Mageia 2019-0397: samba security update
Summary
Updated samba packages fix security vulnerabilities:
Malicious servers can cause Samba client code to return filenames
containing path separators to calling code (CVE-2019-10218).
When the password contains multi-byte (non-ASCII) characters, the
check password script does not receive the full password string
(CVE-2019-14833).
Users with the "get changes" extended access right can crash the AD
DC LDAP server by requesting an attribute using the range= syntax
(CVE-2019-14847).
An authenticated user can crash the DCE/RPC DNS management server by
creating records with matching the zone name (CVE-2019-14861).
The DelegationNotAllowed Kerberos feature restriction was not being
applied when processing protocol transition requests (S4U2Self), in
the AD DC KDC (CVE-2019-14870).
References
- https://bugs.mageia.org/show_bug.cgi?id=25644
- https://www.samba.org/samba/history/samba-4.10.9.html
- https://www.samba.org/samba/history/samba-4.10.10.html
- https://www.samba.org/samba/history/samba-4.10.11.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14833
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14847
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870
Resolution
MGASA-2019-0397 - Updated samba packages fix security vulnerabilities
SRPMS
- 7/core/ldb-1.5.6-1.mga7
- 7/core/samba-4.10.11-1.mga7