The annotated tag, samba-4.15.2 has been created
        at  ac8c226ed9d8c067f6053c6f7f8f6457b86c2f52 (tag)
   tagging  7d0c030d4233974c4b9463dad44efdb05e6186f1 (commit)
  replaces  samba-4.15.1
 tagged by  Jule Anger
        on  Mon Nov 8 12:34:39 2021 +0100

- Log -----------------------------------------------------------------
samba: tag release samba-4.15.2
-----BEGIN PGP SIGNATURE-----
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=7Srm
-----END PGP SIGNATURE-----

Alexander Bokovoy (1):
      CVE-2020-25717: Add FreeIPA domain controller role

Andreas Schneider (11):
      CVE-2020-25719 mit-samba: Make ks_get_principal() internally public
      CVE-2020-25719 mit-samba: Add ks_free_principal()
      CVE-2020-25719 mit-samba: If we use client_princ, always lookup the db 
entry
      CVE-2020-25719 mit-samba: Add mit_samba_princ_needs_pac()
      CVE-2020-25719 mit-samba: Handle no DB entry in mit_samba_get_pac()
      CVE-2020-25719 mit-samba: Rework PAC handling in 
kdb_samba_db_sign_auth_data()
      CVE-2020-25719 mit_samba: The samba_princ_needs_pac check should be on 
the server entry
      CVE-2020-25719 mit_samba: Create the talloc context earlier
      CVE-2020-25719 s4:kdc: Remove trailing spaces in pac-glue.c
      CVE-2020-25719 s4:kdc: Add samba_kdc_validate_pac_blob()
      CVE-2020-25719 s4:kdc: Check if the pac is valid before updating it

