USN-3976-1: Samba vulnerability
14 May 2019
Samba could allow unintended access to network services.
Releases
Packages
- samba - SMB/CIFS file, print, and login server for Unix
Details
Isaac Boukris and Andrew Bartlett discovered that Samba incorrectly checked
S4U2Self packets. In certain environments, a remote attacker could possibly
use this issue to escalate privileges.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04
Ubuntu 18.10
Ubuntu 18.04
Ubuntu 16.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3976-2: libsmbsharemodes0, smbclient, samba-libs, samba-doc-pdf, samba-dsdb-modules, samba-vfs-modules, samba-common, libwbclient0, registry-tools, samba-testsuite, libsmbclient-dev, winbind, libsmbclient, libparse-pidl-perl, libwbclient-dev, samba-doc, swat, samba-dev, samba-tools, libpam-smbpass, python-samba, libnss-winbind, libpam-winbind, samba-common-bin, libsmbsharemodes-dev, samba
- USN-5675-1: libwind0-heimdal, libasn1-8-heimdal, libroken18-heimdal, heimdal-kdc, heimdal-servers, libheimbase1-heimdal, heimdal, heimdal-multidev, libkafs0-heimdal, libhdb9-heimdal, libheimntlm0-heimdal, libkdc2-heimdal, heimdal-dev, libsl0-heimdal, libhcrypto4-heimdal, heimdal-clients, heimdal-docs, libkadm5clnt7-heimdal, libotp0-heimdal, libgssapi3-heimdal, libkadm5srv8-heimdal, heimdal-clients-x, libkrb5-26-heimdal, heimdal-servers-x, heimdal-kcm, libhx509-5-heimdal