please discuss this release on the samba-technical mailing list or by
>>> joining the #samba-technical IRC channel on irc.freenode.net.
>>>
>>> If you do report problems then please try to send high quality
>>> feedback. If you don't provide vital information to help us track down
>>> the problem then you will probably be ignored. All bug reports should
>>> be filed under the Samba 4.1 and newer product in the project's Bugzilla
>>> database (https://bugzilla.samba.org/).
>>>
>>>
>>> ======================================================================
>>> == Our Code, Our Bugs, Our Responsibility.
>>> == The Samba Team
>>> ======================================================================
>>>
>>>
>>>
>>> ================
>>> Download Details
>>> ================
>>>
>>> The uncompressed tarballs and patch files have been signed
>>> using GnuPG (ID AA99442FB680B620). The source code can be downloaded
>>> from:
>>>
>>> https://download.samba.org/pub/samba/stable/
>>>
>>> The release notes are available online at:
>>>
>>> https://www.samba.org/samba/history/samba-4.14.2.html
>>> https://www.samba.org/samba/history/samba-4.13.7.html
>>> https://www.samba.org/samba/history/samba-4.12.14.html
>>>
>>> Our Code, Our Bugs, Our Responsibility.
>>> (https://bugzilla.samba.org/)
>>>
>>> --Enjoy
>>> The Samba Team
>>
> --
> Sent from my laptop
>
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [Announce] Samba 4.14.2 (4.14.1), 4.13.7 (4.13.6) and 4.12.14 (4.12.13) Security Releases
2021-03-25 17:50 ` [Announce] Samba 4.14.2 (4.14.1), 4.13.7 (4.13.6) and 4.12.14 (4.12.13) Security Releases Michael Tremer
@ 2021-03-26 14:18 ` Adolf Belka
2021-04-01 10:15 ` Michael Tremer
0 siblings, 1 reply; 3+ messages in thread
From: Adolf Belka @ 2021-03-26 14:18 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 4055 bytes --]
Hi Michael,
So the samba built with no problem but there was a change to the rootfile.
I have found that the rootfile is under separate directories for each architecture. I did a diff between the x86_64 and the armv5tel and most of the differences are just the x86_64 replaced by arm but I also found files where the filename itself is different between x86_64 and armv5tel with for instance ...gnu.so.2 replaced by ....gnueabi.so.2
So I can do the patch with the x86_64 rootfile updated as that architecture is what I am using for my builds. I don't know what to do with the others. Are those automatically updated based on mine or do I have to do something to get them updated and if so then what?
Regards,
Adolf.
On 25/03/2021 18:50, Michael Tremer wrote:
> Great! Thank you.
>
>> On 25 Mar 2021, at 14:44, Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>>
>> Hi.
>>
>> I will pick it up.
>>
>> Adolf.
>>
>>
>>
>> On 25/03/2021 10:41, Michael Tremer wrote:
>>> Is anyone up for grabbing this?
>>>
>>> We should not be affected by these security issues, but I do not see any reasons why we should not update - just in case.
>>>
>>> -Michael
>>>
>>>> Begin forwarded message:
>>>>
>>>> From: Karolin Seeger via samba-announce <samba-announce(a)lists.samba.org>
>>>> Subject: [Announce] Samba 4.14.2 (4.14.1), 4.13.7 (4.13.6) and 4.12.14 (4.12.13) Security Releases
>>>> Date: 24 March 2021 at 12:02:14 GMT
>>>> To: samba-announce(a)lists.samba.org, samba(a)lists.samba.org, samba-technical(a)lists.samba.org
>>>> Reply-To: kseeger(a)samba.org
>>>>
>>>> Release Announcements
>>>> ---------------------
>>>>
>>>> These are security releases in order to address the following defects:
>>>>
>>>> o CVE-2020-27840: Heap corruption via crafted DN strings.
>>>> o CVE-2021-20277: Out of bounds read in AD DC LDAP server.