Andrew Bartlett (55):
      CVE-2020-25722 selftest: Move self.assertRaisesLdbError() to 
samba.tests.TestCase
      CVE-2020-25722 selftest: Modernise user_account_control.py tests use a 
common self.OU
      CVE-2020-25722 selftest: Use addCleanup rather than tearDown in 
user_account_control.py
      CVE-2020-25722 pydsdb: Add API to return strings of known UF_ flags
      CVE-2020-25722 selftest: Use @DynamicTestCase in user_account_control 
test_uac_bits_unrelated_modify()
      CVE-2020-25722 selftest: Replace internal loop in test_uac_bits_add() 
using @DynamicTestClass
      CVE-2020-25722 selftest: Replace internal loop in test_uac_bits_set() 
using @DynamicTestClass
      CVE-2020-25722 selftest: Update user_account_control tests to pass 
against Windows 2019
      CVE-2020-25722 selftest: Use self.assertRaisesLdbError() in 
user_account_control.py test
      CVE-2020-25722 dsdb: Tests for our known set of privileged attributes
      CVE-2020-25722 dsdb: Move krbtgt password setup after the point of 
checking if any passwords are changed
      CVE-2020-25722 dsdb: Restrict the setting of privileged attributes during 
LDAP add/modify
      CVE-2020-25722 selftest: Extend priv_attrs test - work around 
UF_NORMAL_ACCOUNT rules on Windows 2019 (requires |UF_PASSWD_NOTREQD or a 
password) - extend to also cover the sensitive UF_TRUSTED_FOR_DELEGATION
      CVE-2020-25722 selftest: Test combinations of account type and 
objectclass for creating a user
      CVE-2020-25722 selftest: allow for future failures in 
BindTests.test_virtual_email_account_style_bind
      CVE-2020-25722 selftest: Catch possible errors in 
PasswordSettingsTestCase.test_pso_none_applied()
      CVE-2020-25722 selftest: Catch errors from samdb.modify() in 
user_account_control tests
      CVE-2020-25722 dsdb: objectclass computer becomes UF_WORKSTATION_TRUST by 
default
      CVE-2020-25722 dsdb: Improve privileged and unprivileged tests for 
objectclass/doller/UAC
      CVE-2020-25722 dsdb: Prohibit mismatch between UF_ account types and 
objectclass.
      CVE-2020-25722 selftest/priv_attrs: Mention that these knownfails are OK 
(for now)
      CVE-2020-25722 selftest: Adapt selftest to restriction on swapping 
account types
      CVE-2020-25722 dsdb: samldb_objectclass_trigger() is only called on ADD, 
so remove indentation
      CVE-2020-25722 dsdb: Add restrictions on computer accounts without a 
trailing $
      CVE-2020-25722 selftest: Adapt sam.py test_isCriticalSystemObject to new 
UF_WORKSTATION_TRUST_ACCOUNT default
      CVE-2020-25722 samdb: Fill in isCriticalSystemObject on any account type 
change
      CVE-2020-25722 selftest: Split test_userAccountControl into unit tests
      CVE-2020-25722 selftest: Adjust sam.py 
test_userAccountControl_computer_add_trust to new reality
      CVE-2020-25722 selftest: New objects of objectclass=computer are 
workstations by default now
      CVE-2020-25722 selftest: Adapt sam.py test to 
userAccountControl/objectclass restrictions
      CVE-2020-25722 selftest: adapt ldap.py/sam.py test_all tests to new 
default computer behaviour
      CVE-2020-25722 selftest: Allow self.assertRaisesLdbError() to take a list 
of errors to match with
      CVE-2020-25722 selftest/user_account_control: Allow a broader set of 
possible errors
      CVE-2020-25722 selftest/user_account_control: more work to cope with 
UAC/objectclass defaults and lock
      CVE-2020-25721 krb5pac: Add new buffers for samAccountName and objectSID
      CVE-2020-25722 Check all elements in acl_check_spn() not just the first 
one
      CVE-2020-25722 Check for all errors from acl_check_extended_right() in 
acl_check_spn()
      CVE-2020-25718 kdc: Remove unused samba_kdc_get_pac_blob()
      CVE-2020-25718 s4-rpc_server: Change sid list functions to operate on a 
array of struct dom_sid
      CVE-2020-25718 s4-rpc_server: Obtain the user tokenGroups earlier
      CVE-2020-25718 s4-rpc_server: Put RODC reveal/never reveal logic into a 
single helper function
      CVE-2020-25718 s4-rpc_server: Put msDS-KrbTgtLinkBL and 
UF_INTERDOMAIN_TRUST_ACCOUNT RODC checks in common
      CVE-2020-25718 s4-rpc_server: Confirm that the RODC has the 
UF_PARTIAL_SECRETS_ACCOUNT bit
      CVE-2020-25718 s4-rpc_server: Provide wrapper 
samdb_confirm_rodc_allowed_to_repl_to()
      CVE-2020-25718 s4-rpc_server: Remove unused attributes in RODC check
      CVE-2020-25718 s4-rpc_server: Explain why we use 
DSDB_SEARCH_SHOW_EXTENDED_DN in RODC access check
      CVE-2020-25718 s4-rpc_server: Add in debug messages into RODC processing
      CVE-2020-25718 dsdb: Bring sid_helper.c into common code as rodc_helper.c
      CVE-2020-25718 kdc: Confirm the RODC was allowed to issue a particular 
ticket
      CVE-2020-25719 kdc: Avoid races and multiple DB lookups in s4u2self check
      CVE-2020-25721 auth: Fill in the new HAS_SAM_NAME_AND_SID values
      CVE-2020-25722 Ensure the structural objectclass cannot be changed
      CVE-2020-25722 kdc: Do not honour a request for a 3-part SPN (ending in 
our domain/realm) unless a DC
      Revert "CVE-2020-25719 heimdal:kdc: Require authdata to be present"
      CVE-2020-25719 selftest: Always expect a PAC in TGS replies with Heimdal

