USN-4167-2: Samba vulnerabilities
29 October 2019
Several security issues were fixed in Samba.
Releases
Packages
- samba - SMB/CIFS file, print, and login server for Unix
Details
USN-4167-1 fixed several vulnerabilities in Samba. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
Michael Hanselmann discovered that the Samba client code incorrectly
handled path separators. If a user were tricked into connecting to a
malicious server, a remote attacker could use this issue to cause the
client to access local pathnames instead of network pathnames.
(CVE-2019-10218)
Adam Xu discovered that Samba incorrectly handled the dirsync LDAP control.
A remote attacker with "get changes" permissions could possibly use this
issue to cause Samba to crash, resulting in a denial of service. This issue
only affected Ubuntu 14.04 ESM. (CVE-2019-14847)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
Ubuntu 12.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4167-1: libpam-winbind, python-samba, libwbclient0, python3-samba, registry-tools, samba-common, libsmbclient, winbind, samba-libs, samba-dsdb-modules, smbclient, libnss-winbind, samba-common-bin, samba-dev, samba-vfs-modules, libwbclient-dev, libsmbclient-dev, ctdb, samba, samba-testsuite, libparse-pidl-perl