UbuntuUpdates.org

Package "libwbclient0"

Name: libwbclient0

Description:

Samba winbind client library

Latest version: 2:4.7.6+dfsg~ubuntu-0ubuntu2.13
Release: bionic (18.04)
Level: security
Repository: main
Head package: samba
Homepage: http://www.samba.org

Links

Save this URL for the latest version of "libwbclient0": https://www.ubuntuupdates.org/libwbclient0


Download "libwbclient0"


Other versions of "libwbclient0" in Bionic

Repository Area Version
base main 2:4.7.6+dfsg~ubuntu-0ubuntu2
updates main 2:4.7.6+dfsg~ubuntu-0ubuntu2.13

Changelog

Version: 2:4.7.6+dfsg~ubuntu-0ubuntu2.13 2019-10-29 13:06:23 UTC

  samba (2:4.7.6+dfsg~ubuntu-0ubuntu2.13) bionic-security; urgency=medium

  * SECURITY UPDATE: client code can return filenames containing path
    separators
    - debian/patches/CVE-2019-10218-1.patch: protect SMB1 client code
      from evil server returned names in source3/libsmb/clilist.c,
      source3/libsmb/proto.h.
    - debian/patches/CVE-2019-10218-2.patch: Protect SMB2 client code
      from evil server returned names in source3/libsmb/cli_smb2_fnum.c.
    - CVE-2019-10218
  * SECURITY UPDATE: Samba AD DC check password script does not receive the
    full password
    - debian/patches/CVE-2019-14833-1.patch: use utf8 characters in the
      unacceptable password in selftest/target/Samba4.pm.
    - debian/patches/CVE-2019-14833-2.patch: send full password to check
      password script in source4/dsdb/common/util.c.
    - CVE-2019-14833
  * SECURITY UPDATE: User with "get changes" permission can crash AD DC
    LDAP server via dirsync
    - debian/patches/CVE-2019-14847-1.patch: ensure attrs exist in
      source4/dsdb/samdb/ldb_modules/dirsync.c.
    - debian/patches/CVE-2019-14847-2.patch: demonstrate the correct
      interaction of ranged_results style attributes and dirsync in
      source4/dsdb/tests/python/dirsync.py.
    - debian/patches/CVE-2019-14847-3.patch: correct behaviour of
      ranged_results when combined with dirsync in
      source4/dsdb/samdb/ldb_modules/dirsync.c,
      source4/dsdb/samdb/ldb_modules/ranged_results.c.
    - CVE-2019-14847

 -- Marc Deslauriers <email address hidden> Mon, 21 Oct 2019 08:45:35 -0400

Source diff to previous version

Version: 2:4.7.6+dfsg~ubuntu-0ubuntu2.11 2019-05-27 13:06:21 UTC

  samba (2:4.7.6+dfsg~ubuntu-0ubuntu2.11) bionic-security; urgency=medium

  * SECURITY REGRESSION: panics following recent update (LP: #1827924)
    - debian/patches/bug13315.patch: do not crash if we fail to init the
      session table in source3/smbd/negprot.c.

 -- Marc Deslauriers <email address hidden> Thu, 23 May 2019 08:06:42 -0400

Source diff to previous version
1827924 Panic or segfault in Samba

Version: 2:4.7.6+dfsg~ubuntu-0ubuntu2.10 2019-05-14 13:07:19 UTC

  samba (2:4.7.6+dfsg~ubuntu-0ubuntu2.10) bionic-security; urgency=medium

  * SECURITY UPDATE: Samba AD DC S4U2Self/S4U2Proxy unkeyed checksum
    - debian/patches/CVE-2018-16860-1.patch: add test for S4U2Self with
      unkeyed checksum in selftest/knownfail.d/mitm-s4u2self,
      source4/torture/krb5/kdc-canon-heimdal.c.
    - debian/patches/CVE-2018-16860-2.patch: reject PA-S4U2Self with
      unkeyed checksum in selftest/knownfail.d/mitm-s4u2self,
      source4/heimdal/kdc/krb5tgs.c.
    - CVE-2018-16860

 -- Marc Deslauriers <email address hidden> Wed, 08 May 2019 09:42:29 -0400

Source diff to previous version
CVE-2018-16860 Samba AD DC S4U2Self/S4U2Proxy unkeyed checksum

Version: 2:4.7.6+dfsg~ubuntu-0ubuntu2.9 2019-04-08 14:07:06 UTC

  samba (2:4.7.6+dfsg~ubuntu-0ubuntu2.9) bionic-security; urgency=medium

  * SECURITY UPDATE: save registry file outside share as unprivileged user
    - debian/patches/CVE-2019-3880.patch: remove implementations of
      SaveKey/RestoreKey in source3/rpc_server/winreg/srv_winreg_nt.c.
    - CVE-2019-3880

 -- Marc Deslauriers <email address hidden> Thu, 04 Apr 2019 14:05:56 -0400

Source diff to previous version
CVE-2019-3880 Save registry file outside share as unprivileged user

Version: 2:4.7.6+dfsg~ubuntu-0ubuntu2.5 2018-11-27 14:07:17 UTC

  samba (2:4.7.6+dfsg~ubuntu-0ubuntu2.5) bionic-security; urgency=medium

  * SECURITY UPDATE: Unprivileged adding of CNAME record causing loop in AD
    Internal DNS server
    - debian/patches/CVE-2018-14629.patch: add CNAME loop prevention using
      counter in python/samba/tests/dns.py, selftest/knownfail.d/dns,
      source4/dns_server/dns_query.c.
    - CVE-2018-14629
  * SECURITY UPDATE: Double-free in Samba AD DC KDC with PKINIT
    - debian/patches/CVE-2018-16841-1.patch: fix segfault on PKINIT with
      mis-matching principal in source4/kdc/db-glue.c.
    - debian/patches/CVE-2018-16841-2.patch: check for mismatching
      principal in testprogs/blackbox/test_pkinit_heimdal.sh.
    - CVE-2018-16841
  * SECURITY UPDATE: NULL pointer de-reference in Samba AD DC LDAP server
    - debian/patches/CVE-2018-16851.patch: check ret before manipulating
      blob in source4/ldap_server/ldap_server.c.
    - CVE-2018-16851

 -- Marc Deslauriers <email address hidden> Fri, 16 Nov 2018 08:19:35 -0500

CVE-2018-14629 Unprivileged adding of CNAME record causing loop in AD Internal DNS server
CVE-2018-16841 Double-free in Samba AD DC KDC with PKINIT
CVE-2018-16851 NULL pointer de-reference in Samba AD DC LDAP server



About   -   Send Feedback to @ubuntu_updates