Bug 46966 - Secure channel faulty since Windows 10/11 update 07/2023
Summary: Secure channel faulty since Windows 10/11 update 07/2023
Status: CLOSED FIXED
Alias: None
Product: Branch p10
Classification: Unclassified
Component: samba-dc (show other bugs)
Version: не указана
Hardware: all Linux
: P5 critical
Assignee: Evgeny Sinelnikov
QA Contact: qa-p10@altlinux.org
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-07-17 21:07 MSK by Олег Золотов
Modified: 2023-07-28 18:40 MSK (History)
2 users (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Олег Золотов 2023-07-17 21:07:19 MSK
После июльского обновления Microsoft Windows 10 KB5028166 (и аналогичных обновлений для Windows 7 и Windows Server 2008 R2), работающих в домене Samba 4 перестает работать NLA в RDS, печать на сетевые принтеры (виснет при попытке открыть свойства принтера). Откат обновления проблему решает. Описание ошибки https://bugzilla.samba.org/show_bug.cgi?id=15418
Comment 1 Evgeny Sinelnikov 2023-07-18 11:07:27 MSK
Патчи в апстримной баге приложены. Можно сделать тестовую сборку для проверки.
Comment 2 Олег Золотов 2023-07-22 20:30:41 MSK
В апстриме появилась версия 4.16.11 в которой исправлен данный баг https://www.samba.org/samba/history/samba-4.16.11.html
Comment 3 Repository Robot 2023-07-28 18:40:03 MSK
samba-4.16.11-alt2 -> c10f1:

 Sun Jul 23 2023 Evgeny Sinelnikov <sin@altlinux> 4.16.11-alt2
 - Add check with admx-lint for group policy templates validation.
 Sun Jul 23 2023 Evgeny Sinelnikov <sin@altlinux> 4.16.11-alt1
 - Update to security release of Samba 4.16 (Closes: 46966):
   + Secure channel faulty since Windows 10/11 update 07/2023 (KB5028166).
 - Security fixes (Samba#15418):
   + CVE-2022-2127:  When winbind is used for NTLM authentication, a maliciously
                     crafted request can trigger an out-of-bounds read in winbind
                     and possibly crash it.
                     https://www.samba.org/samba/security/CVE-2022-2127.html
   + CVE-2023-34966: An infinite loop bug in Samba's mdssvc RPC service for
                     Spotlight can be triggered by an unauthenticated attacker by
                     issuing a malformed RPC request.
                     https://www.samba.org/samba/security/CVE-2023-34966.html
   + CVE-2023-34967: Missing type validation in Samba's mdssvc RPC service for
                     Spotlight can be used by an unauthenticated attacker to
                     trigger a process crash in a shared RPC mdssvc worker process.
                     https://www.samba.org/samba/security/CVE-2023-34967.html
   + CVE-2023-34968: As part of the Spotlight protocol Samba discloses the server-
                     side absolute path of shares and files and directories in
                     search results.
                     https://www.samba.org/samba/security/CVE-2023-34968.html