USN-5260-3: Samba vulnerability
3 February 2022
Samba could be made to crash when handled certain memory operations.
Releases
Packages
- samba - SMB/CIFS file, print, and login server for Unix
Details
USN-5260-1 fixed a vulnerability in Samba. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Orange Tsai discovered that the Samba vfs_fruit module incorrectly handled
certain memory operations. A remote attacker could use this issue to cause
Samba to crash, resulting in a denial of service, or possibly execute
arbitrary code as root. (CVE-2021-44142)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
samba
-
2:4.3.11+dfsg-0ubuntu0.16.04.34+esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
samba
-
2:4.3.11+dfsg-0ubuntu0.14.04.20+esm12
Available with Ubuntu Pro
This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.
References
Related notices
- USN-5260-1: libpam-winbind, libwbclient0, python3-samba, registry-tools, samba-common, libsmbclient, winbind, samba-libs, samba-dsdb-modules, smbclient, libnss-winbind, samba-common-bin, samba-dev, samba-vfs-modules, libwbclient-dev, libsmbclient-dev, ctdb, samba, samba-testsuite
- USN-5260-2: libpam-winbind, python-samba, libwbclient0, registry-tools, samba-common, libsmbclient, winbind, samba-libs, samba-dsdb-modules, smbclient, libnss-winbind, samba-common-bin, samba-dev, samba-vfs-modules, libwbclient-dev, libsmbclient-dev, ctdb, samba, samba-testsuite, libparse-pidl-perl