UbuntuUpdates.org

Package "libpam-winbind"

Name: libpam-winbind

Description:

Windows domain authentication integration plugin

Latest version: 2:4.3.11+dfsg-0ubuntu0.16.04.34
Release: xenial (16.04)
Level: security
Repository: universe
Head package: samba
Homepage: http://www.samba.org

Links


Download "libpam-winbind"


Other versions of "libpam-winbind" in Xenial

Repository Area Version
base universe 2:4.3.8+dfsg-0ubuntu1
updates universe 2:4.3.11+dfsg-0ubuntu0.16.04.34

Changelog

Version: 2:4.3.11+dfsg-0ubuntu0.16.04.28 2020-07-02 15:07:44 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.28) xenial-security; urgency=medium

  * SECURITY UPDATE: Parsing and packing of NBT and DNS packets can consume
    excessive CPU
    - debian/patches/CVE-2020-10745-*.patch: multiple upstream patches to
      fix the issue.
    - CVE-2020-10745

 -- Marc Deslauriers <email address hidden> Fri, 19 Jun 2020 09:04:51 -0400

Source diff to previous version

Version: 2:4.3.11+dfsg-0ubuntu0.16.04.27 2020-04-29 15:27:58 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.27) xenial-security; urgency=medium

  * SECURITY REGRESSION: new LDAP options not recognized (LP: #1875798)
    - debian/patches/CVE-2020-10704-3.patch: move options to appropriate
      location in lib/param/loadparm.c.
    - debian/patches/CVE-2020-10704-5.patch: move option to appropriate
      location in lib/param/loadparm.c.
    - debian/patches/CVE-2020-10704-7.patch: add new options to param_table
      in lib/param/param_table.c.

 -- Marc Deslauriers <email address hidden> Wed, 29 Apr 2020 07:50:47 -0400

Source diff to previous version
1875798 Samba 2:4.3.11+dfsg-0ubuntu0.16.04.26: LDAP request size (81) exceeds (0)

Version: 2:4.3.11+dfsg-0ubuntu0.16.04.26 2020-04-28 18:07:22 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.26) xenial-security; urgency=medium

  * SECURITY UPDATE: Stack overflow in AD DC LDAP server
    - debian/patches/CVE-2020-10704-1.patch: add ASN.1 max tree depth in
      auth/gensec/gensec_util.c, lib/util/asn1.c, lib/util/asn1.h,
      lib/util/tests/asn1_tests.c, libcli/auth/spnego_parse.c,
      libcli/cldap/cldap.c, libcli/ldap/ldap_message.c,
      source3/lib/tldap.c, source3/lib/tldap_util.c,
      source3/libsmb/clispnego.c, source4/auth/gensec/gensec_krb5.c,
      source4/ldap_server/ldap_server.c, source4/libcli/ldap/ldap_client.c,
      source4/libcli/ldap/ldap_controls.c.
    - debian/patches/CVE-2020-10704-2.patch: check parse tree depth in
      lib/util/asn1.c.
    - debian/patches/CVE-2020-10704-3.patch: add max ldap request sizes in
      docs-xml/smbdotconf/ldap/ldapmaxanonrequest.xml,
      docs-xml/smbdotconf/ldap/ldapmaxauthrequest.xml,
      lib/param/loadparm.c, source3/param/loadparm.c.
    - debian/patches/CVE-2020-10704-4.patch: limit request sizes in
      source4/ldap_server/ldap_server.c.
    - debian/patches/CVE-2020-10704-5.patch: add search size limits to
      ldap_decode in docs-xml/smbdotconf/ldap/ldapmaxsearchrequest.xml,
      lib/param/loadparm.c, libcli/cldap/cldap.c,
      libcli/ldap/ldap_message.c, libcli/ldap/ldap_message.h,
      source3/param/loadparm.c, source4/ldap_server/ldap_server.c,
      source4/libcli/ldap/ldap_client.c.
    - debian/patches/CVE-2020-10704-6.patch: check search request lengths
      in lib/util/asn1.c, lib/util/asn1.h, libcli/ldap/ldap_message.c.
    - CVE-2020-10704

 -- Marc Deslauriers <email address hidden> Wed, 22 Apr 2020 11:52:53 -0400

Source diff to previous version

Version: 2:4.3.11+dfsg-0ubuntu0.16.04.25 2020-01-21 15:07:09 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.25) xenial-security; urgency=medium

  * SECURITY UPDATE: Crash after failed character conversion at log level 3
    or above
    - debian/patches/CVE-2019-14907-1.patch: fix Value stored to 'reason'
      is never read warning.
    - debian/patches/CVE-2019-14907-2.patch: do not print the failed to
      convert string into the logs.
    - CVE-2019-14907

 -- Marc Deslauriers <email address hidden> Fri, 17 Jan 2020 08:16:49 -0500

Source diff to previous version
CVE-2019-14907 Crash after failed character conversion at log level 3 or above

Version: 2:4.3.11+dfsg-0ubuntu0.16.04.24 2019-12-10 14:07:03 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.24) xenial-security; urgency=medium

  * SECURITY UPDATE: Samba AD DC zone-named record Denial of Service in DNS
    management server
    - debian/patches/CVE-2019-14861-1.patch: confirm sort behaviour in
      dcesrv_DnssrvEnumRecords.
    - debian/patches/CVE-2019-14861-2.patch: remove special case for @ in
      dns_build_tree().
    - debian/patches/CVE-2019-14861-3.patch: avoid crash in ldb_qsort() via
      dcesrv_DnssrvEnumRecords.
    - debian/patches/CVE-2019-14861-4.patch: test to demonstrate the bug.
    - CVE-2019-14861
  * SECURITY UPDATE: DelegationNotAllowed not being enforced in protocol
    transition on Samba AD DC
    - debian/patches/CVE-2019-14870-1.patch: add user-sensitive command to
      set not-delegated flag.
    - debian/patches/CVE-2019-14870-2.patch: heimdal: add S4U test for
      delegation_not_allowed.
    - debian/patches/CVE-2019-14870-3.patch: heimdal: enforce
      delegation_not_allowed in S4U2Self.
    - debian/patches/CVE-2019-14870-4.patch: mit-kdc: enforce
      delegation_not_allowed flag.
    - CVE-2019-14870

 -- Marc Deslauriers <email address hidden> Fri, 29 Nov 2019 11:22:44 -0500

CVE-2019-14861 RESERVED
CVE-2019-14870 RESERVED



About   -   Send Feedback to @ubuntu_updates