Your submission was sent successfully! Close

USN-5260-3: Samba vulnerability

3 February 2022

Samba could be made to crash when handled certain memory operations.

Releases

Packages

  • samba - SMB/CIFS file, print, and login server for Unix

Details

USN-5260-1 fixed a vulnerability in Samba. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Orange Tsai discovered that the Samba vfs_fruit module incorrectly handled
certain memory operations. A remote attacker could use this issue to cause
Samba to crash, resulting in a denial of service, or possibly execute
arbitrary code as root. (CVE-2021-44142)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04
Ubuntu 14.04

This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.

References

Related notices

  • USN-5260-1: libnss-winbind, libsmbclient, python3-samba, libwbclient0, libwbclient-dev, samba-dev, registry-tools, ctdb, samba-vfs-modules, samba-common, libpam-winbind, libsmbclient-dev, winbind, samba-common-bin, samba-dsdb-modules, samba-testsuite, samba, samba-libs, smbclient
  • USN-5260-2: libnss-winbind, libsmbclient, libwbclient0, libwbclient-dev, samba-dev, registry-tools, ctdb, samba-vfs-modules, samba-common, libpam-winbind, libsmbclient-dev, samba-common-bin, winbind, samba-dsdb-modules, libparse-pidl-perl, samba-testsuite, samba, samba-libs, smbclient, python-samba