Bug 18379 - samba regressions introduced by latest security update
Summary: samba regressions introduced by latest security update
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: RPM Packages (show other bugs)
Version: 5
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL:
Whiteboard: MGA5-32-OK advisory
Keywords: validated_update
: 18459 (view as bug list)
Depends on:
Blocks:
 
Reported: 2016-05-05 18:03 CEST by David Walser
Modified: 2016-05-20 13:39 CEST (History)
3 users (show)

See Also:
Source RPM: samba-3.6.25-2.3.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2016-05-05 18:03:53 CEST
Ubuntu has issued an advisory on May 4:
http://www.ubuntu.com/usn/usn-2950-3/

Patched package uploaded for Mageia 5.

Advisory:
----------------------------------------

The last security update for the samba package, MGASA-2016-0151, introduced
some regressions which have been fixed by this update.

References:
http://advisories.mageia.org/MGASA-2016-0151.html
http://www.ubuntu.com/usn/usn-2950-3/
----------------------------------------

Updated packages in core/updates_testing:
----------------------------------------
samba-server-3.6.25-2.4.mga5
samba-client-3.6.25-2.4.mga5
samba-common-3.6.25-2.4.mga5
samba-doc-3.6.25-2.4.mga5
samba-swat-3.6.25-2.4.mga5
samba-winbind-3.6.25-2.4.mga5
nss_wins-3.6.25-2.4.mga5
libsmbclient0-3.6.25-2.4.mga5
libsmbclient0-devel-3.6.25-2.4.mga5
libsmbclient0-static-devel-3.6.25-2.4.mga5
libnetapi0-3.6.25-2.4.mga5
libnetapi-devel-3.6.25-2.4.mga5
libsmbsharemodes0-3.6.25-2.4.mga5
libsmbsharemodes-devel-3.6.25-2.4.mga5
libwbclient0-3.6.25-2.4.mga5
libwbclient-devel-3.6.25-2.4.mga5
samba-virusfilter-clamav-3.6.25-2.4.mga5
samba-virusfilter-fsecure-3.6.25-2.4.mga5
samba-virusfilter-sophos-3.6.25-2.4.mga5
samba-domainjoin-gui-3.6.25-2.4.mga5

from samba-3.6.25-2.4.mga5.src.rpm
Comment 1 David Walser 2016-05-15 23:01:24 CEST
*** Bug 18459 has been marked as a duplicate of this bug. ***

CC: (none) => s.puch

Comment 2 David Walser 2016-05-18 19:20:43 CEST
Ubuntu has issued another advisory with regression fixes today (May 18):
http://www.ubuntu.com/usn/usn-2950-4/

Patched package uploaded for Mageia 5.

Advisory:
----------------------------------------

The last security update for the samba package, MGASA-2016-0151, introduced
some regressions which have been fixed by this update.

References:
http://advisories.mageia.org/MGASA-2016-0151.html
http://www.ubuntu.com/usn/usn-2950-3/
http://www.ubuntu.com/usn/usn-2950-4/
----------------------------------------

Updated packages in core/updates_testing:
----------------------------------------
samba-server-3.6.25-2.5.mga5
samba-client-3.6.25-2.5.mga5
samba-common-3.6.25-2.5.mga5
samba-doc-3.6.25-2.5.mga5
samba-swat-3.6.25-2.5.mga5
samba-winbind-3.6.25-2.5.mga5
nss_wins-3.6.25-2.5.mga5
libsmbclient0-3.6.25-2.5.mga5
libsmbclient0-devel-3.6.25-2.5.mga5
libsmbclient0-static-devel-3.6.25-2.5.mga5
libnetapi0-3.6.25-2.5.mga5
libnetapi-devel-3.6.25-2.5.mga5
libsmbsharemodes0-3.6.25-2.5.mga5
libsmbsharemodes-devel-3.6.25-2.5.mga5
libwbclient0-3.6.25-2.5.mga5
libwbclient-devel-3.6.25-2.5.mga5
samba-virusfilter-clamav-3.6.25-2.5.mga5
samba-virusfilter-fsecure-3.6.25-2.5.mga5
samba-virusfilter-sophos-3.6.25-2.5.mga5
samba-domainjoin-gui-3.6.25-2.5.mga5

from samba-3.6.25-2.5.mga5.src.rpm
Comment 3 Stefan Puch 2016-05-18 22:00:08 CEST
Interesting. The patch does exactly the same what I mentioned as work around in Bug 18457 by setting 'client ipc signing = auto'.

# rpm -qa | grep samba
samba-common-3.6.25-2.4.mga5
samba-client-3.6.25-2.4.mga5
samba-server-3.6.25-2.4.mga5
#

# testparm -v > smb-3.6.25-2.4.conf

# urpmi -v ./samba-server-3.6.25-2.5.mga5.i586.rpm ./samba-common-3.6.25-2.5.mga5.i586.rpm ./samba-client-3.6.25-2.5.mga5.i586.rpm

# rpm -qa | grep samba
samba-client-3.6.25-2.5.mga5
samba-common-3.6.25-2.5.mga5
samba-server-3.6.25-2.5.mga5
#

# testparm -v > smb-3.6.25-2.5.conf

# diff smb-3.6.25-2.4.conf smb-3.6.25-2.5.conf
91,92c91,92
<       client signing = required
<       client ipc signing = required
---
>       client signing = auto
>       client ipc signing = auto
#

What I wonder about: If 'server signing' is still set to default (disabled) what means that the server will not offer signing, then reducing 'client ipc signing' from mandatory to auto means that signing will never be used at all?

In other words the additional security which should be introduced with CVE-2016-2115 is now configured as the behaviour before isn't it? What do I miss?

At least it works on my system as before the update MGASA-2016-0151. MGA5-32
David Walser 2016-05-18 22:02:06 CEST

Whiteboard: (none) => MGA5-32-OK

Dave Hodgins 2016-05-20 11:42:28 CEST

Keywords: (none) => validated_update
Whiteboard: MGA5-32-OK => MGA5-32-OK advisory
CC: (none) => davidwhodgins, sysadmin-bugs

Comment 4 Mageia Robot 2016-05-20 13:39:14 CEST
An update for this issue has been pushed to the Mageia Updates repository.

http://advisories.mageia.org/MGAA-2016-0078.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.