Errata overview
Errata ID 39
Date 2019-04-08
Source package samba
Fixed in version 2:4.10.1-1A~4.4.0.201904031509
Description
This update addresses the following issues:
* Update to Samba 4.10.1.
* Improve `samba-tool ntacl sysvolcheck` to reduce reporting false positives.
  This can be run by using new option `--mask-msad-differences`. Without
  the new option the reporting is unchanged. This is another step in the
  ongoing quest of improving the quality this tool for NTACL inheritance.
* Fix mode of dns_update_list and spn_update_list, broken after provision.
* During the creation of a new Samba AD DC, files are created in the
  /var/lib/samba/private/ directory.
  During initial setup of a UCS domain-controller with UCS 4.4 / Samba 4.10
  two files were created with mode 0666, that is world-writable, including
  the list of DNS names and servicePrincipalName values to update.
  Most UCS Samba DCs upgraded from UCS 4.3-3 or earlier however will not be
  affected by this, because the Bug was introduced with Samba 4.8 while UCS
  4.3 systems are running Samba 4.7.
  For details see <https://www.samba.org/samba/security/CVE-2019-3870.html>.
* Samba contains an RPC endpoint emulating the Windows registry service
  API. One of the requests, "winreg_SaveKey", is susceptible to a
  path/symlink traversal vulnerability. Unprivileged users can use it to
  create a new registry hive file anywhere they have UNIX permissions to
  create a new file within a Samba share. If they are able to create symlinks
  on a Samba share, they can create a new registry hive file anywhere they
  have write access, even outside a Samba share definition.
  Existing share restrictions such as "read only" or share ACLs do not
  prevent new registry hive files being written to the filesystem. A file may
  be written under any share definition wherever the user has UNIX
  permissions to create a file.
  Existing files cannot be overwritten using this vulnerability, only new
  registry hive files can be created, however the presence of existing files
  with a specific name can be detected.
  Samba writes or detects the file as the authenticated user, but by UCS
  default the "Administrator" account is mapped to root, because it is
  configured as "admin user" in smb.conf.
  For details and possible mitigations see
  <https://www.samba.org/samba/security/CVE-2019-3880.html>.
Additional notes
CVE ID CVE-2019-3870
CVE-2019-3880
UCS Bug number #49034
#46643
#49025