Link [ pkgsrc | NetBSD | pkgsrc git mirror | PR fulltext-search | netbsd commit viewer ]


   
        usage: [branch:branch] [user:user] [path[@revision]] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN pkgtools/pkg)




switch to index mode

recent branches: MAIN (2h)  pkgsrc-2024Q1 (10d)  pkgsrc-2023Q4 (57d)  pkgsrc-2023Q2 (89d)  pkgsrc-2023Q3 (169d) 

2024-05-28 06:39:10 UTC Now

2022-01-21 15:49:25 UTC pkgsrc-2021Q4 commitmail json YAML

Pullup ticket #6572 - requested by taca
net/samba4: security fix

Revisions pulled up:
- net/samba4/Makefile                                          1.135
- net/samba4/distinfo                                          1.71

---
  Module Name: pkgsrc
  Committed By: taca
  Date: Mon Jan 10 14:11:16 UTC 2022

  Modified Files:
  pkgsrc/net/samba4: Makefile distinfo

  Log Message:
  net/samba4: update to 4.13.16

                      ===============================
                      Release Notes for Samba 4.13.16
                            January 10, 2022
                      ===============================

  This is a security release in order to address the following defects:

  o CVE-2021-43566:  mkdir race condition allows share escape in Samba 4.x.
                      https://www.samba.org/samba/security/CVE-2021-43566.html

  =======
  Details
  =======

  o  CVE-2021-43566:
      All versions of Samba prior to 4.13.16 are vulnerable to a malicious
      client using an SMB1 or NFS symlink race to allow a directory to be
      created in an area of the server file system not exported under the
      share definition. Note that SMB1 has to be enabled, or the share
      also available via NFS in order for this attack to succeed.

      Clients that have write access to the exported part of the file system
      under a share via SMB1 unix extensions or NFS can create symlinks that
      can race the server by renaming an existing path and then replacing it
      with a symlink. If the client wins the race it can cause the server to
      create a directory under the new symlink target after the exported
      share path check has been done. This new symlink target can point to
      anywhere on the server file system. The authenticated user must have
      permissions to create a directory under the target directory of the
      symlink.

      This is a difficult race to win, but theoretically possible. Note that
      the proof of concept code supplied wins the race only when the server
      is slowed down and put under heavy load. Exploitation of this bug has
      not been seen in the wild.

  Changes since 4.13.15
  ---------------------

  o  Jeremy Allison <jra@samba.org>
      * BUG 13979: CVE-2021-43566: mkdir race condition allows share escape in Samba 4.x

(bsiegert)