UbuntuUpdates.org

Package "registry-tools"

Name: registry-tools

Description:

tools for viewing and manipulating the Windows registry

Latest version: 2:4.3.11+dfsg-0ubuntu0.16.04.31
Release: xenial (16.04)
Level: updates
Repository: universe
Head package: samba
Homepage: http://www.samba.org

Links


Download "registry-tools"


Other versions of "registry-tools" in Xenial

Repository Area Version
base universe 2:4.3.8+dfsg-0ubuntu1
security universe 2:4.3.11+dfsg-0ubuntu0.16.04.31

Changelog

Version: 2:4.3.11+dfsg-0ubuntu0.16.04.31 2020-09-30 15:07:17 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.31) xenial-security; urgency=medium

  * SECURITY UPDATE: Unauthenticated domain controller compromise by
    subverting Netlogon cryptography (ZeroLogon)
    - debian/patches/zerologon-*.patch: backport upstream patches:
      + For compatibility reasons, allow specifying an insecure netlogon
        configuration per machine. See the following link for examples:
        https://www.samba.org/samba/security/CVE-2020-1472.html
      + Add additional server checks for the protocol attack in the
        client-specified challenge to provide some protection when
        'server schannel = no/auto' and avoid the false-positive results
        when running the proof-of-concept exploit.
    - CVE-2020-1472

 -- Marc Deslauriers <email address hidden> Thu, 24 Sep 2020 19:25:08 -0400

Source diff to previous version
CVE-2020-1472 An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, u

Version: 2:4.3.11+dfsg-0ubuntu0.16.04.30 2020-09-17 13:06:22 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.30) xenial-security; urgency=medium

  * SECURITY UPDATE: Unauthenticated domain controller compromise by
    subverting Netlogon cryptography
    - debian/patches/CVE-2020-1472-1.patch: switch "client schannel"
      default to "yes" instead of "auto".
    - debian/patches/CVE-2020-1472-2.patch: switch "server schannel"
      default to "yes" instead of "auto".
    - CVE-2020-1472

 -- Marc Deslauriers <email address hidden> Wed, 16 Sep 2020 09:11:44 -0400

Source diff to previous version
CVE-2020-1472 An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, u

Version: 2:4.3.11+dfsg-0ubuntu0.16.04.29 2020-08-10 16:06:28 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.29) xenial-security; urgency=medium

  * SECURITY UPDATE: Empty UDP packet DoS in Samba AD DC nbtd
    - debian/patches/CVE-2020-14303.patch: fix busy loop on empty UDP
      packet in libcli/nbt/nbtsocket.c.
    - CVE-2020-14303

 -- Marc Deslauriers <email address hidden> Fri, 07 Aug 2020 13:39:56 -0400

Source diff to previous version
CVE-2020-14303 A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP

Version: 2:4.3.11+dfsg-0ubuntu0.16.04.28 2020-07-02 15:07:45 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.28) xenial-security; urgency=medium

  * SECURITY UPDATE: Parsing and packing of NBT and DNS packets can consume
    excessive CPU
    - debian/patches/CVE-2020-10745-*.patch: multiple upstream patches to
      fix the issue.
    - CVE-2020-10745

 -- Marc Deslauriers <email address hidden> Fri, 19 Jun 2020 09:04:51 -0400

Source diff to previous version

Version: 2:4.3.11+dfsg-0ubuntu0.16.04.27 2020-04-29 15:28:00 UTC

  samba (2:4.3.11+dfsg-0ubuntu0.16.04.27) xenial-security; urgency=medium

  * SECURITY REGRESSION: new LDAP options not recognized (LP: #1875798)
    - debian/patches/CVE-2020-10704-3.patch: move options to appropriate
      location in lib/param/loadparm.c.
    - debian/patches/CVE-2020-10704-5.patch: move option to appropriate
      location in lib/param/loadparm.c.
    - debian/patches/CVE-2020-10704-7.patch: add new options to param_table
      in lib/param/param_table.c.

 -- Marc Deslauriers <email address hidden> Wed, 29 Apr 2020 07:50:47 -0400

1875798 Samba 2:4.3.11+dfsg-0ubuntu0.16.04.26: LDAP request size (81) exceeds (0)



About   -   Send Feedback to @ubuntu_updates