Douglas Bagnall (35):
      CVE-2020-25722 pytests: add reverse lookup dict for LDB error codes
      CVE-2020-25722 pytest: assertRaisesLdbError invents a message if you're 
lazy
      CVE-2020-25722 s4/dsdb/cracknames: always free tmp_ctx in spn_alias
      CVE-2020-25722 s4/cracknames: lookup_spn_alias doesn't need krb5 context
      CVE-2020-25722 samba-tool spn: accept -H for database url
      CVE-2020-25722 samba-tool spn add: remove --force option
      CVE-2020-25722 tests: blackbox samba-tool spn non-admin test
      CVE-2020-25722 s4/provision: add host/ SPNs at the start
      CVE-2020-25722 blackbox/upgrades tests: ignore SPN for ldapcmp
      CVE-2020-25722 pytest: test sAMAccountName/userPrincipalName over ldap
      CVE-2020-25722 pytest: test setting servicePrincipalName over ldap
      CVE-2020-25722 s4/cracknames: add comment pointing to samldb spn handling
      CVE-2020-25722 s4/dsdb/samldb: add samldb_get_single_valued_attr() helper
      CVE-2020-25722 s4/dsdb/samldb: unique_attr_check uses 
samldb_get_single_valued_attr()
      CVE-2020-25722 s4/dsdb/samldb: check for clashes in UPNs/samaccountnames
      CVE-2020-25722 s4/dsdb/samldb: check sAMAccountName for illegal characters
      CVE-2020-25722 s4/dsdb/samldb: check for SPN uniqueness, including aliases
      CVE-2020-25722 s4/dsdb/samldb: reject SPN with too few/many components
      CVE-2020-25722 s4/dsdb modules: add dsdb_get_expected_new_values()
      CVE-2020-25722 s4/dsdb/samldb: samldb_get_single_valued_attr() check all 
values
      CVE-2020-25722 s4/dsdb/samldb: samldb_sam_accountname_valid_check() check 
all values
      CVE-2020-25722 s4/dsdb/samldb: samldb_schema_add_handle_linkid() checks 
all values
      CVE-2020-25722 s4/dsdb/samldb: samldb_schema_add_handle_mapiid() checks 
all values
      CVE-2020-25722 s4/dsdb/samldb: samldb_prim_group_change() checks all 
values
      CVE-2020-25722 s4/dsdb/samldb: samldb_user_account_control_change() 
checks all values
      CVE-2020-25722 s4/dsdb/samldb _user_account_control_change() always add 
final value
      CVE-2020-25722 s4/dsdb/samldb: samldb_pwd_last_set_change() checks all 
values
      CVE-2020-25722 s4/dsdb/samldb: samldb_lockout_time() checks all values
      CVE-2020-25722 s4/dsdb/samldb: samldb_group_type_change() checks all 
values
      CVE-2020-25722 s4/dsdb/samldb: samldb_service_principal_names_change 
checks values
      CVE-2020-25722 s4/dsdb/samldb: samldb_fsmo_role_owner_check checks values
      CVE-2020-25722 s4/dsdb/samldb: samldb_fsmo_role_owner_check() wants one 
value
      CVE-2020-25722 s4/dsdb/pwd_hash: password_hash_bypass gets all values
      CVE-2020-25722 s4/dsdb/pwd_hash: rework pwdLastSet bypass
      CVE-2020-25722 s4/dsdb/util: remove unused dsdb_get_single_valued_attr()

