USN-4167-2: Samba vulnerabilities
29 October 2019
Several security issues were fixed in Samba.
- samba - SMB/CIFS file, print, and login server for Unix
USN-4167-1 fixed several vulnerabilities in Samba. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
Michael Hanselmann discovered that the Samba client code incorrectly
handled path separators. If a user were tricked into connecting to a
malicious server, a remote attacker could use this issue to cause the
client to access local pathnames instead of network pathnames.
Adam Xu discovered that Samba incorrectly handled the dirsync LDAP control.
A remote attacker with "get changes" permissions could possibly use this
issue to cause Samba to crash, resulting in a denial of service. This issue
only affected Ubuntu 14.04 ESM. (CVE-2019-14847)
The problem can be corrected by updating your system to the following package versions:
In general, a standard system update will make all the necessary changes.
- USN-4167-1: libsmbclient-dev, samba-common-bin, registry-tools, samba-dev, libsmbclient, winbind, python-samba, ctdb, samba-vfs-modules, libwbclient0, libparse-pidl-perl, libwbclient-dev, samba-testsuite, samba-dsdb-modules, samba-libs, samba, smbclient, samba-common, libnss-winbind, libpam-winbind, python3-samba