Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1538771 - (CVE-2018-1050) CVE-2018-1050 samba: NULL pointer dereference in printer server process
CVE-2018-1050 samba: NULL pointer dereference in printer server process
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20180313,reported=2...
: Security
Depends On: 1554753 1551924 1552004 1552005 1553018 1553031 1554754 1564433
Blocks: 1538774
  Show dependency treegraph
 
Reported: 2018-01-25 14:37 EST by Pedro Sampaio
Modified: 2018-10-30 03:26 EDT (History)
19 users (show)

See Also:
Fixed In Version: samba 4.7.6, samba 4.6.14, samba 4.5.16
Doc Type: If docs needed, set a value
Doc Text:
A null pointer dereference flaw was found in Samba RPC external printer service. An attacker could use this flaw to cause the printer spooler service to crash.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:1860 None None None 2018-06-19 00:49 EDT
Red Hat Product Errata RHSA-2018:1883 None None None 2018-06-19 00:50 EDT
Red Hat Product Errata RHSA-2018:2612 None None None 2018-09-04 02:31 EDT
Red Hat Product Errata RHSA-2018:2613 None None None 2018-09-04 02:29 EDT
Red Hat Product Errata RHSA-2018:3056 None None None 2018-10-30 03:26 EDT

  None (edit)
Description Pedro Sampaio 2018-01-25 14:37:41 EST
A flaw was found in Samba. A null pointer indirection in the printer server process may lead to denial of service.

Upstream bug:

https://bugzilla.samba.org/show_bug.cgi?id=11343
Comment 1 Pedro Sampaio 2018-01-25 14:37:47 EST
Acknowledgments:

Name: the Samba project
Comment 2 Huzaifa S. Sidhpurwala 2018-02-16 02:02:57 EST
Mitigation:

Ensure the paramter:
rpc_server:spoolss = external
is not set in the [global] section of your smb.conf.
Comment 6 Huzaifa S. Sidhpurwala 2018-03-13 06:13:22 EDT
External References:

https://www.samba.org/samba/security/CVE-2018-1050.html
Comment 7 Huzaifa S. Sidhpurwala 2018-03-13 06:14:27 EDT
Created samba tracking bugs for this issue:

Affects: fedora-all [bug 1554754]
Comment 10 errata-xmlrpc 2018-06-19 00:49:43 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:1860 https://access.redhat.com/errata/RHSA-2018:1860
Comment 11 errata-xmlrpc 2018-06-19 00:50:06 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:1883 https://access.redhat.com/errata/RHSA-2018:1883
Comment 12 errata-xmlrpc 2018-09-04 02:29:03 EDT
This issue has been addressed in the following products:

  Red Hat Gluster Storage 3.4 for RHEL 7

Via RHSA-2018:2613 https://access.redhat.com/errata/RHSA-2018:2613
Comment 13 errata-xmlrpc 2018-09-04 02:31:41 EDT
This issue has been addressed in the following products:

  Red Hat Gluster Storage 3.4 for RHEL 6

Via RHSA-2018:2612 https://access.redhat.com/errata/RHSA-2018:2612
Comment 14 errata-xmlrpc 2018-10-30 03:25:57 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3056 https://access.redhat.com/errata/RHSA-2018:3056

Note You need to log in before you can comment on or make changes to this bug.