var-202001-0554
Vulnerability from variot

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless). samba Contains an out-of-bounds read vulnerability.Denial of service operation (DoS) May be in a state. Samba is a set of free software developed by the Samba team that enables the UNIX series of operating systems to connect with the SMB/CIFS network protocol of the Microsoft Windows operating system. The software supports sharing printers, transferring data files and so on. A buffer error vulnerability exists in Samba versions 4.9.x prior to 4.9.18, 4.10.x prior to 4.10.12, and 4.11.x prior to 4.11.5. An attacker could exploit this vulnerability by sending a specially crafted string to cause a long-lived process to terminate. ========================================================================== Ubuntu Security Notice USN-4244-1 January 21, 2020

samba vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.10
  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Samba.

Software Description: - samba: SMB/CIFS file, print, and login server for Unix

Details:

It was discovered that Samba did not automatically replicate ACLs set to inherit down a subtree on AD Directory, contrary to expectations. This issue was only addressed in Ubuntu 18.04 LTS, Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-14907)

Christian Naumer discovered that Samba incorrectly handled DNS zone scavenging. This issue could possibly result in some incorrect data being written to the DB. This issue only applied to Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-19344)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10: samba 2:4.10.7+dfsg-0ubuntu2.4

Ubuntu 19.04: samba 2:4.10.0+dfsg-0ubuntu2.8

Ubuntu 18.04 LTS: samba 2:4.7.6+dfsg~ubuntu-0ubuntu2.15

Ubuntu 16.04 LTS: samba 2:4.3.11+dfsg-0ubuntu0.16.04.25

In general, a standard system update will make all the necessary changes. The Windows Explorer did not display the DFS redirects properly and instead of showing the redirects as directories, Samba displayed the redirects as files. With this fix, the Samba's vfs_glusterfs module has been fixed so that DFS redirects now work as expected.

For details on migrating Samba/CTDB configuration files, refer to:

https://access.redhat.com/solutions/4311261


  1. Gentoo Linux Security Advisory GLSA 202003-52

                                       https://security.gentoo.org/

Severity: Normal Title: Samba: Multiple vulnerabilities Date: March 25, 2020 Bugs: #664316, #672140, #686036, #693558, #702928, #706144 ID: 202003-52


Synopsis

Multiple vulnerabilities have been found in Samba, the worst of which could lead to remote code execution.

Background

Samba is a suite of SMB and CIFS client/server programs.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 net-fs/samba < 4.11.6 >= 4.9.18 >= 4.10.13 *>= 4.11.6

Description

Multiple vulnerabilities have been discovered in Samba. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker could possibly execute arbitrary code, cause a Denial of Service condition, conduct a man-in-the-middle attack, or obtain sensitive information.

Workaround

There is no known workaround at this time.

Resolution

All Samba 4.9.x users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/samba-4.9.18"

All Samba 4.10.x users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/samba-4.10.13"

All Samba 4.11.x users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/samba-4.11.6"

References

[ 1 ] CVE-2018-10858 https://nvd.nist.gov/vuln/detail/CVE-2018-10858 [ 2 ] CVE-2018-10918 https://nvd.nist.gov/vuln/detail/CVE-2018-10918 [ 3 ] CVE-2018-10919 https://nvd.nist.gov/vuln/detail/CVE-2018-10919 [ 4 ] CVE-2018-1139 https://nvd.nist.gov/vuln/detail/CVE-2018-1139 [ 5 ] CVE-2018-1140 https://nvd.nist.gov/vuln/detail/CVE-2018-1140 [ 6 ] CVE-2018-14629 https://nvd.nist.gov/vuln/detail/CVE-2018-14629 [ 7 ] CVE-2018-16841 https://nvd.nist.gov/vuln/detail/CVE-2018-16841 [ 8 ] CVE-2018-16851 https://nvd.nist.gov/vuln/detail/CVE-2018-16851 [ 9 ] CVE-2018-16852 https://nvd.nist.gov/vuln/detail/CVE-2018-16852 [ 10 ] CVE-2018-16853 https://nvd.nist.gov/vuln/detail/CVE-2018-16853 [ 11 ] CVE-2018-16857 https://nvd.nist.gov/vuln/detail/CVE-2018-16857 [ 12 ] CVE-2018-16860 https://nvd.nist.gov/vuln/detail/CVE-2018-16860 [ 13 ] CVE-2019-10197 https://nvd.nist.gov/vuln/detail/CVE-2019-10197 [ 14 ] CVE-2019-14861 https://nvd.nist.gov/vuln/detail/CVE-2019-14861 [ 15 ] CVE-2019-14870 https://nvd.nist.gov/vuln/detail/CVE-2019-14870 [ 16 ] CVE-2019-14902 https://nvd.nist.gov/vuln/detail/CVE-2019-14902 [ 17 ] CVE-2019-14907 https://nvd.nist.gov/vuln/detail/CVE-2019-14907 [ 18 ] CVE-2019-19344 https://nvd.nist.gov/vuln/detail/CVE-2019-19344

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/202003-52

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: samba security, bug fix, and enhancement update Advisory ID: RHSA-2020:3981-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:3981 Issue date: 2020-09-29 CVE Names: CVE-2019-14907 ==================================================================== 1. Summary:

An update for samba is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Resilient Storage (v. 7) - ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64

  1. Description:

Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.

The following packages have been upgraded to a later upstream version: samba (4.10.16).

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the smb service will be restarted automatically.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1737888 - Libwbclient alternatives manual setting lost 1776333 - CLI tools printing "Unable to initialize messaging context" running as non root 1785121 - Rebase Samba to the the latest 4.10.x maintenance release 1791207 - CVE-2019-14907 samba: Crash after failed character conversion at log level 3 or above 1791823 - wbinfo -K doesn't work for users of trusted domains/forests 1801496 - Missing directories in ctdb package 1813017 - Can't get 'log events generated from smbclient' 1828354 - After adding "additional dns hostname" to smb.conf it does not generate /etc/krb5.keytab with the proper SPN. 1828924 - Fix 'require_membership_of' documentation in pam_winbind manpages 1831986 - unprivileged user should be able to read-only to gencache.tdb instead of permission denied 1836427 - net ads join use of netbios+realm breaks GSSAPI authentication

