Blog

SAMBA+ 4.17.5 software packages have just been released by SerNet. Packages for various SUSE and Red Hat platforms as well as for Debian GNU/Linux, Ubuntu and AIX are available now.

These packages address several issues, which are listed in the release notes:


SAMBA+ 4.17.4, 4.16.8 and 4.15.13 have just been released. These are important security releases, please update affected systems as soon as possible. The packages are available for various SUSE and Red Hat platforms as well as for Debian GNU/Linux, Ubuntu and AIX.

Please note that there are several important behavior changes included in this releases, which may cause compatibility problems interacting with system still expecting the former behavior. Especially systems older than Windows 7, Windows 2008R2 and Samba 4.0 are affected here. Systems like NetApp ONTAP may also be affected. Please read the release notes and advisories carefully:

The packages address the following security related issues:

  • CVE-2022-37966 rc4-hmac Kerberos session keys issued to modern servers
    This is the Samba CVE for the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.

    A Samba Active Directory DC will issue weak rc4-hmac session keys for use between modern clients and servers despite all modern Kerberos implementations supporting the aes256-cts-hmac-sha1-96 cipher.

    On Samba Active Directory DCs and members 'kerberos encryption types = legacy' would force rc4-hmac as a client even if the server supports aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96.
     
  • CVE-2022-37967 Kerberos constrained delegation ticket forgery possible against Samba AD DC
    This is the Samba CVE for the Windows Kerberos Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.

    A service account with the special constrained delegation permission could forge a more powerful ticket than the one it was presented with.
     
  • CVE-2022-38023 RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided
    The "RC4" protection of the NetLogon Secure channel uses the same algorithms as rc4-hmac cryptography in Kerberos, and so must also be assumed to be weak.

The SAMBA+ 4.15.13 packages additionally addresses:

  • CVE-2022-45141 Samba AD DC using Heimdal can be forced to issue rc4-hmac encrypted Kerberos tickets
    Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak.

    Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (e.g. aes256-cts-hmac-sha1-96).

SAMBA+ 4.17.3, 4.16.7 and 4.15.12 have just been released by SerNet. These are important security releases, please update affected systems as soon
as possible. The packages are available for various SUSE and Red Hat platforms as well as for Debian GNU/Linux, Ubuntu and AIX.

The packages address the following issues:

  • CVE-2022-42898: Samba buffer overflow vulnerabilities on 32-bit systems
    Samba's Kerberos libraries and AD DC failed to guard against integer overflows when parsing a PAC on a 32-bit system, which allowed an attacker with a forged PAC to corrupt the heap.
     
  • Fix a regression introduced by the CVE-2022-42898 fix affecting 32-bit systems leading to a failure to validate PACs.
    DEB: 4.15.12-16, 4.16.7-22, 4.17.3-20
    RPM: 4.15.12-16, 4.16.7-21, 4.17.3-19

sambaXP flags

From 10 - 11 May 2023 the 22nd sambaXP will take place. This time finally back on site at the Hotel Freizeit In in Göttingen, Germany! As every year, the SAMBA team will gather here with its developers, users and providers. The focus will be on the OpenSource Software SAMBA with its current innovations, developments and much more. The organizer SerNet is looking forward to a good exchange!

Call for Paper
The Call for Paper has started. We are looking forward to receiving papers on various topics in SAMBA and the challenges in data management. The program committee, consisting of Jeremy Allison (Google), Stefan Kania (Author), Ralph Boehme (SerNet), will review the papers and provide feedback. Submit your presentation proposal right now at https://www.sambaXP.org!

Workshops on May 9, 2023
Several workshops will again be offered the day before the conference. Topics will be announced shortly.

Tickets will go on sale later this month. For more information, visit https://www.sambaXP.org.

Videos sambaXP 2022
Want to see what talks there were this year? On YouTube you will find a playlist with the presentations of sambaXP 2022.


SAMBA+ 4.17.2, 4.16.6 and 4.15.11 have just been released. These are important security releases, please update affected systems as soon as possible. The packages are available for various SUSE and Red Hat platforms as well as for Debian GNU/Linux, Ubuntu and AIX.

The 4.17.2 packages address the following issues:

  • CVE-2022-3437: Buffer overflow in Heimdal unwrap_des3():
    There is a limited write heap buffer overflow in the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal (included in Samba).
  • CVE-2022-3592: Wide links protection broken:
    A malicious client can use a symlink to escape the exported directory.

Samba 4.16 and 4.15 are not affected by CVE-2022-3592, the packages address CVE-2022-3437.

The 4.15.11 packages additionally address the following issues:

  • Bug 15197: Windows 11 22H2 and Samba-AD 4.15 Kerberos login issue
  • Bug 15202: writev epoll_wait cpu-spinning in the LDAP server

Contact us
Contact
Deutsch English Français