Mageia 2020-0219: libntlm security update
Summary
Updated libntlm packages fix security vulnerability:
It was discovered that libntlm through 1.5 relies on a fixed buffer size
for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse
read and write operations, as demonstrated by a stack-based buffer
over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM
request (CVE-2019-17455).
References
- https://bugs.mageia.org/show_bug.cgi?id=26609
- https://www.debian.org/lts/security/2020/dla-2207
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17455
Resolution
MGASA-2020-0219 - Updated libntlm packages fix security vulnerability
SRPMS
- 7/core/libntlm-1.6-1.mga7