Package "winbind"

Name: winbind


service to resolve user and group information from Windows NT servers

Latest version: 2:4.13.14+dfsg-0ubuntu0.20.04.1
Release: focal (20.04)
Level: security
Repository: main
Head package: samba
Homepage: http://www.samba.org


Download "winbind"

Other versions of "winbind" in Focal

Repository Area Version
base main 2:4.11.6+dfsg-0ubuntu1
updates main 2:4.13.14+dfsg-0ubuntu0.20.04.2


Version: 2:4.11.6+dfsg-0ubuntu1.3 2020-07-02 15:08:00 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.3) focal-security; urgency=medium

  * SECURITY UPDATE: NULL pointer de-reference and use-after-free in Samba
    AD DC LDAP Server with ASQ, VLV and paged_results
    - debian/patches/CVE-2020-10730-*.patch: multiple upstream patches to
      fix the issue.
    - CVE-2020-10730
  * SECURITY UPDATE: Parsing and packing of NBT and DNS packets can consume
    excessive CPU
    - debian/patches/CVE-2020-10745-*.patch: multiple upstream patches to
      fix the issue.
    - CVE-2020-10745
  * SECURITY UPDATE: LDAP Use-after-free in Samba AD DC Global Catalog with
    paged_results and VLV
    - debian/patches/CVE-2020-10760-*.patch: multiple upstream patches to
      fix the issue.
    - CVE-2020-10760

 -- Marc Deslauriers <email address hidden> Fri, 19 Jun 2020 08:34:26 -0400

Source diff to previous version

Version: 2:4.11.6+dfsg-0ubuntu1.1 2020-04-28 18:07:33 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.1) focal-security; urgency=medium

  * SECURITY UPDATE: Use-after-free in AD DC LDAP server
    - debian/patches/CVE-2020-10700-1.patch: add test for ASQ and ASQ in
      combination with paged_results in selftest/knownfail.d/asq,
      source4/dsdb/tests/python/asq.py, source4/selftest/tests.py.
    - debian/patches/CVE-2020-10700-3.patch: do not permit the ASQ control
      for the GUID search in paged_results in selftest/knownfail.d/asq,
    - debian/control: bump libldb-dev, python3-ldb, and python3-ldb-dev
      Build-Depends to 2.0.10.
    - CVE-2020-10700
  * SECURITY UPDATE: Stack overflow in AD DC LDAP server
    - debian/patches/CVE-2020-10704-1.patch: add ASN.1 max tree depth in
      auth/gensec/gensec_util.c, lib/util/asn1.c, lib/util/asn1.h,
      lib/util/tests/asn1_tests.c, libcli/auth/spnego_parse.c,
      libcli/cldap/cldap.c, libcli/ldap/ldap_message.c,
      source3/lib/tldap.c, source3/lib/tldap_util.c,
      source3/libsmb/clispnego.c, source3/torture/torture.c,
      source4/auth/gensec/gensec_krb5.c, source4/ldap_server/ldap_server.c,
    - debian/patches/CVE-2020-10704-3.patch: check parse tree depth in
    - debian/patches/CVE-2020-10704-5.patch: add max ldap request sizes in
      lib/param/loadparm.c, source3/param/loadparm.c.
    - debian/patches/CVE-2020-10704-6.patch: limit request sizes in
    - debian/patches/CVE-2020-10704-7.patch: add search size limits to
      ldap_decode in docs-xml/smbdotconf/ldap/ldapmaxsearchrequest.xml,
      lib/param/loadparm.c, libcli/cldap/cldap.c,
      libcli/ldap/ldap_message.c, libcli/ldap/ldap_message.h,
      source3/param/loadparm.c, source4/ldap_server/ldap_server.c,
    - debian/patches/CVE-2020-10704-8.patch: check search request lengths
      in lib/util/asn1.c, lib/util/asn1.h, libcli/ldap/ldap_message.c.
    - CVE-2020-10704

 -- Marc Deslauriers <email address hidden> Fri, 24 Apr 2020 08:08:38 -0400

About   -   Send Feedback to @ubuntu_updates