Joseph Sutton (64):
      CVE-2020-17049 tests/krb5: Check account name and SID in PAC for S4U tests
      CVE-2020-25722 dsdb: Add tests for modifying objectClass, 
userAccountControl and sAMAccountName
      CVE-2020-25718 tests/krb5: Allow tests accounts to replicate to RODC
      CVE-2020-25719 CVE-2020-25717 tests/krb5: Modify get_service_ticket() to 
use _generic_kdc_exchange()
      CVE-2020-25719 CVE-2020-25717 tests/krb5: Add pac_request parameter to 
get_service_ticket()
      CVE-2020-25722 tests/krb5: Allow creating server accounts
      CVE-2020-25719 tests/krb5: Add is_tgt() helper method
      CVE-2020-25719 tests/krb5: Add method to get unique username for test 
accounts
      MS CVE-2020-17049 tests/krb5: Allow tests to pass if ticket signature 
checksum type is wrong
      CVE-2020-25721 tests/krb5: Check PAC buffer types when STRICT_CHECKING=0
      CVE-2020-25719 CVE-2020-25717 tests/krb5: Refactor 
create_ccache_with_user() to take credentials of target service
      CVE-2020-25719 CVE-2020-25717 tests/krb5: Allow create_ccache_with_user() 
to return a ticket without a PAC
      CVE-2020-25722 tests/krb5: Add KDC tests for 3-part SPNs
      CVE-2020-25721 ndrdump: Add tests for PAC with UPN_DNS_INFO
      CVE-2020-25719 tests/krb5: Add tests for requiring and issuing a PAC
      CVE-2020-25719 tests/krb5: Add a test for making an S4U2Self request 
without a PAC
      CVE-2020-25719 tests/krb5: Add principal aliasing test
      CVE-2020-25718 tests/krb5: Add tests for RODC-printed and invalid TGTs
      CVE-2020-25719 tests/krb5: Add tests for including authdata without a PAC
      CVE-2020-25721 tests/krb5: Add tests for extended PAC_UPN_DNS_INFO PAC 
buffer
      CVE-2020-25719 CVE-2020-25717 tests/krb5: Adapt tests for connecting 
without a PAC to new error codes
      CVE-2020-25722 Add test for SPN deletion followed by addition
      CVE-2020-25722 s4:dsdb:tests: Add missing self.fail() calls
      CVE-2020-25722 selftest: Adapt ldap.py tests to new objectClass 
restrictions
      CVE-2020-25718 tests/krb5: Fix indentation
      CVE-2020-25719 krb5pac.idl: Add PAC_ATTRIBUTES_INFO PAC buffer type
      CVE-2020-25719 krb5pac.idl: Add PAC_REQUESTER_SID PAC buffer type
      CVE-2020-25719 tests/krb5: Provide expected parameters for both AS-REQs 
in get_tgt()
      CVE-2020-25719 tests/krb5: Allow update_pac_checksums=True if the PAC is 
not present
      CVE-2020-25719 tests/krb5: Don't expect a kvno for user-to-user
      CVE-2020-25719 tests/krb5: Expect 'renew-till' element when renewing a TGT
      CVE-2020-25719 tests/krb5: Return ticket from _tgs_req()
      CVE-2020-25719 tests/krb5: Use correct credentials for user-to-user tests
