UbuntuUpdates.org

Package "winbind"

Name: winbind

Description:

service to resolve user and group information from Windows NT servers

Latest version: 2:4.11.6+dfsg-0ubuntu1.10
Release: focal (20.04)
Level: updates
Repository: main
Head package: samba
Homepage: http://www.samba.org

Links


Download "winbind"


Other versions of "winbind" in Focal

Repository Area Version
base main 2:4.11.6+dfsg-0ubuntu1
security main 2:4.11.6+dfsg-0ubuntu1.8

Changelog

Version: 2:4.11.6+dfsg-0ubuntu1.10 2021-08-27 00:06:21 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.10) focal; urgency=medium

  * d/p/fix-double-free-with-unresolved-credentia-cache.patch: Fix
    double free with unresolved credential cache. (LP: #1892145)

 -- Paride Legovini <email address hidden> Fri, 06 Aug 2021 14:17:29 +0200

Source diff to previous version
1892145 [SRU] smbclient cannot connect anonymously in Kerberos context (freeipa)

Version: 2:4.11.6+dfsg-0ubuntu1.9 2021-06-14 15:06:21 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.9) focal; urgency=medium

  * Fix samba-common-bin postinst errors (LP: #1905387)
    - d/rules: ensure systemd-tmpfiles runs for samba-common-bin postinst
      through dh_installsystemd
    - d/samba-common-bin.postinst: ensure systemd-tmpfiles is called before
      testparm
    - d/t/reinstall-samba-common-bin: make sure /run/samba is created by the
      samba-common-bin installation process (postinst script)
    - d/t/control: run new reinstall-samba-common-bin test case

 -- Athos Ribeiro <email address hidden> Mon, 24 May 2021 16:45:27 -0300

Source diff to previous version
1905387 samba-common-bin should call systemd-tmpfiles before testparm

Version: 2:4.11.6+dfsg-0ubuntu1.8 2021-04-29 20:08:21 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.8) focal-security; urgency=medium

  * SECURITY UPDATE: wrong group entries via negative idmap cache entries
    - debian/patches/CVE-2021-20254.patch: Simplify sids_to_unixids() in
      source3/passdb/lookup_sid.c.
    - CVE-2021-20254

 -- Marc Deslauriers <email address hidden> Wed, 14 Apr 2021 07:02:48 -0400

Source diff to previous version
CVE-2021-20254 Negative idmap cache entries can cause incorrect group entries in the Samba file server process token

Version: 2:4.11.6+dfsg-0ubuntu1.6 2020-11-02 17:06:29 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.6) focal-security; urgency=medium

  * SECURITY UPDATE: Missing handle permissions check in ChangeNotify
    - debian/patches/CVE-2020-14318-*.patch: ensure change notifies can't
      get set unless the directory handle is open for SEC_DIR_LIST in
      source4/torture/smb2/notify.c, source3/smbd/notify.c.
    - CVE-2020-14318
  * SECURITY UPDATE: Unprivileged user can crash winbind
    - debian/patches/CVE-2020-14323-*.patch: fix invalid lookupsids DoS in
      source3/winbindd/winbindd_lookupsids.c,
      source4/torture/winbind/struct_based.c.
    - CVE-2020-14323
  * SECURITY UPDATE: DNS server crash via invalid records
    - debian/patches/CVE-2020-14383-*.patch: ensure variable initialization
      with NULL and do not crash when additional data not found in
      source4/rpc_server/dnsserver/dcerpc_dnsserver.c.
    - CVE-2020-14383

 -- Marc Deslauriers <email address hidden> Fri, 16 Oct 2020 06:48:54 -0400

Source diff to previous version
CVE-2020-14318 Missing handle permissions check in SMB1/2/3 ChangeNotify
CVE-2020-14323 A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could
CVE-2020-14383 An authenticated user can crash the DCE/RPC DNS with easily crafted records

Version: 2:4.11.6+dfsg-0ubuntu1.5 2020-09-30 15:07:23 UTC

  samba (2:4.11.6+dfsg-0ubuntu1.5) focal-security; urgency=medium

  * SECURITY UPDATE: Unauthenticated domain controller compromise by
    subverting Netlogon cryptography (ZeroLogon)
    - debian/patches/zerologon-*.patch: backport upstream patches:
      + For compatibility reasons, allow specifying an insecure netlogon
        configuration per machine. See the following link for examples:
        https://www.samba.org/samba/security/CVE-2020-1472.html
      + Add additional server checks for the protocol attack in the
        client-specified challenge to provide some protection when
        'server schannel = no/auto' and avoid the false-positive results
        when running the proof-of-concept exploit.
    - CVE-2020-1472

 -- Marc Deslauriers <email address hidden> Fri, 18 Sep 2020 12:33:05 -0400

CVE-2020-1472 An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, u



About   -   Send Feedback to @ubuntu_updates