Mageia 2023-0247: samba security update
Summary
Out-of-bounds read due to insufficient length checks in
winbindd_pam_auth_crap.c (CVE-2022-2127)
Improper SMB2 packet signing mechanism leading to man in the middle risk
(CVE-2023-3347)
Infinite loop vulnerability was found in Samba's mdssvc RPC service for
Spotlight (CVE-2023-34966)
Type Confusion vulnerability was found in Samba's mdssvc RPC service for
Spotlight (CVE-2023-34967)
Path disclosure vulnerability in the Spotlight protocol (CVE-2023-34968)
References
- https://bugs.mageia.org/show_bug.cgi?id=32152
- https://www.samba.org/samba/security/CVE-2023-34967.html
- https://www.samba.org/samba/security/CVE-2022-2127.html
- https://www.samba.org/samba/security/CVE-2023-34968.html
- https://www.samba.org/samba/security/CVE-2023-34966.html
- https://www.samba.org/samba/security/CVE-2023-3347.html
- https://www.samba.org/samba/history/samba-4.16.11.html
- https://www.samba.org/samba/history/samba-4.17.10.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3347
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
Resolution
MGASA-2023-0247 - Updated samba packages fix security vulnerability
SRPMS
- 8/core/samba-4.16.11-1.mga8