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: samba-4.10.16-5.el7.src.rpm

noarch: samba-common-4.10.16-5.el7.noarch.rpm

x86_64: libsmbclient-4.10.16-5.el7.i686.rpm libsmbclient-4.10.16-5.el7.x86_64.rpm libwbclient-4.10.16-5.el7.i686.rpm libwbclient-4.10.16-5.el7.x86_64.rpm samba-client-4.10.16-5.el7.x86_64.rpm samba-client-libs-4.10.16-5.el7.i686.rpm samba-client-libs-4.10.16-5.el7.x86_64.rpm samba-common-libs-4.10.16-5.el7.i686.rpm samba-common-libs-4.10.16-5.el7.x86_64.rpm samba-common-tools-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-krb5-printing-4.10.16-5.el7.x86_64.rpm samba-libs-4.10.16-5.el7.i686.rpm samba-libs-4.10.16-5.el7.x86_64.rpm samba-winbind-4.10.16-5.el7.x86_64.rpm samba-winbind-clients-4.10.16-5.el7.x86_64.rpm samba-winbind-modules-4.10.16-5.el7.i686.rpm samba-winbind-modules-4.10.16-5.el7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

noarch: samba-pidl-4.10.16-5.el7.noarch.rpm

x86_64: libsmbclient-devel-4.10.16-5.el7.i686.rpm libsmbclient-devel-4.10.16-5.el7.x86_64.rpm libwbclient-devel-4.10.16-5.el7.i686.rpm libwbclient-devel-4.10.16-5.el7.x86_64.rpm samba-4.10.16-5.el7.x86_64.rpm samba-dc-4.10.16-5.el7.x86_64.rpm samba-dc-libs-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-devel-4.10.16-5.el7.i686.rpm samba-devel-4.10.16-5.el7.x86_64.rpm samba-python-4.10.16-5.el7.i686.rpm samba-python-4.10.16-5.el7.x86_64.rpm samba-python-test-4.10.16-5.el7.x86_64.rpm samba-test-4.10.16-5.el7.x86_64.rpm samba-test-libs-4.10.16-5.el7.i686.rpm samba-test-libs-4.10.16-5.el7.x86_64.rpm samba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm samba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: samba-4.10.16-5.el7.src.rpm

noarch: samba-common-4.10.16-5.el7.noarch.rpm

x86_64: libsmbclient-4.10.16-5.el7.i686.rpm libsmbclient-4.10.16-5.el7.x86_64.rpm libwbclient-4.10.16-5.el7.i686.rpm libwbclient-4.10.16-5.el7.x86_64.rpm samba-client-4.10.16-5.el7.x86_64.rpm samba-client-libs-4.10.16-5.el7.i686.rpm samba-client-libs-4.10.16-5.el7.x86_64.rpm samba-common-libs-4.10.16-5.el7.i686.rpm samba-common-libs-4.10.16-5.el7.x86_64.rpm samba-common-tools-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-libs-4.10.16-5.el7.i686.rpm samba-libs-4.10.16-5.el7.x86_64.rpm samba-winbind-4.10.16-5.el7.x86_64.rpm samba-winbind-clients-4.10.16-5.el7.x86_64.rpm samba-winbind-modules-4.10.16-5.el7.i686.rpm samba-winbind-modules-4.10.16-5.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

noarch: samba-pidl-4.10.16-5.el7.noarch.rpm

x86_64: libsmbclient-devel-4.10.16-5.el7.i686.rpm libsmbclient-devel-4.10.16-5.el7.x86_64.rpm libwbclient-devel-4.10.16-5.el7.i686.rpm libwbclient-devel-4.10.16-5.el7.x86_64.rpm samba-4.10.16-5.el7.x86_64.rpm samba-dc-4.10.16-5.el7.x86_64.rpm samba-dc-libs-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-devel-4.10.16-5.el7.i686.rpm samba-devel-4.10.16-5.el7.x86_64.rpm samba-krb5-printing-4.10.16-5.el7.x86_64.rpm samba-python-4.10.16-5.el7.i686.rpm samba-python-4.10.16-5.el7.x86_64.rpm samba-python-test-4.10.16-5.el7.x86_64.rpm samba-test-4.10.16-5.el7.x86_64.rpm samba-test-libs-4.10.16-5.el7.i686.rpm samba-test-libs-4.10.16-5.el7.x86_64.rpm samba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm samba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: samba-4.10.16-5.el7.src.rpm

noarch: samba-common-4.10.16-5.el7.noarch.rpm

ppc64: libsmbclient-4.10.16-5.el7.ppc.rpm libsmbclient-4.10.16-5.el7.ppc64.rpm libwbclient-4.10.16-5.el7.ppc.rpm libwbclient-4.10.16-5.el7.ppc64.rpm samba-4.10.16-5.el7.ppc64.rpm samba-client-4.10.16-5.el7.ppc64.rpm samba-client-libs-4.10.16-5.el7.ppc.rpm samba-client-libs-4.10.16-5.el7.ppc64.rpm samba-common-libs-4.10.16-5.el7.ppc.rpm samba-common-libs-4.10.16-5.el7.ppc64.rpm samba-common-tools-4.10.16-5.el7.ppc64.rpm samba-debuginfo-4.10.16-5.el7.ppc.rpm samba-debuginfo-4.10.16-5.el7.ppc64.rpm samba-krb5-printing-4.10.16-5.el7.ppc64.rpm samba-libs-4.10.16-5.el7.ppc.rpm samba-libs-4.10.16-5.el7.ppc64.rpm samba-winbind-4.10.16-5.el7.ppc64.rpm samba-winbind-clients-4.10.16-5.el7.ppc64.rpm samba-winbind-modules-4.10.16-5.el7.ppc.rpm samba-winbind-modules-4.10.16-5.el7.ppc64.rpm

ppc64le: libsmbclient-4.10.16-5.el7.ppc64le.rpm libwbclient-4.10.16-5.el7.ppc64le.rpm samba-4.10.16-5.el7.ppc64le.rpm samba-client-4.10.16-5.el7.ppc64le.rpm samba-client-libs-4.10.16-5.el7.ppc64le.rpm samba-common-libs-4.10.16-5.el7.ppc64le.rpm samba-common-tools-4.10.16-5.el7.ppc64le.rpm samba-debuginfo-4.10.16-5.el7.ppc64le.rpm samba-krb5-printing-4.10.16-5.el7.ppc64le.rpm samba-libs-4.10.16-5.el7.ppc64le.rpm samba-winbind-4.10.16-5.el7.ppc64le.rpm samba-winbind-clients-4.10.16-5.el7.ppc64le.rpm samba-winbind-modules-4.10.16-5.el7.ppc64le.rpm

s390x: libsmbclient-4.10.16-5.el7.s390.rpm libsmbclient-4.10.16-5.el7.s390x.rpm libwbclient-4.10.16-5.el7.s390.rpm libwbclient-4.10.16-5.el7.s390x.rpm samba-4.10.16-5.el7.s390x.rpm samba-client-4.10.16-5.el7.s390x.rpm samba-client-libs-4.10.16-5.el7.s390.rpm samba-client-libs-4.10.16-5.el7.s390x.rpm samba-common-libs-4.10.16-5.el7.s390.rpm samba-common-libs-4.10.16-5.el7.s390x.rpm samba-common-tools-4.10.16-5.el7.s390x.rpm samba-debuginfo-4.10.16-5.el7.s390.rpm samba-debuginfo-4.10.16-5.el7.s390x.rpm samba-krb5-printing-4.10.16-5.el7.s390x.rpm samba-libs-4.10.16-5.el7.s390.rpm samba-libs-4.10.16-5.el7.s390x.rpm samba-winbind-4.10.16-5.el7.s390x.rpm samba-winbind-clients-4.10.16-5.el7.s390x.rpm samba-winbind-modules-4.10.16-5.el7.s390.rpm samba-winbind-modules-4.10.16-5.el7.s390x.rpm

x86_64: libsmbclient-4.10.16-5.el7.i686.rpm libsmbclient-4.10.16-5.el7.x86_64.rpm libwbclient-4.10.16-5.el7.i686.rpm libwbclient-4.10.16-5.el7.x86_64.rpm samba-4.10.16-5.el7.x86_64.rpm samba-client-4.10.16-5.el7.x86_64.rpm samba-client-libs-4.10.16-5.el7.i686.rpm samba-client-libs-4.10.16-5.el7.x86_64.rpm samba-common-libs-4.10.16-5.el7.i686.rpm samba-common-libs-4.10.16-5.el7.x86_64.rpm samba-common-tools-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-krb5-printing-4.10.16-5.el7.x86_64.rpm samba-libs-4.10.16-5.el7.i686.rpm samba-libs-4.10.16-5.el7.x86_64.rpm samba-python-4.10.16-5.el7.i686.rpm samba-python-4.10.16-5.el7.x86_64.rpm samba-winbind-4.10.16-5.el7.x86_64.rpm samba-winbind-clients-4.10.16-5.el7.x86_64.rpm samba-winbind-modules-4.10.16-5.el7.i686.rpm samba-winbind-modules-4.10.16-5.el7.x86_64.rpm

Red Hat Enterprise Linux Server Resilient Storage (v. 7):

ppc64le: ctdb-4.10.16-5.el7.ppc64le.rpm ctdb-tests-4.10.16-5.el7.ppc64le.rpm samba-debuginfo-4.10.16-5.el7.ppc64le.rpm

s390x: ctdb-4.10.16-5.el7.s390x.rpm ctdb-tests-4.10.16-5.el7.s390x.rpm samba-debuginfo-4.10.16-5.el7.s390x.rpm

x86_64: ctdb-4.10.16-5.el7.x86_64.rpm ctdb-tests-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

noarch: samba-pidl-4.10.16-5.el7.noarch.rpm

ppc64: libsmbclient-devel-4.10.16-5.el7.ppc.rpm libsmbclient-devel-4.10.16-5.el7.ppc64.rpm libwbclient-devel-4.10.16-5.el7.ppc.rpm libwbclient-devel-4.10.16-5.el7.ppc64.rpm samba-dc-4.10.16-5.el7.ppc64.rpm samba-dc-libs-4.10.16-5.el7.ppc64.rpm samba-debuginfo-4.10.16-5.el7.ppc.rpm samba-debuginfo-4.10.16-5.el7.ppc64.rpm samba-devel-4.10.16-5.el7.ppc.rpm samba-devel-4.10.16-5.el7.ppc64.rpm samba-python-4.10.16-5.el7.ppc.rpm samba-python-4.10.16-5.el7.ppc64.rpm samba-python-test-4.10.16-5.el7.ppc64.rpm samba-test-4.10.16-5.el7.ppc64.rpm samba-test-libs-4.10.16-5.el7.ppc.rpm samba-test-libs-4.10.16-5.el7.ppc64.rpm samba-winbind-krb5-locator-4.10.16-5.el7.ppc64.rpm

ppc64le: libsmbclient-devel-4.10.16-5.el7.ppc64le.rpm libwbclient-devel-4.10.16-5.el7.ppc64le.rpm samba-dc-4.10.16-5.el7.ppc64le.rpm samba-dc-libs-4.10.16-5.el7.ppc64le.rpm samba-debuginfo-4.10.16-5.el7.ppc64le.rpm samba-devel-4.10.16-5.el7.ppc64le.rpm samba-python-4.10.16-5.el7.ppc64le.rpm samba-python-test-4.10.16-5.el7.ppc64le.rpm samba-test-4.10.16-5.el7.ppc64le.rpm samba-test-libs-4.10.16-5.el7.ppc64le.rpm samba-winbind-krb5-locator-4.10.16-5.el7.ppc64le.rpm

s390x: libsmbclient-devel-4.10.16-5.el7.s390.rpm libsmbclient-devel-4.10.16-5.el7.s390x.rpm libwbclient-devel-4.10.16-5.el7.s390.rpm libwbclient-devel-4.10.16-5.el7.s390x.rpm samba-dc-4.10.16-5.el7.s390x.rpm samba-dc-libs-4.10.16-5.el7.s390x.rpm samba-debuginfo-4.10.16-5.el7.s390.rpm samba-debuginfo-4.10.16-5.el7.s390x.rpm samba-devel-4.10.16-5.el7.s390.rpm samba-devel-4.10.16-5.el7.s390x.rpm samba-python-4.10.16-5.el7.s390.rpm samba-python-4.10.16-5.el7.s390x.rpm samba-python-test-4.10.16-5.el7.s390x.rpm samba-test-4.10.16-5.el7.s390x.rpm samba-test-libs-4.10.16-5.el7.s390.rpm samba-test-libs-4.10.16-5.el7.s390x.rpm samba-winbind-krb5-locator-4.10.16-5.el7.s390x.rpm

x86_64: libsmbclient-devel-4.10.16-5.el7.i686.rpm libsmbclient-devel-4.10.16-5.el7.x86_64.rpm libwbclient-devel-4.10.16-5.el7.i686.rpm libwbclient-devel-4.10.16-5.el7.x86_64.rpm samba-dc-4.10.16-5.el7.x86_64.rpm samba-dc-libs-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-devel-4.10.16-5.el7.i686.rpm samba-devel-4.10.16-5.el7.x86_64.rpm samba-python-test-4.10.16-5.el7.x86_64.rpm samba-test-4.10.16-5.el7.x86_64.rpm samba-test-libs-4.10.16-5.el7.i686.rpm samba-test-libs-4.10.16-5.el7.x86_64.rpm samba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm samba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: samba-4.10.16-5.el7.src.rpm

noarch: samba-common-4.10.16-5.el7.noarch.rpm

x86_64: libsmbclient-4.10.16-5.el7.i686.rpm libsmbclient-4.10.16-5.el7.x86_64.rpm libwbclient-4.10.16-5.el7.i686.rpm libwbclient-4.10.16-5.el7.x86_64.rpm samba-4.10.16-5.el7.x86_64.rpm samba-client-4.10.16-5.el7.x86_64.rpm samba-client-libs-4.10.16-5.el7.i686.rpm samba-client-libs-4.10.16-5.el7.x86_64.rpm samba-common-libs-4.10.16-5.el7.i686.rpm samba-common-libs-4.10.16-5.el7.x86_64.rpm samba-common-tools-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-krb5-printing-4.10.16-5.el7.x86_64.rpm samba-libs-4.10.16-5.el7.i686.rpm samba-libs-4.10.16-5.el7.x86_64.rpm samba-python-4.10.16-5.el7.i686.rpm samba-python-4.10.16-5.el7.x86_64.rpm samba-winbind-4.10.16-5.el7.x86_64.rpm samba-winbind-clients-4.10.16-5.el7.x86_64.rpm samba-winbind-modules-4.10.16-5.el7.i686.rpm samba-winbind-modules-4.10.16-5.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

