Bug 18379

Summary: samba regressions introduced by latest security update
Product: Mageia Reporter: David Walser <luigiwalser>
Component: RPM PackagesAssignee: QA Team <qa-bugs>
Status: RESOLVED FIXED QA Contact:
Severity: normal    
Priority: Normal CC: davidwhodgins, s.puch, sysadmin-bugs
Version: 5Keywords: validated_update
Target Milestone: ---   
Hardware: All   
OS: Linux   
Whiteboard: MGA5-32-OK advisory
Source RPM: samba-3.6.25-2.3.mga5.src.rpm CVE:
Status comment:

Description David Walser 2016-05-05 18:03:53 CEST
Ubuntu has issued an advisory on May 4:
http://www.ubuntu.com/usn/usn-2950-3/

Patched package uploaded for Mageia 5.

Advisory:
----------------------------------------

The last security update for the samba package, MGASA-2016-0151, introduced
some regressions which have been fixed by this update.

References:
http://advisories.mageia.org/MGASA-2016-0151.html
http://www.ubuntu.com/usn/usn-2950-3/
----------------------------------------

Updated packages in core/updates_testing:
----------------------------------------
samba-server-3.6.25-2.4.mga5
samba-client-3.6.25-2.4.mga5
samba-common-3.6.25-2.4.mga5
samba-doc-3.6.25-2.4.mga5
samba-swat-3.6.25-2.4.mga5
samba-winbind-3.6.25-2.4.mga5
nss_wins-3.6.25-2.4.mga5
libsmbclient0-3.6.25-2.4.mga5
libsmbclient0-devel-3.6.25-2.4.mga5
libsmbclient0-static-devel-3.6.25-2.4.mga5
libnetapi0-3.6.25-2.4.mga5
libnetapi-devel-3.6.25-2.4.mga5
libsmbsharemodes0-3.6.25-2.4.mga5
libsmbsharemodes-devel-3.6.25-2.4.mga5
libwbclient0-3.6.25-2.4.mga5
libwbclient-devel-3.6.25-2.4.mga5
samba-virusfilter-clamav-3.6.25-2.4.mga5
samba-virusfilter-fsecure-3.6.25-2.4.mga5
samba-virusfilter-sophos-3.6.25-2.4.mga5
samba-domainjoin-gui-3.6.25-2.4.mga5

from samba-3.6.25-2.4.mga5.src.rpm
Comment 1 David Walser 2016-05-15 23:01:24 CEST
*** Bug 18459 has been marked as a duplicate of this bug. ***

CC: (none) => s.puch

Comment 2 David Walser 2016-05-18 19:20:43 CEST
Ubuntu has issued another advisory with regression fixes today (May 18):
http://www.ubuntu.com/usn/usn-2950-4/

Patched package uploaded for Mageia 5.

Advisory:
----------------------------------------

The last security update for the samba package, MGASA-2016-0151, introduced
some regressions which have been fixed by this update.

References:
http://advisories.mageia.org/MGASA-2016-0151.html
http://www.ubuntu.com/usn/usn-2950-3/
http://www.ubuntu.com/usn/usn-2950-4/
----------------------------------------

Updated packages in core/updates_testing:
----------------------------------------
samba-server-3.6.25-2.5.mga5
samba-client-3.6.25-2.5.mga5
samba-common-3.6.25-2.5.mga5
samba-doc-3.6.25-2.5.mga5
samba-swat-3.6.25-2.5.mga5
samba-winbind-3.6.25-2.5.mga5
nss_wins-3.6.25-2.5.mga5
libsmbclient0-3.6.25-2.5.mga5
libsmbclient0-devel-3.6.25-2.5.mga5
libsmbclient0-static-devel-3.6.25-2.5.mga5
libnetapi0-3.6.25-2.5.mga5
libnetapi-devel-3.6.25-2.5.mga5
libsmbsharemodes0-3.6.25-2.5.mga5
libsmbsharemodes-devel-3.6.25-2.5.mga5
libwbclient0-3.6.25-2.5.mga5
libwbclient-devel-3.6.25-2.5.mga5
samba-virusfilter-clamav-3.6.25-2.5.mga5
samba-virusfilter-fsecure-3.6.25-2.5.mga5
samba-virusfilter-sophos-3.6.25-2.5.mga5
samba-domainjoin-gui-3.6.25-2.5.mga5

from samba-3.6.25-2.5.mga5.src.rpm
Comment 3 Stefan Puch 2016-05-18 22:00:08 CEST
Interesting. The patch does exactly the same what I mentioned as work around in Bug 18457 by setting 'client ipc signing = auto'.

# rpm -qa | grep samba
samba-common-3.6.25-2.4.mga5
samba-client-3.6.25-2.4.mga5
samba-server-3.6.25-2.4.mga5
#

# testparm -v > smb-3.6.25-2.4.conf

# urpmi -v ./samba-server-3.6.25-2.5.mga5.i586.rpm ./samba-common-3.6.25-2.5.mga5.i586.rpm ./samba-client-3.6.25-2.5.mga5.i586.rpm

# rpm -qa | grep samba
samba-client-3.6.25-2.5.mga5
samba-common-3.6.25-2.5.mga5
samba-server-3.6.25-2.5.mga5
#

# testparm -v > smb-3.6.25-2.5.conf

# diff smb-3.6.25-2.4.conf smb-3.6.25-2.5.conf
91,92c91,92
<       client signing = required
<       client ipc signing = required
---
>       client signing = auto
>       client ipc signing = auto
#

What I wonder about: If 'server signing' is still set to default (disabled) what means that the server will not offer signing, then reducing 'client ipc signing' from mandatory to auto means that signing will never be used at all?

In other words the additional security which should be introduced with CVE-2016-2115 is now configured as the behaviour before isn't it? What do I miss?

At least it works on my system as before the update MGASA-2016-0151. MGA5-32
David Walser 2016-05-18 22:02:06 CEST

Whiteboard: (none) => MGA5-32-OK

Dave Hodgins 2016-05-20 11:42:28 CEST

Keywords: (none) => validated_update
Whiteboard: MGA5-32-OK => MGA5-32-OK advisory
CC: (none) => davidwhodgins, sysadmin-bugs

Comment 4 Mageia Robot 2016-05-20 13:39:14 CEST
An update for this issue has been pushed to the Mageia Updates repository.

http://advisories.mageia.org/MGAA-2016-0078.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED