Lucene search

K
ubuntuUbuntuUSN-6425-2
HistoryOct 11, 2023 - 12:00 a.m.

Samba regression

2023-10-1100:00:00
ubuntu.com
38
samba
ubuntu 20.04 lts
build issue
vulnerabilities
regressions
macro handling
acl_xattr
dirsync control
denial of service
rpc listeners

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.9%

Releases

  • Ubuntu 20.04 LTS

Packages

  • samba - SMB/CIFS file, print, and login server for Unix

Details

USN-6425-1 fixed vulnerabilities in Samba. Due to a build issue on Ubuntu
20.04 LTS, the update introduced regressions in macro handling and
possibly other functionality.

This update fixes the problem. We apologize for the inconvenience.

Original advisory details:

Sri Nagasubramanian discovered that the Samba acl_xattr VFS module
incorrectly handled read-only files. When Samba is configured to ignore
system ACLs, a remote attacker could possibly use this issue to truncate
read-only files. (CVE-2023-4091)

Andrew Bartlett discovered that Samba incorrectly handled the DirSync
control. A remote attacker with an RODC DC account could possibly use this
issue to obtain all domain secrets. (CVE-2023-4154)

Andrew Bartlett discovered that Samba incorrectly handled the rpcecho
development server. A remote attacker could possibly use this issue to
cause Samba to stop responding, resulting in a denial of service.
(CVE-2023-42669)

Kirin van der Veer discovered that Samba incorrectly handled certain RPC
service listeners. A remote attacker could possibly use this issue to cause
Samba to start multiple incompatible RPC listeners, resulting in a denial
of service. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-42670)

OSVersionArchitecturePackageVersionFilename
Ubuntu20.04noarchsamba< 2:4.15.13+dfsg-0ubuntu0.20.04.7UNKNOWN
Ubuntu20.04noarchctdb< 2:4.15.13+dfsg-0ubuntu0.20.04.7UNKNOWN
Ubuntu20.04noarchctdb-dbgsym< 2:4.15.13+dfsg-0ubuntu0.20.04.7UNKNOWN
Ubuntu20.04noarchlibnss-winbind< 2:4.15.13+dfsg-0ubuntu0.20.04.7UNKNOWN
Ubuntu20.04noarchlibnss-winbind-dbgsym< 2:4.15.13+dfsg-0ubuntu0.20.04.7UNKNOWN
Ubuntu20.04noarchlibpam-winbind< 2:4.15.13+dfsg-0ubuntu0.20.04.7UNKNOWN
Ubuntu20.04noarchlibpam-winbind-dbgsym< 2:4.15.13+dfsg-0ubuntu0.20.04.7UNKNOWN
Ubuntu20.04noarchlibsmbclient< 2:4.15.13+dfsg-0ubuntu0.20.04.7UNKNOWN
Ubuntu20.04noarchlibsmbclient-dbgsym< 2:4.15.13+dfsg-0ubuntu0.20.04.7UNKNOWN
Ubuntu20.04noarchlibsmbclient-dev< 2:4.15.13+dfsg-0ubuntu0.20.04.7UNKNOWN
Rows per page:
1-10 of 341

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.9%