noarch: samba-pidl-4.10.16-5.el7.noarch.rpm

x86_64: libsmbclient-devel-4.10.16-5.el7.i686.rpm libsmbclient-devel-4.10.16-5.el7.x86_64.rpm libwbclient-devel-4.10.16-5.el7.i686.rpm libwbclient-devel-4.10.16-5.el7.x86_64.rpm samba-dc-4.10.16-5.el7.x86_64.rpm samba-dc-libs-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-devel-4.10.16-5.el7.i686.rpm samba-devel-4.10.16-5.el7.x86_64.rpm samba-python-test-4.10.16-5.el7.x86_64.rpm samba-test-4.10.16-5.el7.x86_64.rpm samba-test-libs-4.10.16-5.el7.i686.rpm samba-test-libs-4.10.16-5.el7.x86_64.rpm samba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm samba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2019-14907 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBX3OhAdzjgjWX9erEAQiKmg//Zm9RRxpptm9hbO8JP2LaIP6kkQrv18HL a/jBhSlHnueskPF4aiJ5vlncq4rZ702MwyFeudzYX7qTuDQY5XvzxiA6Q9E8r/J0 eQicSIc/rexQUBiKmnDg6qdK24eW81BYl6ieIqdqw8W5hnXGTChamgOpvhPIyRx+ ZuLep8AH0v1Ond7o4Vxxs2B8tpKh/bQ+jcMF3wZg8DhsqbWeOQAqkCz/glfD1Am2 gUdfwSVmPyPoCP9flNiULVWnAwTb9JqSIiaPCdqLwusm/BcA1Lpl1D829L0kmpTi cnlKi18hjgFLjij/6dobEfjpUq7b+2HWBuAu8ng2R1hU/v9fxxlnp9vZT6EWns2E +1v6HSdnQrCA31s7SX4LvXHyNte1NIaht+uNfptl0J2PSowRCzBD516fQGoglJIH 4gI5Lb5/w2zEgP09bLP8blP0CztyeKA+T5RGXU/U3zHrCbJx3MK5fgeHeAHhB0EC YKRuNpXXKynv+DSM+OysZOe+X53/oBG8c4qgKT9O+ifgcB+tiLzcOJXq3odGCnv6 yPfkDhF2hBtOPdvOvig7T8MsFVyEO0Cpm963iagz7P1yiR9C/ZW0lJ2unHse6J3k sNCwGHNwTCMwF5cO74vFO9ro/Jys4Vb8+81mVnm9aHSG3/BiLqLRHMxcpAVc6eXG NXdH6tbOksI=Mk7x -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 8) - aarch64, noarch, ppc64le, s390x, x86_64

  1. Bugs fixed (https://bugzilla.redhat.com/):

1710980 - [RFE] Add support for Kerberos KCM credential cache in pam_winbind/winbindd 1746225 - CVE-2019-10197 samba: Combination of parameters and permissions can allow user to escape from the share path definition 1754409 - Rebase Samba to 4.11.x 1754575 - samba: Remove NSS wins and winbind dependency on librt/libpthread as workaround for glibc defect

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0554",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "skynas",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "synology",
        "version": null
      },
      {
        "model": "directory server",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "synology",
        "version": null
      },
      {
        "model": "samba",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "samba",
        "version": "4.10.12"
      },
      {
        "model": "samba",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "samba",
        "version": "4.10.0"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "30"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "31"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "19.04"
      },
      {
        "model": "diskstation manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "synology",
        "version": "6.2"
      },
      {
        "model": "router manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "synology",
        "version": "1.2"
      },
      {
        "model": "samba",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "samba",
        "version": "4.11.0"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "18.04"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "samba",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "samba",
        "version": "4.9.18"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "16.04"
      },
      {
        "model": "samba",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "samba",
        "version": "4.9.0"
      },
      {
        "model": "storage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "3.0"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.0"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "19.10"
      },
      {
        "model": "samba",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "samba",
        "version": "4.11.5"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "samba",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "samba",
        "version": "4.11.x"
      },
      {
        "model": "diskstation manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "synology",
        "version": null
      },
      {
        "model": "samba",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "samba",
        "version": "project"
      },
      {
        "model": "samba",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "samba",
        "version": "4.11.5"
      },
      {
        "model": "router manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "synology",
        "version": null
      },
      {
        "model": "samba",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "samba",
        "version": "4.10.12"
      },
      {
        "model": "red hat enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": null
      },
      {
        "model": "red hat storage",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": null
      },
      {
        "model": "samba",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "samba",
        "version": "4.9.18"
      },
      {
        "model": "samba",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "samba",
        "version": "4.10.x"
      },
      {
        "model": "ubuntu",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "canonical",
        "version": null
      },
      {
        "model": "samba",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "samba",
        "version": "4.9.x"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014366"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-14907"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ubuntu,Red Hat,Gentoo",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-903"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2019-14907",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 4.9,
            "id": "CVE-2019-14907",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.1,
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2019-14907",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 4.9,
            "id": "VHN-146900",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:N/AC:H/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.8,
            "id": "CVE-2019-14907",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 2.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2019-14907",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-14907",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "secalert@redhat.com",
            "id": "CVE-2019-14907",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-14907",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202001-903",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-146900",
            "trust": 0.1,
            "value": "LOW"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-14907",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-146900"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-14907"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014366"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-903"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-14907"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-14907"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with \"log level = 3\" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless). samba Contains an out-of-bounds read vulnerability.Denial of service operation (DoS) May be in a state. Samba is a set of free software developed by the Samba team that enables the UNIX series of operating systems to connect with the SMB/CIFS network protocol of the Microsoft Windows operating system. The software supports sharing printers, transferring data files and so on. A buffer error vulnerability exists in Samba versions 4.9.x prior to 4.9.18, 4.10.x prior to 4.10.12, and 4.11.x prior to 4.11.5. An attacker could exploit this vulnerability by sending a specially crafted string to cause a long-lived process to terminate. ==========================================================================\nUbuntu Security Notice USN-4244-1\nJanuary 21, 2020\n\nsamba vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 19.10\n- Ubuntu 19.04\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Samba. \n\nSoftware Description:\n- samba: SMB/CIFS file, print, and login server for Unix\n\nDetails:\n\nIt was discovered that Samba did not automatically replicate ACLs set to\ninherit down a subtree on AD Directory, contrary to expectations. This\nissue was only addressed in Ubuntu 18.04 LTS, Ubuntu 19.04 and Ubuntu\n19.10. (CVE-2019-14907)\n\nChristian Naumer discovered that Samba incorrectly handled DNS zone\nscavenging. This issue could possibly result in some incorrect data being\nwritten to the DB. This issue only applied to Ubuntu 19.04 and Ubuntu\n19.10. (CVE-2019-19344)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 19.10:\n  samba                           2:4.10.7+dfsg-0ubuntu2.4\n\nUbuntu 19.04:\n  samba                           2:4.10.0+dfsg-0ubuntu2.8\n\nUbuntu 18.04 LTS:\n  samba                           2:4.7.6+dfsg~ubuntu-0ubuntu2.15\n\nUbuntu 16.04 LTS:\n  samba                           2:4.3.11+dfsg-0ubuntu0.16.04.25\n\nIn general, a standard system update will make all the necessary changes. The Windows Explorer did\nnot display the DFS redirects properly and instead of showing the redirects\nas directories, Samba displayed the redirects as files. With this fix, the\nSamba\u0027s vfs_glusterfs module has been fixed so that DFS redirects now work\nas expected. \n\nFor details on migrating Samba/CTDB configuration files, refer to: \n\nhttps://access.redhat.com/solutions/4311261\n\n5. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 202003-52\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: Samba: Multiple vulnerabilities\n     Date: March 25, 2020\n     Bugs: #664316, #672140, #686036, #693558, #702928, #706144\n       ID: 202003-52\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Samba, the worst of which\ncould lead to remote code execution. \n\nBackground\n==========\n\nSamba is a suite of SMB and CIFS client/server programs. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  net-fs/samba                 \u003c 4.11.6                 *\u003e= 4.9.18\n                                                          *\u003e= 4.10.13\n                                                           *\u003e= 4.11.6\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Samba. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker could possibly execute arbitrary code, cause a Denial\nof Service condition, conduct a man-in-the-middle attack, or obtain\nsensitive information. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Samba 4.9.x users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=net-fs/samba-4.9.18\"\n\nAll Samba 4.10.x users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=net-fs/samba-4.10.13\"\n\nAll Samba 4.11.x users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=net-fs/samba-4.11.6\"\n\nReferences\n==========\n\n[  1 ] CVE-2018-10858\n       https://nvd.nist.gov/vuln/detail/CVE-2018-10858\n[  2 ] CVE-2018-10918\n       https://nvd.nist.gov/vuln/detail/CVE-2018-10918\n[  3 ] CVE-2018-10919\n       https://nvd.nist.gov/vuln/detail/CVE-2018-10919\n[  4 ] CVE-2018-1139\n       https://nvd.nist.gov/vuln/detail/CVE-2018-1139\n[  5 ] CVE-2018-1140\n       https://nvd.nist.gov/vuln/detail/CVE-2018-1140\n[  6 ] CVE-2018-14629\n       https://nvd.nist.gov/vuln/detail/CVE-2018-14629\n[  7 ] CVE-2018-16841\n       https://nvd.nist.gov/vuln/detail/CVE-2018-16841\n[  8 ] CVE-2018-16851\n       https://nvd.nist.gov/vuln/detail/CVE-2018-16851\n[  9 ] CVE-2018-16852\n       https://nvd.nist.gov/vuln/detail/CVE-2018-16852\n[ 10 ] CVE-2018-16853\n       https://nvd.nist.gov/vuln/detail/CVE-2018-16853\n[ 11 ] CVE-2018-16857\n       https://nvd.nist.gov/vuln/detail/CVE-2018-16857\n[ 12 ] CVE-2018-16860\n       https://nvd.nist.gov/vuln/detail/CVE-2018-16860\n[ 13 ] CVE-2019-10197\n       https://nvd.nist.gov/vuln/detail/CVE-2019-10197\n[ 14 ] CVE-2019-14861\n       https://nvd.nist.gov/vuln/detail/CVE-2019-14861\n[ 15 ] CVE-2019-14870\n       https://nvd.nist.gov/vuln/detail/CVE-2019-14870\n[ 16 ] CVE-2019-14902\n       https://nvd.nist.gov/vuln/detail/CVE-2019-14902\n[ 17 ] CVE-2019-14907\n       https://nvd.nist.gov/vuln/detail/CVE-2019-14907\n[ 18 ] CVE-2019-19344\n       https://nvd.nist.gov/vuln/detail/CVE-2019-19344\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202003-52\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2020 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Moderate: samba security, bug fix, and enhancement update\nAdvisory ID:       RHSA-2020:3981-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2020:3981\nIssue date:        2020-09-29\nCVE Names:         CVE-2019-14907\n====================================================================\n1. Summary:\n\nAn update for samba is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Resilient Storage (v. 7) - ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64\n\n3. Description:\n\nSamba is an open-source implementation of the Server Message Block (SMB)\nprotocol and the related Common Internet File System (CIFS) protocol, which\nallow PC-compatible machines to share files, printers, and various\ninformation. \n\nThe following packages have been upgraded to a later upstream version:\nsamba (4.10.16). \n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 7.9 Release Notes linked from the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the smb service will be restarted\nautomatically. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1737888 - Libwbclient alternatives manual setting lost\n1776333 - CLI tools printing \"Unable to initialize messaging context\" running as non root\n1785121 - Rebase Samba to the the latest 4.10.x maintenance release\n1791207 - CVE-2019-14907 samba: Crash after failed character conversion at log level 3 or above\n1791823 - wbinfo -K doesn\u0027t work for users of trusted domains/forests\n1801496 - Missing directories in ctdb package\n1813017 - Can\u0027t get \u0027log events generated from smbclient\u0027\n1828354 - After adding \"additional dns hostname\" to smb.conf it does not generate /etc/krb5.keytab with the proper SPN. \n1828924 - Fix \u0027require_membership_of\u0027 documentation in pam_winbind manpages\n1831986 - unprivileged user should be able to read-only to gencache.tdb instead of permission denied\n1836427 - net ads join use of netbios+realm breaks GSSAPI authentication\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nsamba-4.10.16-5.el7.src.rpm\n\nnoarch:\nsamba-common-4.10.16-5.el7.noarch.rpm\n\nx86_64:\nlibsmbclient-4.10.16-5.el7.i686.rpm\nlibsmbclient-4.10.16-5.el7.x86_64.rpm\nlibwbclient-4.10.16-5.el7.i686.rpm\nlibwbclient-4.10.16-5.el7.x86_64.rpm\nsamba-client-4.10.16-5.el7.x86_64.rpm\nsamba-client-libs-4.10.16-5.el7.i686.rpm\nsamba-client-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-libs-4.10.16-5.el7.i686.rpm\nsamba-common-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-tools-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-krb5-printing-4.10.16-5.el7.x86_64.rpm\nsamba-libs-4.10.16-5.el7.i686.rpm\nsamba-libs-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-clients-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-modules-4.10.16-5.el7.i686.rpm\nsamba-winbind-modules-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nnoarch:\nsamba-pidl-4.10.16-5.el7.noarch.rpm\n\nx86_64:\nlibsmbclient-devel-4.10.16-5.el7.i686.rpm\nlibsmbclient-devel-4.10.16-5.el7.x86_64.rpm\nlibwbclient-devel-4.10.16-5.el7.i686.rpm\nlibwbclient-devel-4.10.16-5.el7.x86_64.rpm\nsamba-4.10.16-5.el7.x86_64.rpm\nsamba-dc-4.10.16-5.el7.x86_64.rpm\nsamba-dc-libs-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-devel-4.10.16-5.el7.i686.rpm\nsamba-devel-4.10.16-5.el7.x86_64.rpm\nsamba-python-4.10.16-5.el7.i686.rpm\nsamba-python-4.10.16-5.el7.x86_64.rpm\nsamba-python-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-libs-4.10.16-5.el7.i686.rpm\nsamba-test-libs-4.10.16-5.el7.x86_64.rpm\nsamba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nsamba-4.10.16-5.el7.src.rpm\n\nnoarch:\nsamba-common-4.10.16-5.el7.noarch.rpm\n\nx86_64:\nlibsmbclient-4.10.16-5.el7.i686.rpm\nlibsmbclient-4.10.16-5.el7.x86_64.rpm\nlibwbclient-4.10.16-5.el7.i686.rpm\nlibwbclient-4.10.16-5.el7.x86_64.rpm\nsamba-client-4.10.16-5.el7.x86_64.rpm\nsamba-client-libs-4.10.16-5.el7.i686.rpm\nsamba-client-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-libs-4.10.16-5.el7.i686.rpm\nsamba-common-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-tools-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-libs-4.10.16-5.el7.i686.rpm\nsamba-libs-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-clients-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-modules-4.10.16-5.el7.i686.rpm\nsamba-winbind-modules-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nnoarch:\nsamba-pidl-4.10.16-5.el7.noarch.rpm\n\nx86_64:\nlibsmbclient-devel-4.10.16-5.el7.i686.rpm\nlibsmbclient-devel-4.10.16-5.el7.x86_64.rpm\nlibwbclient-devel-4.10.16-5.el7.i686.rpm\nlibwbclient-devel-4.10.16-5.el7.x86_64.rpm\nsamba-4.10.16-5.el7.x86_64.rpm\nsamba-dc-4.10.16-5.el7.x86_64.rpm\nsamba-dc-libs-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-devel-4.10.16-5.el7.i686.rpm\nsamba-devel-4.10.16-5.el7.x86_64.rpm\nsamba-krb5-printing-4.10.16-5.el7.x86_64.rpm\nsamba-python-4.10.16-5.el7.i686.rpm\nsamba-python-4.10.16-5.el7.x86_64.rpm\nsamba-python-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-libs-4.10.16-5.el7.i686.rpm\nsamba-test-libs-4.10.16-5.el7.x86_64.rpm\nsamba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nsamba-4.10.16-5.el7.src.rpm\n\nnoarch:\nsamba-common-4.10.16-5.el7.noarch.rpm\n\nppc64:\nlibsmbclient-4.10.16-5.el7.ppc.rpm\nlibsmbclient-4.10.16-5.el7.ppc64.rpm\nlibwbclient-4.10.16-5.el7.ppc.rpm\nlibwbclient-4.10.16-5.el7.ppc64.rpm\nsamba-4.10.16-5.el7.ppc64.rpm\nsamba-client-4.10.16-5.el7.ppc64.rpm\nsamba-client-libs-4.10.16-5.el7.ppc.rpm\nsamba-client-libs-4.10.16-5.el7.ppc64.rpm\nsamba-common-libs-4.10.16-5.el7.ppc.rpm\nsamba-common-libs-4.10.16-5.el7.ppc64.rpm\nsamba-common-tools-4.10.16-5.el7.ppc64.rpm\nsamba-debuginfo-4.10.16-5.el7.ppc.rpm\nsamba-debuginfo-4.10.16-5.el7.ppc64.rpm\nsamba-krb5-printing-4.10.16-5.el7.ppc64.rpm\nsamba-libs-4.10.16-5.el7.ppc.rpm\nsamba-libs-4.10.16-5.el7.ppc64.rpm\nsamba-winbind-4.10.16-5.el7.ppc64.rpm\nsamba-winbind-clients-4.10.16-5.el7.ppc64.rpm\nsamba-winbind-modules-4.10.16-5.el7.ppc.rpm\nsamba-winbind-modules-4.10.16-5.el7.ppc64.rpm\n\nppc64le:\nlibsmbclient-4.10.16-5.el7.ppc64le.rpm\nlibwbclient-4.10.16-5.el7.ppc64le.rpm\nsamba-4.10.16-5.el7.ppc64le.rpm\nsamba-client-4.10.16-5.el7.ppc64le.rpm\nsamba-client-libs-4.10.16-5.el7.ppc64le.rpm\nsamba-common-libs-4.10.16-5.el7.ppc64le.rpm\nsamba-common-tools-4.10.16-5.el7.ppc64le.rpm\nsamba-debuginfo-4.10.16-5.el7.ppc64le.rpm\nsamba-krb5-printing-4.10.16-5.el7.ppc64le.rpm\nsamba-libs-4.10.16-5.el7.ppc64le.rpm\nsamba-winbind-4.10.16-5.el7.ppc64le.rpm\nsamba-winbind-clients-4.10.16-5.el7.ppc64le.rpm\nsamba-winbind-modules-4.10.16-5.el7.ppc64le.rpm\n\ns390x:\nlibsmbclient-4.10.16-5.el7.s390.rpm\nlibsmbclient-4.10.16-5.el7.s390x.rpm\nlibwbclient-4.10.16-5.el7.s390.rpm\nlibwbclient-4.10.16-5.el7.s390x.rpm\nsamba-4.10.16-5.el7.s390x.rpm\nsamba-client-4.10.16-5.el7.s390x.rpm\nsamba-client-libs-4.10.16-5.el7.s390.rpm\nsamba-client-libs-4.10.16-5.el7.s390x.rpm\nsamba-common-libs-4.10.16-5.el7.s390.rpm\nsamba-common-libs-4.10.16-5.el7.s390x.rpm\nsamba-common-tools-4.10.16-5.el7.s390x.rpm\nsamba-debuginfo-4.10.16-5.el7.s390.rpm\nsamba-debuginfo-4.10.16-5.el7.s390x.rpm\nsamba-krb5-printing-4.10.16-5.el7.s390x.rpm\nsamba-libs-4.10.16-5.el7.s390.rpm\nsamba-libs-4.10.16-5.el7.s390x.rpm\nsamba-winbind-4.10.16-5.el7.s390x.rpm\nsamba-winbind-clients-4.10.16-5.el7.s390x.rpm\nsamba-winbind-modules-4.10.16-5.el7.s390.rpm\nsamba-winbind-modules-4.10.16-5.el7.s390x.rpm\n\nx86_64:\nlibsmbclient-4.10.16-5.el7.i686.rpm\nlibsmbclient-4.10.16-5.el7.x86_64.rpm\nlibwbclient-4.10.16-5.el7.i686.rpm\nlibwbclient-4.10.16-5.el7.x86_64.rpm\nsamba-4.10.16-5.el7.x86_64.rpm\nsamba-client-4.10.16-5.el7.x86_64.rpm\nsamba-client-libs-4.10.16-5.el7.i686.rpm\nsamba-client-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-libs-4.10.16-5.el7.i686.rpm\nsamba-common-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-tools-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-krb5-printing-4.10.16-5.el7.x86_64.rpm\nsamba-libs-4.10.16-5.el7.i686.rpm\nsamba-libs-4.10.16-5.el7.x86_64.rpm\nsamba-python-4.10.16-5.el7.i686.rpm\nsamba-python-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-clients-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-modules-4.10.16-5.el7.i686.rpm\nsamba-winbind-modules-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Resilient