>>>>
>>>>
>>>> =======
>>>> Details
>>>> =======
>>>>
>>>> o CVE-2020-27840:
>>>> An anonymous attacker can crash the Samba AD DC LDAP server by sending easily
>>>> crafted DNs as part of a bind request. More serious heap corruption is likely
>>>> also possible.
>>>>
>>>> o CVE-2021-20277:
>>>> User-controlled LDAP filter strings against the AD DC LDAP server may crash
>>>> the LDAP server.
>>>>
>>>> For more details, please refer to the security advisories.
>>>>
>>>>
>>>> #######################################
>>>> Reporting bugs & Development Discussion
>>>> #######################################
>>>>
>>>> Please discuss this release on the samba-technical mailing list or by
>>>> joining the #samba-technical IRC channel on irc.freenode.net.
>>>>
>>>> If you do report problems then please try to send high quality
>>>> feedback. If you don't provide vital information to help us track down
>>>> the problem then you will probably be ignored. All bug reports should
>>>> be filed under the Samba 4.1 and newer product in the project's Bugzilla
>>>> database (https://bugzilla.samba.org/).
>>>>
>>>>
>>>> ======================================================================
>>>> == Our Code, Our Bugs, Our Responsibility.
>>>> == The Samba Team
>>>> ======================================================================
>>>>
>>>>
>>>>
>>>> ================
>>>> Download Details
>>>> ================
>>>>
>>>> The uncompressed tarballs and patch files have been signed
>>>> using GnuPG (ID AA99442FB680B620). The source code can be downloaded
>>>> from:
>>>>
>>>> https://download.samba.org/pub/samba/stable/
>>>>
>>>> The release notes are available online at:
>>>>
>>>> https://www.samba.org/samba/history/samba-4.14.2.html
>>>> https://www.samba.org/samba/history/samba-4.13.7.html
>>>> https://www.samba.org/samba/history/samba-4.12.14.html
>>>>
>>>> Our Code, Our Bugs, Our Responsibility.
>>>> (https://bugzilla.samba.org/)
>>>>
>>>> --Enjoy
>>>> The Samba Team
>>>
>> --
>> Sent from my laptop
>>
>
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [Announce] Samba 4.14.2 (4.14.1), 4.13.7 (4.13.6) and 4.12.14 (4.12.13) Security Releases
2021-03-26 14:18 ` Adolf Belka
@ 2021-04-01 10:15 ` Michael Tremer
0 siblings, 0 replies; 3+ messages in thread
From: Michael Tremer @ 2021-04-01 10:15 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 4778 bytes --]
Hello,
Sorry for all those late replies… I am working through my inbox going backwards :)
> On 26 Mar 2021, at 14:18, Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>
> Hi Michael,
>
> So the samba built with no problem but there was a change to the rootfile.
>
> I have found that the rootfile is under separate directories for each architecture. I did a diff between the x86_64 and the armv5tel and most of the differences are just the x86_64 replaced by arm but I also found files where the filename itself is different between x86_64 and armv5tel with for instance ...gnu.so.2 replaced by ....gnueabi.so.2
Yes, this is quite annoying what they did there, but seems to be the current trend with everyone who builds their own build system.
> So I can do the patch with the x86_64 rootfile updated as that architecture is what I am using for my builds. I don't know what to do with the others. Are those automatically updated based on mine or do I have to do something to get them updated and if so then what?
Just submit this as x86_64 and I will take care of the rest. I will either just merge it and pull the files from the nightly builders after the first build is done or build them manually on the appropriate architectures. Depending on what I find easier.
Best,
-Michael
> Regards,
> Adolf.
>
> On 25/03/2021 18:50, Michael Tremer wrote:
>> Great! Thank you.
>>> On 25 Mar 2021, at 14:44, Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>>>
>>> Hi.
>>>
>>> I will pick it up.
>>>
>>> Adolf.
