Updated samba packages fix security vulnerabilities
Publication date: 19 Dec 2019Modification date: 19 Dec 2019
Type: security
Affected Mageia releases : 7
CVE: CVE-2019-10218 , CVE-2019-14833 , CVE-2019-14847 , CVE-2019-14861 , CVE-2019-14870
Description
Updated samba packages fix security vulnerabilities: Malicious servers can cause Samba client code to return filenames containing path separators to calling code (CVE-2019-10218). When the password contains multi-byte (non-ASCII) characters, the check password script does not receive the full password string (CVE-2019-14833). Users with the "get changes" extended access right can crash the AD DC LDAP server by requesting an attribute using the range= syntax (CVE-2019-14847). An authenticated user can crash the DCE/RPC DNS management server by creating records with matching the zone name (CVE-2019-14861). The DelegationNotAllowed Kerberos feature restriction was not being applied when processing protocol transition requests (S4U2Self), in the AD DC KDC (CVE-2019-14870).
References
- https://bugs.mageia.org/show_bug.cgi?id=25644
- https://www.samba.org/samba/history/samba-4.10.9.html
- https://www.samba.org/samba/history/samba-4.10.10.html
- https://www.samba.org/samba/history/samba-4.10.11.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14833
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14847
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870
SRPMS
7/core
- ldb-1.5.6-1.mga7
- samba-4.10.11-1.mga7