USN-6425-1: Samba vulnerabilities
10 October 2023
Several security issues were fixed in Samba.
Releases
Packages
- samba - SMB/CIFS file, print, and login server for Unix
Details
Sri Nagasubramanian discovered that the Samba acl_xattr VFS module
incorrectly handled read-only files. When Samba is configured to ignore
system ACLs, a remote attacker could possibly use this issue to truncate
read-only files. (CVE-2023-4091)
Andrew Bartlett discovered that Samba incorrectly handled the DirSync
control. A remote attacker with an RODC DC account could possibly use this
issue to obtain all domain secrets. (CVE-2023-4154)
Andrew Bartlett discovered that Samba incorrectly handled the rpcecho
development server. A remote attacker could possibly use this issue to
cause Samba to stop responding, resulting in a denial of service.
(CVE-2023-42669)
Kirin van der Veer discovered that Samba incorrectly handled certain RPC
service listeners. A remote attacker could possibly use this issue to cause
Samba to start multiple incompatible RPC listeners, resulting in a denial
of service. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-42670)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.04
Ubuntu 22.04
Ubuntu 20.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6425-3: samba-vfs-modules, samba-dsdb-modules, libldb-dev, ctdb, winbind, ldb-tools, samba-libs, python3-ldb-dev, registry-tools, samba-dev, smbclient, libnss-winbind, samba-common, libwbclient0, libpam-winbind, libsmbclient-dev, python3-samba, libldb2, libwbclient-dev, python3-ldb, samba-common-bin, libsmbclient, samba-ad-dc, samba, samba-testsuite, samba-ad-provision