USN-3426-2: Samba vulnerabilities
2 November 2017
Several security issues were fixed in XXX-APP-XXX.
Releases
Packages
- samba - SMB/CIFS file, print, and login server for Unix
Details
USN-3426-1 fixed several vulnerabilities in Samba. This update
provides the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
Stefan Metzmacher discovered that Samba incorrectly enforced SMB signing in
certain situations. A remote attacker could use this issue to perform a
machine-in-the-middle attack. (CVE-2017-12150)
Yihan Lian and Zhibin Hu discovered that Samba incorrectly handled memory
when SMB1 is being used. A remote attacker could possibly use this issue to
obtain server memory contents. (CVE-2017-12163)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3426-1: samba-libs, samba-dsdb-modules, libsmbsharemodes0, python-samba, smbclient, libpam-smbpass, libnss-winbind, libparse-pidl-perl, libsmbclient-dev, ctdb, samba-dev, libwbclient-dev, libwbclient0, winbind, libpam-winbind, libsmbclient, registry-tools, samba-doc, samba-common-bin, samba-vfs-modules, libsmbsharemodes-dev, samba, samba-common, samba-testsuite