Debian 10229 Published by

The following Samba updates has been released for both Debian GNU/Linux 7 Extended LTS and Debian GNU/Linux 8 LTS:

ELA-66-1 samba security update
DLA 1607-1: samba security update



ELA-66-1 samba security update

Package: samba
Version: 2:3.6.6-6+deb7u18
Related CVE: CVE-2018-16851
Garming Sam of the Samba Team and Catalyst discovered a NULL pointer dereference vulnerability in the Samba AD DC LDAP server allowing a user able to read more than 256MB of LDAP entries to crash the Samba AD DC’s LDAP server.

For Debian 7 Wheezy, these problems have been fixed in version 2:3.6.6-6+deb7u18.

We recommend that you upgrade your samba packages.

Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/

DLA 1607-1: samba security update




Package : samba
Version : 2:4.2.14+dfsg-0+deb8u11
CVE ID : CVE-2018-14629 CVE-2018-16851

Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following issues:

CVE-2018-14629

Florian Stuelpner discovered that Samba is vulnerable to
infinite query recursion caused by CNAME loops, resulting in
denial of service.

CVE-2018-16851

Garming Sam of the Samba Team and Catalyst discovered a NULL pointer
dereference vulnerability in the Samba AD DC LDAP server allowing a
user able to read more than 256MB of LDAP entries to crash the Samba
AD DC's LDAP server.

For Debian 8 "Jessie", these problems have been fixed in version
2:4.2.14+dfsg-0+deb8u11.

We recommend that you upgrade your samba packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS