UbuntuUpdates.org

Package "libpam-winbind"

Name: libpam-winbind

Description:

Windows domain authentication integration plugin

Latest version: 2:4.10.7+dfsg-0ubuntu2.4
Release: eoan (19.10)
Level: updates
Repository: main
Head package: samba
Homepage: http://www.samba.org

Links

Save this URL for the latest version of "libpam-winbind": https://www.ubuntuupdates.org/libpam-winbind


Download "libpam-winbind"


Other versions of "libpam-winbind" in Eoan

Repository Area Version
base main 2:4.10.7+dfsg-0ubuntu2
security main 2:4.10.7+dfsg-0ubuntu2.4

Changelog

Version: 2:4.10.7+dfsg-0ubuntu2.4 2020-01-21 15:07:19 UTC

  samba (2:4.10.7+dfsg-0ubuntu2.4) eoan-security; urgency=medium

  * SECURITY UPDATE: replication of ACLs set to inherit down a subtree on
    AD Directory not automatic
    - debian/patches/CVE-2019-14902-1.patch: add test for replication of
      inherited security descriptors.
    - debian/patches/CVE-2019-14902-2.patch: add test for a special case
      around replicated renames.
    - debian/patches/CVE-2019-14902-3.patch: add test to confirm ACL
      inheritance really happens
    - debian/patches/CVE-2019-14902-4.patch: explain that
      descriptor_sd_propagation_recursive() is protected by a transaction.
    - debian/patches/CVE-2019-14902-5.patch: add comments explaining why SD
      propagation needs to be done here.
    - debian/patches/CVE-2019-14902-6.patch: ensure we honour both
      change->force_self and change->force_children.
    - debian/patches/CVE-2019-14902-7.patch: schedule SD propagation to a
      renamed DN.
    - debian/patches/CVE-2019-14902-8.patch: fix issue where inherited
      Security Descriptors were not replicated.
    - debian/patches/CVE-2019-14902-9.patch: set renamed = true (and so do
      SD inheritance) after any rename.
    - debian/patches/CVE-2019-14902-10.patch: change basis of descriptor module
      deferred processing to be GUIDs.
    - CVE-2019-14902
  * SECURITY UPDATE: Crash after failed character conversion at log level 3
    or above
    - debian/patches/CVE-2019-14907-1.patch: fix Value stored to 'reason'
      is never read warning.
    - debian/patches/CVE-2019-14907-2.patch: do not print the failed to
      convert string into the logs.
    - CVE-2019-14907
  * SECURITY UPDATE: Use after free during DNS zone scavenging in Samba AD DC
    - debian/patches/CVE-2019-19344.patch: fix use after free in
      dns_tombstone_records_zone.
    - CVE-2019-19344

 -- Marc Deslauriers <email address hidden> Tue, 14 Jan 2020 10:56:41 -0500

Source diff to previous version
CVE-2019-14902 Replication of ACLs set to inherit down a subtree on AD Directory not automatic
CVE-2019-14907 Crash after failed character conversion at log level 3 or above
CVE-2019-19344 Use after free during DNS zone scavenging in Samba AD DC

Version: 2:4.10.7+dfsg-0ubuntu2.3 2019-12-10 16:06:31 UTC

  samba (2:4.10.7+dfsg-0ubuntu2.3) eoan-security; urgency=medium

  * SECURITY UPDATE: Samba AD DC zone-named record Denial of Service in DNS
    management server
    - debian/patches/CVE-2019-14861-1.patch: confirm sort behaviour in
      dcesrv_DnssrvEnumRecords.
    - debian/patches/CVE-2019-14861-2.patch: remove special case for @ in
      dns_build_tree().
    - debian/patches/CVE-2019-14861-3.patch: avoid crash in ldb_qsort() via
      dcesrv_DnssrvEnumRecords.
    - debian/patches/CVE-2019-14861-4.patch: test to demonstrate the bug.
    - debian/patches/CVE-2019-14861-5.patch: reduce flapping in
      SambaToolDrsTests.test_samba_tool_replicate_local.
    - CVE-2019-14861
  * SECURITY UPDATE: DelegationNotAllowed not being enforced in protocol
    transition on Samba AD DC
    - debian/patches/CVE-2019-14870-1.patch: add user-sensitive command to
      set not-delegated flag.
    - debian/patches/CVE-2019-14870-2.patch: heimdal: add S4U test for
      delegation_not_allowed.
    - debian/patches/CVE-2019-14870-3.patch: heimdal: enforce
      delegation_not_allowed in S4U2Self.
    - debian/patches/CVE-2019-14870-4.patch: mit-kdc: enforce
      delegation_not_allowed flag.
    - CVE-2019-14870

 -- Marc Deslauriers <email address hidden> Fri, 29 Nov 2019 07:32:43 -0500

Source diff to previous version
CVE-2019-14861 RESERVED
CVE-2019-14870 RESERVED

Version: 2:4.10.7+dfsg-0ubuntu2.2 2019-10-29 13:06:32 UTC

  samba (2:4.10.7+dfsg-0ubuntu2.2) eoan-security; urgency=medium

  * SECURITY UPDATE: client code can return filenames containing path
    separators
    - debian/patches/CVE-2019-10218-1.patch: protect SMB1 client code
      from evil server returned names in source3/libsmb/clilist.c,
      source3/libsmb/proto.h.
    - debian/patches/CVE-2019-10218-2.patch: Protect SMB2 client code
      from evil server returned names in source3/libsmb/cli_smb2_fnum.c.
    - CVE-2019-10218
  * SECURITY UPDATE: Samba AD DC check password script does not receive the
    full password
    - debian/patches/CVE-2019-14833-1.patch: use utf8 characters in the
      unacceptable password in selftest/target/Samba4.pm.
    - debian/patches/CVE-2019-14833-2.patch: send full password to check
      password script in source4/dsdb/common/util.c.
    - CVE-2019-14833
  * SECURITY UPDATE: User with "get changes" permission can crash AD DC
    LDAP server via dirsync
    - debian/patches/CVE-2019-14847-1.patch: ensure attrs exist in
      source4/dsdb/samdb/ldb_modules/dirsync.c.
    - debian/patches/CVE-2019-14847-2.patch: demonstrate the correct
      interaction of ranged_results style attributes and dirsync in
      source4/dsdb/tests/python/dirsync.py.
    - debian/patches/CVE-2019-14847-3.patch: correct behaviour of
      ranged_results when combined with dirsync in
      source4/dsdb/samdb/ldb_modules/dirsync.c,
      source4/dsdb/samdb/ldb_modules/ranged_results.c.
    - CVE-2019-14847

 -- Marc Deslauriers <email address hidden> Mon, 21 Oct 2019 07:36:00 -0400




About   -   Send Feedback to @ubuntu_updates