      CVE-2020-25719 tests/krb5: Adjust PAC tests to prepare for new 
PAC_ATTRIBUTES_INFO buffer
      CVE-2020-25719 tests/krb5: Adjust expected error codes for user-to-user 
tests
      CVE-2020-25719 tests/krb5: tests/krb5: Adjust expected error code for 
S4U2Self no-PAC tests
      CVE-2020-25719 tests/krb5: Extend _get_tgt() method to allow more 
modifications to tickets
      CVE-2020-25719 tests/krb5: Add _modify_tgt() method for modifying already 
obtained tickets
      CVE-2020-25719 tests/krb5: Add testing for PAC_TYPE_ATTRIBUTES_INFO PAC 
buffer
      CVE-2020-25719 tests/krb5: Add testing for PAC_TYPE_REQUESTER_SID PAC 
buffer
      CVE-2020-25719 tests/krb5: Add EXPECT_PAC environment variable to expect 
pac from all TGS tickets
      CVE-2020-25719 tests/krb5: Add expected parameters to cache key for 
obtaining tickets
      CVE-2020-25719 tests/krb5: Add tests for PAC attributes buffer
      CVE-2020-25719 tests/krb5: Add tests for PAC-REQUEST padata
      CVE-2020-25719 tests/krb5: Add tests for requester SID PAC buffer
      CVE-2020-25719 tests/krb5: Add test for user-to-user with no sname
      CVE-2020-25719 tests/krb5: Add tests for mismatched names with 
user-to-user
      CVE-2020-25719 s4/torture: Expect additional PAC buffers
      CVE-2020-25722 pytest: Raise an error when adding a dynamic test that 
would overwrite an existing test
      CVE-2020-25719 s4:kdc: Add KDC support for PAC_ATTRIBUTES_INFO PAC buffer
      CVE-2020-25719 heimdal:kdc: Require authdata to be present
      CVE-2020-25718 kdc: Return ERR_POLICY if RODC krbtgt account is invalid
      CVE-2020-25719 s4:kdc: Add KDC support for PAC_REQUESTER_SID PAC buffer
      CVE-2020-25719 heimdal:kdc: Check return code
      CVE-2020-25719 heimdal:kdc: Move fetching krbtgt entry to before enctype 
selection
      CVE-2020-25719 heimdal:kdc: Use sname from request rather than 
user-to-user TGT client name
      CVE-2020-25719 heimdal:kdc: Check name in request against name in 
user-to-user TGT
      CVE-2020-25719 heimdal:kdc: Verify PAC in TGT provided for user-to-user 
authentication
      CVE-2020-25719 heimdal:kdc: Require PAC to be present
      CVE-2020-25718 tests/krb5: Only fetch RODC account credentials when 
necessary
      CVE-2020-25719 tests/krb5: Add tests for using a ticket with a renamed 
account
      CVE-2020-25718 heimdal:kdc: Add comment about tests for tickets of users 
not revealed to an RODC
      CVE-2020-25722 selftest: Add test for duplicate servicePrincipalNames on 
an add operation
      CVE-2020-25722 selftest: Ensure check for duplicate servicePrincipalNames 
is not bypassed for an add operation

