| Summary: | Secure channel faulty since Windows 10/11 update 07/2023 | ||
|---|---|---|---|
| Product: | Branch p10 | Reporter: | Олег Золотов <oleg_zolotov> |
| Component: | samba-dc | Assignee: | Evgeny Sinelnikov <sin> |
| Status: | CLOSED FIXED | QA Contact: | qa-p10 <qa-p10> |
| Severity: | critical | ||
| Priority: | P5 | CC: | amakeenk, oleg_zolotov |
| Version: | не указана | ||
| Hardware: | all | ||
| OS: | Linux | ||
|
Description
Олег Золотов
2023-07-17 21:07:19 MSK
Патчи в апстримной баге приложены. Можно сделать тестовую сборку для проверки. В апстриме появилась версия 4.16.11 в которой исправлен данный баг https://www.samba.org/samba/history/samba-4.16.11.html samba-4.16.11-alt2 -> c10f1: Sun Jul 23 2023 Evgeny Sinelnikov <sin@altlinux> 4.16.11-alt2 - Add check with admx-lint for group policy templates validation. Sun Jul 23 2023 Evgeny Sinelnikov <sin@altlinux> 4.16.11-alt1 - Update to security release of Samba 4.16 (Closes: 46966): + Secure channel faulty since Windows 10/11 update 07/2023 (KB5028166). - Security fixes (Samba#15418): + CVE-2022-2127: When winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in winbind and possibly crash it. https://www.samba.org/samba/security/CVE-2022-2127.html + CVE-2023-34966: An infinite loop bug in Samba's mdssvc RPC service for Spotlight can be triggered by an unauthenticated attacker by issuing a malformed RPC request. https://www.samba.org/samba/security/CVE-2023-34966.html + CVE-2023-34967: Missing type validation in Samba's mdssvc RPC service for Spotlight can be used by an unauthenticated attacker to trigger a process crash in a shared RPC mdssvc worker process. https://www.samba.org/samba/security/CVE-2023-34967.html + CVE-2023-34968: As part of the Spotlight protocol Samba discloses the server- side absolute path of shares and files and directories in search results. https://www.samba.org/samba/security/CVE-2023-34968.html |