Mageia 2019-0286: samba security update

    Date21 Sep 2019
    CategoryMageia
    2016
    Posted ByLinuxSecurity Advisories
    Updated samba packages fix security vulnerabilities: A combination of parameters and permissions in smb.conf can allow user to escape from the share path definition (CVE-2019-10197).
    MGASA-2019-0286 - Updated samba packages fix security vulnerabilities
    
    Publication date: 21 Sep 2019
    URL: https://advisories.mageia.org/MGASA-2019-0286.html
    Type: security
    Affected Mageia releases: 7
    CVE: CVE-2019-10197,
         CVE-2019-12435,
         CVE-2019-12436
    
    Updated samba packages fix security vulnerabilities:
    
    A combination of parameters and permissions in smb.conf can allow user
    to escape from the share path definition (CVE-2019-10197).
    
    An authenticated user can crash the Samba AD DC's RPC server process via
    a NULL pointer dereference (CVE-2019-12435)
    
    An user with read access to the directory can cause a NULL pointer
    dereference using the paged search control (CVE-2019-12436).
    
    For other fixes in this update, see the referenced changelogs.
    
    References:
    - https://bugs.mageia.org/show_bug.cgi?id=24980
    - https://www.samba.org/samba/history/samba-4.10.5.html
    - https://www.samba.org/samba/history/samba-4.10.6.html
    - https://www.samba.org/samba/history/samba-4.10.7.html
    - https://www.samba.org/samba/history/samba-4.10.8.html
    - https://www.samba.org/samba/security/CVE-2019-12435.html
    - https://www.samba.org/samba/security/CVE-2019-12436.html
    - https://www.samba.org/samba/security/CVE-2019-10197.html
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12435
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12436
    
    SRPMS:
    - 7/core/samba-4.10.8-3.mga7
    

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"65","type":"x","order":"1","pct":57.52,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.27,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.2,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.