Jule Anger (3):
      VERSION: Bump version up to Samba 4.15.2...
      WHATSNEW: Add release notes for Samba 4.15.2.
      VERSION: Disable GIT_SNAPSHOT for the 4.15.2 release.

Nadezhda Ivanova (2):
      CVE-2020-25722: s4-acl: test Control Access Rights honor the Applies-to 
attribute
      CVE-2020-25722: s4-acl: Make sure Control Access Rights honor the 
Applies-to attribute

Ralph Boehme (1):
      CVE-2020-25717: s3:auth: remove fallbacks in smb_getpwnam()

Samuel Cabrero (4):
      CVE-2020-25717: loadparm: Add new parameter "min domain uid"
      CVE-2020-25717: selftest: Add ad_member_no_nss_wb environment
      CVE-2020-25717: selftest: Add a test for the new 'min domain uid' 
parameter
      CVE-2020-25717: s3:auth: Check minimum domain uid

Stefan Metzmacher (47):
      CVE-2020-25719 CVE-2020-25717 tests/krb5: Add tests for connecting to 
services anonymously and without a PAC
      CVE-2020-25719 CVE-2020-25717: selftest: remove "gensec:require_pac" 
settings
      CVE-2020-25717: s3:winbindd: make sure we default to r->out.authoritative 
= true
      CVE-2020-25717: s4:auth/ntlm: make sure auth_check_password() defaults to 
r->out.authoritative = true
      CVE-2020-25717: s4:torture: start with authoritative = 1
      CVE-2020-25717: s4:smb_server: start with authoritative = 1
      CVE-2020-25717: s4:auth_simple: start with authoritative = 1
      CVE-2020-25717: s3:ntlm_auth: start with authoritative = 1
      CVE-2020-25717: s3:torture: start with authoritative = 1
      CVE-2020-25717: s3:rpcclient: start with authoritative = 1
      CVE-2020-25717: s3:auth: start with authoritative = 1
      CVE-2020-25717: auth/ntlmssp: start with authoritative = 1
      CVE-2020-25717: s3:auth: let auth3_generate_session_info_pac() forward 
the low level errors
      CVE-2020-25717: s3:auth: we should not try to autocreate the guest account
      CVE-2020-25717: s3:auth: no longer let check_account() autocreate local 
users
      CVE-2020-25717: s3:lib: add lp_allow_trusted_domains() logic to 
is_allowed_domain()
      CVE-2020-25717: s3:auth: don't let create_local_token depend on 
!winbind_ping()
      CVE-2020-25719 CVE-2020-25717: auth/gensec: always require a PAC in 
domain mode (DC or member)
      CVE-2020-25719 CVE-2020-25717: s4:auth: remove unused 
auth_generate_session_info_principal()
      CVE-2020-25717: s3:ntlm_auth: fix memory leaks in 
ntlm_auth_generate_session_info_pac()
      CVE-2020-25717: s3:ntlm_auth: let ntlm_auth_generate_session_info_pac() 
base the name on the PAC LOGON_INFO only
      CVE-2020-25717: s3:auth: let auth3_generate_session_info_pac() delegate 
everything to make_server_info_wbcAuthUserInfo()
      CVE-2020-25717: selftest: configure 'ktest' env with winbindd and 
idmap_autorid
      CVE-2020-25717: s3:auth: let auth3_generate_session_info_pac() reject a 
PAC in standalone mode
      CVE-2020-25717: s3:auth: simplify get_user_from_kerberos_info() by 
removing the unused logon_info argument
      CVE-2020-25717: s3:auth: simplify make_session_info_krb5() by removing 
unused arguments
      CVE-2020-25722 pytests: Give computer accounts unique (and valid) 
sAMAccountNames and SPNs
      CVE-2021-23192: dcesrv_core: add better debugging to 
dcesrv_fault_disconnect()
      CVE-2021-23192: dcesrv_core: add dcesrv_fault_disconnect0() that skips 
DCERPC_PFC_FLAG_DID_NOT_EXECUTE
      CVE-2021-23192: python/tests/dcerpc: change assertNotEquals() into 
assertNotEqual()
      CVE-2021-23192: python/tests/dcerpc: let generate_request_auth() use 
g_auth_level in all places
      CVE-2021-23192: python/tests/dcerpc: fix do_single_request(send_req=False)
      CVE-2021-23192: python/tests/dcerpc: add tests to check how security 
contexts relate to fragmented requests
      CVE-2021-23192: dcesrv_core: only the first fragment specifies the 
auth_contexts
      CVE-2016-2124: s4:libcli/sesssetup: don't fallback to non spnego 
authentication if we require kerberos
      CVE-2016-2124: s3:libsmb: don't fallback to non spnego authentication if 
we require kerberos
      CVE-2021-3738 s4:torture/drsuapi: don't pass DsPrivate to test_DsBind()
      CVE-2021-3738 s4:torture/drsuapi: maintain priv->dc_credentials
      CVE-2021-3738 s4:torture/drsuapi: maintain priv->admin_credentials
      CVE-2021-3738 s4:torture/drsuapi: DsBindAssocGroup* tests
      CVE-2021-3738 auth_util: avoid talloc_tos() in copy_session_info()
      CVE-2021-3738 s4:rpc_server/common: provide assoc_group aware 
dcesrv_samdb_connect_as_{system,user}() helpers
      CVE-2021-3738 s4:rpc_server/drsuapi: make use of assoc_group aware 
dcesrv_samdb_connect_as_*() helpers
      CVE-2021-3738 s4:rpc_server/dnsserver: make use of 
dcesrv_samdb_connect_as_user() helper
      CVE-2021-3738 s4:rpc_server/lsa: make use of 
dcesrv_samdb_connect_as_user() helper
      CVE-2021-3738 s4:rpc_server/netlogon: make use of 
dcesrv_samdb_connect_as_*() helper
      CVE-2021-3738 s4:rpc_server/samr: make use of dcesrv_samdb_connect_as_*() 
helper

-----------------------------------------------------------------------


-- 
Samba Shared Repository

Reply via email to