USN-6425-3: Samba vulnerabilities
17 October 2023
Several security issues were fixed in Samba.
Releases
Packages
- samba - SMB/CIFS file, print, and login server for Unix
Details
USN-6425-1 fixed vulnerabilities in Samba. This update provides the
corresponding updates for Ubuntu 23.10.
Original advisory details:
Sri Nagasubramanian discovered that the Samba acl_xattr VFS module
incorrectly handled read-only files. When Samba is configured to ignore
system ACLs, a remote attacker could possibly use this issue to truncate
read-only files. (CVE-2023-4091)
Andrew Bartlett discovered that Samba incorrectly handled the DirSync
control. A remote attacker with an RODC DC account could possibly use this
issue to obtain all domain secrets. (CVE-2023-4154)
Andrew Bartlett discovered that Samba incorrectly handled the rpcecho
development server. A remote attacker could possibly use this issue to
cause Samba to stop responding, resulting in a denial of service.
(CVE-2023-42669)
Kirin van der Veer discovered that Samba incorrectly handled certain RPC
service listeners. A remote attacker could possibly use this issue to cause
Samba to start multiple incompatible RPC listeners, resulting in a denial
of service. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-42670)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.10
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6425-1: samba-libs, samba-dsdb-modules, python3-samba, libldb2, smbclient, python3-ldb, libldb-dev, libnss-winbind, libwbclient-dev, libsmbclient-dev, ctdb, samba-dev, libwbclient0, samba-ad-dc, python3-ldb-dev, winbind, libpam-winbind, libsmbclient, registry-tools, samba-common-bin, samba-vfs-modules, samba, samba-common, samba-testsuite, ldb-tools, samba-ad-provision