Updated samba packages fix security vulnerabilities
Publication date: 21 Sep 2019Modification date: 20 Oct 2019
Type: security
Affected Mageia releases : 7
CVE: CVE-2019-10197 , CVE-2019-12435 , CVE-2019-12436
Description
Updated samba packages fix security vulnerabilities: A combination of parameters and permissions in smb.conf can allow user to escape from the share path definition (CVE-2019-10197). An authenticated user can crash the Samba AD DC's RPC server process via a NULL pointer dereference (CVE-2019-12435) An user with read access to the directory can cause a NULL pointer dereference using the paged search control (CVE-2019-12436). For other fixes in this update, see the referenced changelogs.
References
- https://bugs.mageia.org/show_bug.cgi?id=24980
- https://www.samba.org/samba/history/samba-4.10.5.html
- https://www.samba.org/samba/history/samba-4.10.6.html
- https://www.samba.org/samba/history/samba-4.10.7.html
- https://www.samba.org/samba/history/samba-4.10.8.html
- https://www.samba.org/samba/security/CVE-2019-12435.html
- https://www.samba.org/samba/security/CVE-2019-12436.html
- https://www.samba.org/samba/security/CVE-2019-10197.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12435
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12436
SRPMS
7/core
- samba-4.10.8-3.mga7
- ldb-1.5.5-1.mga7