[USN-3827-1] Samba vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”BNy3EfcoJKkjU3qDKVsE86szOsIkzZw8r”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–BNy3EfcoJKkjU3qDKVsE86szOsIkzZw8r

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3827-1] Samba vulnerabilities

–fJiRGOee0xpV7mDmg7JGRBVKPpvwH5PdC

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3827-1
November 27, 2018

samba vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Samba.

Software Description:
– samba: SMB/CIFS file, print, and login server for Unix

Details:

Florian Stuelpner discovered that Samba incorrectly handled CNAME records=
=2E
A remote attacker could use this issue to cause Samba to crash, resulting=

in a denial of service. (CVE-2018-14629)

Alex MacCuish discovered that Samba incorrectly handled memory when
configured to accept smart-card authentication. A remote attacker could
possibly use this issue to cause Samba to crash, resulting in a denial of=

service. (CVE-2018-16841)

Garming Sam discovered that Samba incorrectly handled memory when
processing LDAP searches. A remote attacker could possibly use this issue=

to cause Samba to crash, resulting in a denial of service. (CVE-2018-1685=
1)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
samba 2:4.8.4+dfsg-2ubuntu2.1

Ubuntu 18.04 LTS:
samba 2:4.7.6+dfsg~ubuntu-0ubuntu2.5

Ubuntu 16.04 LTS:
samba 2:4.3.11+dfsg-0ubuntu0.16.04.18

Ubuntu 14.04 LTS:
samba 2:4.3.11+dfsg-0ubuntu0.14.04.19

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3827-1
CVE-2018-14629, CVE-2018-16841, CVE-2018-16851

Package Information:
https://launchpad.net/ubuntu/+source/samba/2:4.8.4+dfsg-2ubuntu2.1
https://launchpad.net/ubuntu/+source/samba/2:4.7.6+dfsg~ubuntu-0ubuntu2=
=2E5
https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04=
=2E18
https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.14.04=
=2E19

–fJiRGOee0xpV7mDmg7JGRBVKPpvwH5PdC–

–BNy3EfcoJKkjU3qDKVsE86szOsIkzZw8r

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=UFEP
—–END PGP SIGNATURE—–

–BNy3EfcoJKkjU3qDKVsE86szOsIkzZw8r–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK