Commit 1d1f8d15 authored by Lev Lamberov's avatar Lev Lamberov

[SECURITY] [DSA 4345-1] samba security update

parent 03e84770
<define-tag pagetitle>DSA-4345-1 samba</define-tag>
<define-tag report_date>2018-11-27</define-tag>
<define-tag secrefs>CVE-2018-14629 CVE-2018-16841 CVE-2018-16851</define-tag>
<define-tag packages>samba</define-tag>
<define-tag isvulnerable>yes</define-tag>
<define-tag fixed>yes</define-tag>
<define-tag fixed-section>no</define-tag>
#use wml::debian::security
<define-tag description>security update</define-tag>
<define-tag moreinfo>
<p>Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following issues:</p>
<li><a href="">CVE-2018-14629</a>
<p>Florian Stuelpner discovered that Samba is vulnerable to
infinite query recursion caused by CNAME loops, resulting in
denial of service.</p>
<p><a href="">\</a></p></li>
<li><a href="">CVE-2018-16841</a>
<p>Alex MacCuish discovered that a user with a valid certificate or
smart card can crash the Samba AD DC's KDC when configured to accept
smart-card authentication.</p>
<p><a href="">\</a></p></li>
<li><a href="">CVE-2018-16851</a>
<p>Garming Sam of the Samba Team and Catalyst discovered a NULL pointer
dereference vulnerability in the Samba AD DC LDAP server allowing a
user able to read more than 256MB of LDAP entries to crash the Samba
AD DC's LDAP server.</p>
<p><a href="">\</a></p></li>
<p>For the stable distribution (stretch), these problems have been fixed in
version 2:4.5.12+dfsg-2+deb9u4.</p>
<p>We recommend that you upgrade your samba packages.</p>
<p>For the detailed security status of samba please refer to its
security tracker page at:
<a href="">\</a></p>
# do not modify the following line
#include "$(ENGLISHDIR)/security/2018/"
# $Id: $
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment