Mageia 2019-0286: samba security update
Summary
Updated samba packages fix security vulnerabilities:
A combination of parameters and permissions in smb.conf can allow user
to escape from the share path definition (CVE-2019-10197).
An authenticated user can crash the Samba AD DC's RPC server process via
a NULL pointer dereference (CVE-2019-12435)
An user with read access to the directory can cause a NULL pointer
dereference using the paged search control (CVE-2019-12436).
For other fixes in this update, see the referenced changelogs.
References
- https://bugs.mageia.org/show_bug.cgi?id=24980
- https://www.samba.org/samba/history/samba-4.10.5.html
- https://www.samba.org/samba/history/samba-4.10.6.html
- https://www.samba.org/samba/history/samba-4.10.7.html
- https://www.samba.org/samba/history/samba-4.10.8.html
- https://www.samba.org/samba/security/CVE-2019-12435.html
- https://www.samba.org/samba/security/CVE-2019-12436.html
- https://www.samba.org/samba/security/CVE-2019-10197.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12435
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12436
Resolution
MGASA-2019-0286 - Updated samba packages fix security vulnerabilities
SRPMS
- 7/core/samba-4.10.8-3.mga7