Your submission was sent successfully! Close

USN-4167-2: Samba vulnerabilities

29 October 2019

Several security issues were fixed in Samba.



  • samba - SMB/CIFS file, print, and login server for Unix


USN-4167-1 fixed several vulnerabilities in Samba. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

Michael Hanselmann discovered that the Samba client code incorrectly
handled path separators. If a user were tricked into connecting to a
malicious server, a remote attacker could use this issue to cause the
client to access local pathnames instead of network pathnames.

Adam Xu discovered that Samba incorrectly handled the dirsync LDAP control.
A remote attacker with "get changes" permissions could possibly use this
issue to cause Samba to crash, resulting in a denial of service. This issue
only affected Ubuntu 14.04 ESM. (CVE-2019-14847)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04
Ubuntu 12.04

In general, a standard system update will make all the necessary changes.

Related notices

  • USN-4167-1: libsmbclient-dev, samba-common-bin, registry-tools, samba-dev, libsmbclient, winbind, python-samba, ctdb, samba-vfs-modules, libwbclient0, libparse-pidl-perl, libwbclient-dev, samba-testsuite, samba-dsdb-modules, samba-libs, samba, smbclient, samba-common, libnss-winbind, libpam-winbind, python3-samba