Mageia 2020-0058: samba security update
Summary
The implementation of ACL inheritance in the Samba AD DC was not
complete, and so absent a 'full-sync' replication, ACLs could get out of
sync between domain controllers (CVE-2019-14902).
When processing untrusted string input Samba can read past the end of
the allocated buffer when printing a "Conversion error" message to the
logs. This can cause a crash after the failed character conversion when
operating at log level 3 or above (CVE-2019-14907).
During DNS zone scavenging (of expired dynamic entries) in a Samba AD
DC, there is a read of memory after it has been freed (CVE-2019-19344).
Note that manual intervention is required to fully implement the fix
for CVE-2019-14902. See the upstream advisory for details.
References
- https://bugs.mageia.org/show_bug.cgi?id=26113
- https://ubuntu.com/security/notices/USN-4244-1
- https://www.samba.org/samba/security/CVE-2019-14902.html
- https://www.samba.org/samba/security/CVE-2019-14907.html
- https://www.samba.org/samba/security/CVE-2019-19344.html
- https://www.samba.org/samba/history/samba-4.10.12.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14902
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19344
Resolution
MGASA-2020-0058 - Updated samba packages fix security vulnerabilities
SRPMS
- 7/core/samba-4.10.12-1.mga7