Blog

The Samba team at SerNet has just released SAMBA+ 4.17.6 software packages. They are available for various SUSE and Red Hat platforms as well as for Debian GNU/Linux, Ubuntu and AIX. 

These packages address several issues, which are listed in the release notes: 

  https://www.samba.org/samba/history/samba-4.17.6.html 

Due to some interim updates for 4.17.5 this release also contains next to other improvements patches to 

  • solve an issue with restoring from snapshots (previous versions), 
  • fix the directory name case normalization, when the combination of the following smb.conf options is set: 
    case sensitive = yes 
    preserve case = no 
    short preserve case = no 

SAMBA+ 4.17.5 software packages have just been released by SerNet. Packages for various SUSE and Red Hat platforms as well as for Debian GNU/Linux, Ubuntu and AIX are available now.

These packages address several issues, which are listed in the release notes:


SAMBA+ 4.17.4, 4.16.8 and 4.15.13 have just been released. These are important security releases, please update affected systems as soon as possible. The packages are available for various SUSE and Red Hat platforms as well as for Debian GNU/Linux, Ubuntu and AIX.

Please note that there are several important behavior changes included in this releases, which may cause compatibility problems interacting with system still expecting the former behavior. Especially systems older than Windows 7, Windows 2008R2 and Samba 4.0 are affected here. Systems like NetApp ONTAP may also be affected. Please read the release notes and advisories carefully:

The packages address the following security related issues:

  • CVE-2022-37966 rc4-hmac Kerberos session keys issued to modern servers
    This is the Samba CVE for the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.

    A Samba Active Directory DC will issue weak rc4-hmac session keys for use between modern clients and servers despite all modern Kerberos implementations supporting the aes256-cts-hmac-sha1-96 cipher.

    On Samba Active Directory DCs and members 'kerberos encryption types = legacy' would force rc4-hmac as a client even if the server supports aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96.
     
  • CVE-2022-37967 Kerberos constrained delegation ticket forgery possible against Samba AD DC
    This is the Samba CVE for the Windows Kerberos Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.

    A service account with the special constrained delegation permission could forge a more powerful ticket than the one it was presented with.
     
  • CVE-2022-38023 RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided
    The "RC4" protection of the NetLogon Secure channel uses the same algorithms as rc4-hmac cryptography in Kerberos, and so must also be assumed to be weak.

The SAMBA+ 4.15.13 packages additionally addresses:

  • CVE-2022-45141 Samba AD DC using Heimdal can be forced to issue rc4-hmac encrypted Kerberos tickets
    Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak.

    Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (e.g. aes256-cts-hmac-sha1-96).

SAMBA+ 4.17.3, 4.16.7 and 4.15.12 have just been released by SerNet. These are important security releases, please update affected systems as soon
as possible. The packages are available for various SUSE and Red Hat platforms as well as for Debian GNU/Linux, Ubuntu and AIX.

The packages address the following issues:

  • CVE-2022-42898: Samba buffer overflow vulnerabilities on 32-bit systems
    Samba's Kerberos libraries and AD DC failed to guard against integer overflows when parsing a PAC on a 32-bit system, which allowed an attacker with a forged PAC to corrupt the heap.
     
  • Fix a regression introduced by the CVE-2022-42898 fix affecting 32-bit systems leading to a failure to validate PACs.
    DEB: 4.15.12-16, 4.16.7-22, 4.17.3-20
    RPM: 4.15.12-16, 4.16.7-21, 4.17.3-19

SAMBA+ 4.17.2, 4.16.6 and 4.15.11 have just been released. These are important security releases, please update affected systems as soon as possible. The packages are available for various SUSE and Red Hat platforms as well as for Debian GNU/Linux, Ubuntu and AIX.

The 4.17.2 packages address the following issues:

  • CVE-2022-3437: Buffer overflow in Heimdal unwrap_des3():
    There is a limited write heap buffer overflow in the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal (included in Samba).
  • CVE-2022-3592: Wide links protection broken:
    A malicious client can use a symlink to escape the exported directory.

Samba 4.16 and 4.15 are not affected by CVE-2022-3592, the packages address CVE-2022-3437.

The 4.15.11 packages additionally address the following issues:

  • Bug 15197: Windows 11 22H2 and Samba-AD 4.15 Kerberos login issue
  • Bug 15202: writev epoll_wait cpu-spinning in the LDAP server

Contact us
Contact
Deutsch English Français