Samba [Bug 13272] [SECURITY] CVE-2018-1057

Bug #1755059 reported by Andrew Bartlett on 2018-03-12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
samba (Ubuntu)
Status tracked in Bionic
Andreas Hasenack

Bug Description

Please ensure that Ubuntu includes the fixes for urgently as soon as the embargo is lifted. This is a serious issue.

Ideally also ensure that for the 4.7 series in 18.04 that you pick up the new 4.7.6 tarball and so avoid shipping (rather than just applying the patch).


Related branches

CVE References

Andrew Bartlett (abartlet) wrote :

Additionally, it seems Ubuntu is shipping Samba 4.3, to which patches have not been provided (as they don't backport cleanly) in 14.04 and 16.04.

Are you planning to simply upgrade Samba, otherwise there isn't much time to attempt a backport!

This is a very serious issue (CVSS 8.2)


CVSS Base Score:
Impact Subscore:
Exploitability Subscore:
CVSS Temporal Score:
CVSS Environmental Score:
Modified Impact Subscore:
Overall CVSS Score:

Tyler Hicks (tyhicks) wrote :

Hello! Updates for 17.10, 16.04 LTS, and 14.04 LTS have already been prepared and will be published on the day that the embargo is lifted. Thanks for reaching out to us.

Tyler Hicks (tyhicks) on 2018-03-13
information type: Private Security → Public Security
Tyler Hicks (tyhicks) wrote :

Updates were released for this issue:

Changed in samba (Ubuntu Trusty):
status: New → Fix Released
Changed in samba (Ubuntu Xenial):
status: New → Fix Released
Changed in samba (Ubuntu Artful):
status: New → Fix Released
Changed in samba (Ubuntu Trusty):
importance: Undecided → High
Changed in samba (Ubuntu Xenial):
importance: Undecided → High
Changed in samba (Ubuntu Artful):
importance: Undecided → High
Changed in samba (Ubuntu Bionic):
status: New → Triaged
importance: Undecided → High
Tyler Hicks (tyhicks) on 2018-03-13
Changed in samba (Ubuntu Bionic):
assignee: nobody → Andreas Hasenack (ahasenack)
summary: - Samba [Bug 13272] [SECURITY][EMBARGOED] CVE-2018-1057
+ Samba [Bug 13272] [SECURITY] CVE-2018-1057
Changed in samba (Ubuntu Bionic):
status: Triaged → In Progress
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package samba - 2:4.7.6+dfsg~ubuntu-0ubuntu1

samba (2:4.7.6+dfsg~ubuntu-0ubuntu1) bionic; urgency=medium

  * New upstream version:
    - Fix database corruption bug when upgrading from samba 4.6 or lower
      AD controllers (LP: #1755057)
    - Fix security issues: CVE-2018-1050 and CVE-2018-1057 (LP: #1755059)
  * Remaining changes:
    - debian/VERSION.patch: Update vendor string to "Ubuntu".
    - debian/smb.conf;
      + Add "(Samba, Ubuntu)" to server string.
      + Comment out the default [homes] share, and add a comment about
        "valid users = %s" to show users how to restrict access to
        \\server\username to only username.
    - debian/samba-common.config:
      + Do not change priority to high if dhclient3 is installed.
    - Add apport hook:
      + Created debian/
      + debian/rules, debian/samba-common-bin.install: install hook.
    - Add extra DEP8 tests to samba (LP #1696823):
      + d/t/control, d/t/cifs-share-access: access a file in a share using cifs
      + d/t/control, d/t/smbclient-anonymous-share-list: list available shares
      + d/t/control, d/t/smbclient-authenticated-share-list: list available
        shares using an authenticated connection
      + d/t/control, d/t/smbclient-share-access: create a share and download a
        file from it
    - d/samba-common.dhcp: If systemctl is available, use it to query the
      status of the smbd service before trying to reload it. Otherwise,
      keep the same check as before and reload the service based on the
      existence of the initscript. (LP #1579597)
    - d/control, d/rules: Disable glusterfs support because it's not in main.
      MIR bug is

 -- Andreas Hasenack <email address hidden> Tue, 13 Mar 2018 16:58:49 -0300

Changed in samba (Ubuntu Bionic):
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public Security information  Edit
Everyone can see this security related information.

Other bug subscribers