Storage (v. 7):\n\nppc64le:\nctdb-4.10.16-5.el7.ppc64le.rpm\nctdb-tests-4.10.16-5.el7.ppc64le.rpm\nsamba-debuginfo-4.10.16-5.el7.ppc64le.rpm\n\ns390x:\nctdb-4.10.16-5.el7.s390x.rpm\nctdb-tests-4.10.16-5.el7.s390x.rpm\nsamba-debuginfo-4.10.16-5.el7.s390x.rpm\n\nx86_64:\nctdb-4.10.16-5.el7.x86_64.rpm\nctdb-tests-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\nsamba-pidl-4.10.16-5.el7.noarch.rpm\n\nppc64:\nlibsmbclient-devel-4.10.16-5.el7.ppc.rpm\nlibsmbclient-devel-4.10.16-5.el7.ppc64.rpm\nlibwbclient-devel-4.10.16-5.el7.ppc.rpm\nlibwbclient-devel-4.10.16-5.el7.ppc64.rpm\nsamba-dc-4.10.16-5.el7.ppc64.rpm\nsamba-dc-libs-4.10.16-5.el7.ppc64.rpm\nsamba-debuginfo-4.10.16-5.el7.ppc.rpm\nsamba-debuginfo-4.10.16-5.el7.ppc64.rpm\nsamba-devel-4.10.16-5.el7.ppc.rpm\nsamba-devel-4.10.16-5.el7.ppc64.rpm\nsamba-python-4.10.16-5.el7.ppc.rpm\nsamba-python-4.10.16-5.el7.ppc64.rpm\nsamba-python-test-4.10.16-5.el7.ppc64.rpm\nsamba-test-4.10.16-5.el7.ppc64.rpm\nsamba-test-libs-4.10.16-5.el7.ppc.rpm\nsamba-test-libs-4.10.16-5.el7.ppc64.rpm\nsamba-winbind-krb5-locator-4.10.16-5.el7.ppc64.rpm\n\nppc64le:\nlibsmbclient-devel-4.10.16-5.el7.ppc64le.rpm\nlibwbclient-devel-4.10.16-5.el7.ppc64le.rpm\nsamba-dc-4.10.16-5.el7.ppc64le.rpm\nsamba-dc-libs-4.10.16-5.el7.ppc64le.rpm\nsamba-debuginfo-4.10.16-5.el7.ppc64le.rpm\nsamba-devel-4.10.16-5.el7.ppc64le.rpm\nsamba-python-4.10.16-5.el7.ppc64le.rpm\nsamba-python-test-4.10.16-5.el7.ppc64le.rpm\nsamba-test-4.10.16-5.el7.ppc64le.rpm\nsamba-test-libs-4.10.16-5.el7.ppc64le.rpm\nsamba-winbind-krb5-locator-4.10.16-5.el7.ppc64le.rpm\n\ns390x:\nlibsmbclient-devel-4.10.16-5.el7.s390.rpm\nlibsmbclient-devel-4.10.16-5.el7.s390x.rpm\nlibwbclient-devel-4.10.16-5.el7.s390.rpm\nlibwbclient-devel-4.10.16-5.el7.s390x.rpm\nsamba-dc-4.10.16-5.el7.s390x.rpm\nsamba-dc-libs-4.10.16-5.el7.s390x.rpm\nsamba-debuginfo-4.10.16-5.el7.s390.rpm\nsamba-debuginfo-4.10.16-5.el7.s390x.rpm\nsamba-devel-4.10.16-5.el7.s390.rpm\nsamba-devel-4.10.16-5.el7.s390x.rpm\nsamba-python-4.10.16-5.el7.s390.rpm\nsamba-python-4.10.16-5.el7.s390x.rpm\nsamba-python-test-4.10.16-5.el7.s390x.rpm\nsamba-test-4.10.16-5.el7.s390x.rpm\nsamba-test-libs-4.10.16-5.el7.s390.rpm\nsamba-test-libs-4.10.16-5.el7.s390x.rpm\nsamba-winbind-krb5-locator-4.10.16-5.el7.s390x.rpm\n\nx86_64:\nlibsmbclient-devel-4.10.16-5.el7.i686.rpm\nlibsmbclient-devel-4.10.16-5.el7.x86_64.rpm\nlibwbclient-devel-4.10.16-5.el7.i686.rpm\nlibwbclient-devel-4.10.16-5.el7.x86_64.rpm\nsamba-dc-4.10.16-5.el7.x86_64.rpm\nsamba-dc-libs-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-devel-4.10.16-5.el7.i686.rpm\nsamba-devel-4.10.16-5.el7.x86_64.rpm\nsamba-python-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-libs-4.10.16-5.el7.i686.rpm\nsamba-test-libs-4.10.16-5.el7.x86_64.rpm\nsamba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nsamba-4.10.16-5.el7.src.rpm\n\nnoarch:\nsamba-common-4.10.16-5.el7.noarch.rpm\n\nx86_64:\nlibsmbclient-4.10.16-5.el7.i686.rpm\nlibsmbclient-4.10.16-5.el7.x86_64.rpm\nlibwbclient-4.10.16-5.el7.i686.rpm\nlibwbclient-4.10.16-5.el7.x86_64.rpm\nsamba-4.10.16-5.el7.x86_64.rpm\nsamba-client-4.10.16-5.el7.x86_64.rpm\nsamba-client-libs-4.10.16-5.el7.i686.rpm\nsamba-client-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-libs-4.10.16-5.el7.i686.rpm\nsamba-common-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-tools-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-krb5-printing-4.10.16-5.el7.x86_64.rpm\nsamba-libs-4.10.16-5.el7.i686.rpm\nsamba-libs-4.10.16-5.el7.x86_64.rpm\nsamba-python-4.10.16-5.el7.i686.rpm\nsamba-python-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-clients-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-modules-4.10.16-5.el7.i686.rpm\nsamba-winbind-modules-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nnoarch:\nsamba-pidl-4.10.16-5.el7.noarch.rpm\n\nx86_64:\nlibsmbclient-devel-4.10.16-5.el7.i686.rpm\nlibsmbclient-devel-4.10.16-5.el7.x86_64.rpm\nlibwbclient-devel-4.10.16-5.el7.i686.rpm\nlibwbclient-devel-4.10.16-5.el7.x86_64.rpm\nsamba-dc-4.10.16-5.el7.x86_64.rpm\nsamba-dc-libs-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-devel-4.10.16-5.el7.i686.rpm\nsamba-devel-4.10.16-5.el7.x86_64.rpm\nsamba-python-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-libs-4.10.16-5.el7.i686.rpm\nsamba-test-libs-4.10.16-5.el7.x86_64.rpm\nsamba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2019-14907\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nNXdH6tbOksI=Mk7x\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. Bugs fixed (https://bugzilla.redhat.com/):\n\n1710980 - [RFE] Add support for Kerberos KCM credential cache in pam_winbind/winbindd\n1746225 - CVE-2019-10197 samba: Combination of parameters and permissions can allow user to escape from the share path definition\n1754409 - Rebase Samba to 4.11.x\n1754575 - samba: Remove NSS wins and winbind dependency on librt/libpthread as workaround for glibc defect",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-14907"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014366"
      },
      {
        "db": "VULHUB",
        "id": "VHN-146900"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-14907"
      },
      {
        "db": "PACKETSTORM",
        "id": "156018"
      },
      {
        "db": "PACKETSTORM",
        "id": "156871"
      },
      {
        "db": "PACKETSTORM",
        "id": "156915"
      },
      {
        "db": "PACKETSTORM",
        "id": "159357"
      },
      {
        "db": "PACKETSTORM",
        "id": "157427"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-14907",
        "trust": 3.1
      },
      {
        "db": "PACKETSTORM",
        "id": "159357",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014366",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-903",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "156018",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "156871",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "156915",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "157427",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1852",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.3349",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1478",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0319",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1031",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0297",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-146900",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-14907",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-146900"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-14907"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014366"
      },
      {
        "db": "PACKETSTORM",
        "id": "156018"
      },
      {
        "db": "PACKETSTORM",
        "id": "156871"
      },
      {
        "db": "PACKETSTORM",
        "id": "156915"
      },
      {
        "db": "PACKETSTORM",
        "id": "159357"
      },
      {
        "db": "PACKETSTORM",
        "id": "157427"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-903"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-14907"
      }
    ]
  },
  "id": "VAR-202001-0554",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-146900"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T21:29:06.878000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Bug\u00a01791207",
        "trust": 0.8,
        "url": "https://usn.ubuntu.com/4244-1/"
      },
      {
        "title": "Samba Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=109218"
      },
      {
        "title": "Red Hat: Moderate: samba security, bug fix, and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20203981 - Security Advisory"
      },
      {
        "title": "Red Hat: Moderate: samba security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20200943 - Security Advisory"
      },
      {
        "title": "Red Hat: Moderate: samba security, bug fix, and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20201878 - Security Advisory"
      },
      {
        "title": "Ubuntu Security Notice: samba vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4244-1"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2020-1452",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2020-1452"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2020-1544",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2020-1544"
      },
      {
        "title": "CVE-2019-14907",
        "trust": 0.1,
        "url": "https://github.com/JamesGeee/CVE-2019-14907 "