>>>
>>>
>>>
>>> On 25/03/2021 10:41, Michael Tremer wrote:
>>>> Is anyone up for grabbing this?
>>>>
>>>> We should not be affected by these security issues, but I do not see any reasons why we should not update - just in case.
>>>>
>>>> -Michael
>>>>
>>>>> Begin forwarded message:
>>>>>
>>>>> From: Karolin Seeger via samba-announce <samba-announce(a)lists.samba.org>
>>>>> Subject: [Announce] Samba 4.14.2 (4.14.1), 4.13.7 (4.13.6) and 4.12.14 (4.12.13) Security Releases
>>>>> Date: 24 March 2021 at 12:02:14 GMT
>>>>> To: samba-announce(a)lists.samba.org, samba(a)lists.samba.org, samba-technical(a)lists.samba.org
>>>>> Reply-To: kseeger(a)samba.org
>>>>>
>>>>> Release Announcements
>>>>> ---------------------
>>>>>
>>>>> These are security releases in order to address the following defects:
>>>>>
>>>>> o CVE-2020-27840: Heap corruption via crafted DN strings.
>>>>> o CVE-2021-20277: Out of bounds read in AD DC LDAP server.
>>>>>
>>>>>
>>>>> =======
>>>>> Details
>>>>> =======
>>>>>
>>>>> o CVE-2020-27840:
>>>>> An anonymous attacker can crash the Samba AD DC LDAP server by sending easily
>>>>> crafted DNs as part of a bind request. More serious heap corruption is likely
>>>>> also possible.
>>>>>
>>>>> o CVE-2021-20277:
>>>>> User-controlled LDAP filter strings against the AD DC LDAP server may crash
>>>>> the LDAP server.
>>>>>
>>>>> For more details, please refer to the security advisories.
>>>>>
>>>>>
>>>>> #######################################
>>>>> Reporting bugs & Development Discussion
>>>>> #######################################
>>>>>
>>>>> Please discuss this release on the samba-technical mailing list or by
>>>>> joining the #samba-technical IRC channel on irc.freenode.net.
>>>>>
>>>>> If you do report problems then please try to send high quality
>>>>> feedback. If you don't provide vital information to help us track down
>>>>> the problem then you will probably be ignored. All bug reports should
>>>>> be filed under the Samba 4.1 and newer product in the project's Bugzilla
>>>>> database (https://bugzilla.samba.org/).
>>>>>
>>>>>
>>>>> ======================================================================
>>>>> == Our Code, Our Bugs, Our Responsibility.
>>>>> == The Samba Team
>>>>> ======================================================================
>>>>>
>>>>>
>>>>>
>>>>> ================
>>>>> Download Details
>>>>> ================
>>>>>
>>>>> The uncompressed tarballs and patch files have been signed
>>>>> using GnuPG (ID AA99442FB680B620). The source code can be downloaded
>>>>> from:
>>>>>
>>>>> https://download.samba.org/pub/samba/stable/
>>>>>
>>>>> The release notes are available online at:
>>>>>
>>>>> https://www.samba.org/samba/history/samba-4.14.2.html
>>>>> https://www.samba.org/samba/history/samba-4.13.7.html
>>>>> https://www.samba.org/samba/history/samba-4.12.14.html
>>>>>
>>>>> Our Code, Our Bugs, Our Responsibility.
>>>>> (https://bugzilla.samba.org/)
>>>>>
>>>>> --Enjoy
>>>>> The Samba Team
>>>>
>>> --
>>> Sent from my laptop
>>>
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2021-04-01 10:15 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
[not found] <43f64b58-f715-d78e-9755-07f1fb504718@ipfire.org>
2021-03-25 17:50 ` [Announce] Samba 4.14.2 (4.14.1), 4.13.7 (4.13.6) and 4.12.14 (4.12.13) Security Releases Michael Tremer
2021-03-26 14:18 ` Adolf Belka
2021-04-01 10:15 ` Michael Tremer
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox