Moderate: samba security, bug fix, and enhancement update

Related Vulnerabilities: CVE-2022-2127   CVE-2023-34966   CVE-2023-34967   CVE-2023-34968  

Synopsis

Moderate: samba security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for samba, evolution-mapi, and openchangeis now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.

The following packages have been upgraded to a later upstream version: samba (4.18.6). (BZ#2190417)

Security Fix(es):

  • samba: out-of-bounds read in winbind AUTH_CRAP (CVE-2022-2127)
  • samba: infinite loop in mdssvc RPC service for spotlight (CVE-2023-34966)
  • samba: type confusion in mdssvc RPC service for spotlight (CVE-2023-34967)
  • samba: spotlight server-side share path disclosure (CVE-2023-34968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the smb service will be restarted automatically.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat CodeReady Linux Builder for x86_64 8 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
  • Red Hat CodeReady Linux Builder for IBM z Systems 8 s390x

Fixes

  • BZ - 2175385 - Cannot access Samba share with veto files = /.*/
  • BZ - 2190417 - Rebase Samba to the latest 4.18.x release
  • BZ - 2218237 - [RHEL8] python3-samba: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation)
  • BZ - 2221594 - libwbclient 2:4.18.2-0.fc38 cannot be selected above & appears to have created a broken symlink
  • BZ - 2221600 - wbinfo lists domain users from trusted domain only after second call
  • BZ - 2222791 - CVE-2022-2127 samba: out-of-bounds read in winbind AUTH_CRAP
  • BZ - 2222793 - CVE-2023-34966 samba: infinite loop in mdssvc RPC service for spotlight
  • BZ - 2222794 - CVE-2023-34967 samba: type confusion in mdssvc RPC service for spotlight
  • BZ - 2222795 - CVE-2023-34968 samba: spotlight server-side share path disclosure
  • BZ - 2222884 - The trust relationship between this workstation and the primary domain failed
  • BZ - 2232564 - [RHEL8] samba 4.18 regression. WERR_NERR_DFSNOSUCHSERVER with dfsgetinfo