      },
      {
        "title": "lllnx",
        "trust": 0.1,
        "url": "https://github.com/lllnx/lllnx "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/ep-infosec/50_google_honggfuzz "
      },
      {
        "title": "honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/google/honggfuzz "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-14907"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014366"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-903"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-125",
        "trust": 1.1
      },
      {
        "problemtype": "Out of bounds read (CWE-125) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-146900"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014366"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-14907"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.9,
        "url": "https://security.gentoo.org/glsa/202003-52"
      },
      {
        "trust": 1.9,
        "url": "https://usn.ubuntu.com/4244-1/"
      },
      {
        "trust": 1.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14907"
      },
      {
        "trust": 1.8,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2019-14907"
      },
      {
        "trust": 1.8,
        "url": "https://security.netapp.com/advisory/ntap-20200122-0001/"
      },
      {
        "trust": 1.8,
        "url": "https://www.synology.com/security/advisory/synology_sa_20_01"
      },
      {
        "trust": 1.8,
        "url": "https://www.samba.org/samba/security/cve-2019-14907.html"
      },
      {
        "trust": 1.8,
        "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
      },
      {
        "trust": 1.8,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4aczvnmifqggxnjpmhavbn3h2u65fxqy/"
      },
      {
        "trust": 1.0,
        "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/gq6u65i2k23yjc4fesw477wl55tu3ppt/"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/cve/cve-2019-14907"
      },
      {
        "trust": 0.8,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/gq6u65i2k23yjc4fesw477wl55tu3ppt/"
      },
      {
        "trust": 0.8,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4aczvnmifqggxnjpmhavbn3h2u65fxqy/"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200233-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/159357/red-hat-security-advisory-2020-3981-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1478/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/157427/red-hat-security-advisory-2020-1878-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-samba-affects-ibm-spectrum-scale-smb-protocol-access-method-cve-2019-14907/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.3349/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/156018/ubuntu-security-notice-usn-4244-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/156915/gentoo-linux-security-advisory-202003-52.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1852"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-is-vulnerable-to-using-components-with-known-vulnerabilities-6/"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/blogs/psirt/security-bulletin-samba-vulnerability-issue-on-ibm-storwize-v7000-unified-cve-2019-14907/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0319/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0297/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/156871/red-hat-security-advisory-2020-0943-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1031/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/samba-three-vulnerabilities-31386"
      },
      {
        "trust": 0.3,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.3,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/errata/rhsa-2020:3981"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14902"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19344"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-10218"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10218"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10197"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/125.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/samba/2:4.10.0+dfsg-0ubuntu2.8"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/samba/2:4.10.7+dfsg-0ubuntu2.4"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/samba/2:4.7.6+dfsg~ubuntu-0ubuntu2.15"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04.25"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/4244-1"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/solutions/4311261"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2020:0943"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16841"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16857"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10918"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16860"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14629"
      },
      {
        "trust": 0.1,
        "url": "https://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16851"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10858"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16852"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10919"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14861"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16853"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1140"
      },
      {
        "trust": 0.1,
        "url": "https://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14870"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1139"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-10197"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2020:1878"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-146900"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-14907"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014366"
      },
      {
        "db": "PACKETSTORM",
        "id": "156018"
      },
      {
        "db": "PACKETSTORM",
        "id": "156871"
      },
      {
        "db": "PACKETSTORM",
        "id": "156915"
      },
      {
        "db": "PACKETSTORM",
        "id": "159357"
      },
      {
        "db": "PACKETSTORM",
        "id": "157427"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-903"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-14907"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-146900"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-14907"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014366"
      },
      {
        "db": "PACKETSTORM",
        "id": "156018"
      },
      {
        "db": "PACKETSTORM",
        "id": "156871"
      },
      {
        "db": "PACKETSTORM",
        "id": "156915"
      },
      {
        "db": "PACKETSTORM",
        "id": "159357"
      },
      {
        "db": "PACKETSTORM",
        "id": "157427"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-903"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-14907"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-01-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-146900"
      },
      {
        "date": "2020-01-21T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-14907"
      },
      {
        "date": "2020-02-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-014366"
      },
      {
        "date": "2020-01-21T19:09:24",
        "db": "PACKETSTORM",
        "id": "156018"
      },
      {
        "date": "2020-03-23T16:14:36",
        "db": "PACKETSTORM",
        "id": "156871"
      },
      {
        "date": "2020-03-26T14:45:19",
        "db": "PACKETSTORM",
        "id": "156915"
      },
      {
        "date": "2020-09-30T15:44:56",
        "db": "PACKETSTORM",
        "id": "159357"
      },
      {
        "date": "2020-04-28T20:21:10",
        "db": "PACKETSTORM",
        "id": "157427"
      },
      {
        "date": "2020-01-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202001-903"
      },
      {
        "date": "2020-01-21T18:15:12.717000",
        "db": "NVD",
        "id": "CVE-2019-14907"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-07-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-146900"
      },
      {
        "date": "2022-11-16T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-14907"
      },
      {
        "date": "2020-02-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-014366"
      },
      {
        "date": "2021-06-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202001-903"
      },
      {
        "date": "2024-11-21T04:27:39.720000",
        "db": "NVD",
        "id": "CVE-2019-14907"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "156018"
      },
      {
        "db": "PACKETSTORM",
        "id": "156915"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-903"
      }
    ],
    "trust": 0.8
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "samba\u00a0 Vulnerable to out-of-bounds reading",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014366"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-903"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.