[USN-3827-2] Samba vulnerabilities

protocol=”application/pgp-signature”; boundary=”=-j71AKa5+VC760Xd/RgGi”

–=-j71AKa5+VC760Xd/RgGi

Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3827-2
November 27, 2018

samba vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in Samba.

Software Description:
– samba: SMB/CIFS file, print, and login server for Unix

Details:

USN-3827-1 fixed a vulnerability in samba. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

=C2=A0Florian Stuelpner discovered that Samba incorrectly handled CNAME
=C2=A0records. A remote attacker could use this issue to cause Samba to
=C2=A0crash, resulting in a denial of service. (CVE-2018-14629)

=C2=A0Alex MacCuish discovered that Samba incorrectly handled memory when
=C2=A0configured to accept smart-card authentication. A remote attacker
=C2=A0could possibly use this issue to cause Samba to crash, resulting in a
=C2=A0denial of service. (CVE-2018-16841)

=C2=A0Garming Sam discovered that Samba incorrectly handled memory when
=C2=A0processing LDAP searches. A remote attacker could possibly use this
=C2=A0issue to cause Samba to crash, resulting in a denial of service.=C2=
=A0
=C2=A0(CVE-2018-16851)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 samba=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A02:3.6.25-0ubuntu0.12.04.16

In general, a standard system update will make all the necessary
changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3827-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3827-1
=C2=A0 CVE-2018-14629, CVE-2018-16841, CVE-2018-16851
–=-j71AKa5+VC760Xd/RgGi

Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=SfyF
—–END PGP SIGNATURE—–

–=-j71AKa5+VC760Xd/RgGi–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK