Slackware Security Advisories
Slackware Logo

News

Security Advisories

FAQ

Book

General Info

Get Slack

Install Help

Configuration

Packages

ChangeLogs

Propaganda

Ports

Other Sites

Support

Contact

Mailing Lists

About

 
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] samba (SSA:2023-284-03)
Date: Tue, 10 Oct 2023 23:45:49 -0700 (PDT)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  samba (SSA:2023-284-03)

New samba packages are available for Slackware 15.0 and -current to
fix security issues.


Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/samba-4.18.8-i586-1_slack15.0.txz:  Upgraded.
  This is a security release in order to address the following defects:
  Unsanitized pipe names allow SMB clients to connect as root to existing
  unix domain sockets on the file system.
  SMB client can truncate files to 0 bytes by opening files with OVERWRITE
  disposition when using the acl_xattr Samba VFS module with the smb.conf
  setting "acl_xattr:ignore system acls = yes"
  An RODC and a user with the GET_CHANGES right can view all attributes,
  including secrets and passwords. Additionally, the access check fails
  open on error conditions.
  Calls to the rpcecho server on the AD DC can request that the server block
  for a user-defined amount of time, denying service.
  Samba can be made to start multiple incompatible RPC listeners, disrupting
  service on the AD DC.
  For more information, see:
    https://www.samba.org/samba/security/CVE-2023-3961.html
    https://www.samba.org/samba/security/CVE-2023-4091.html
    https://www.samba.org/samba/security/CVE-2023-4154.html
    https://www.samba.org/samba/security/CVE-2023-42669.html
    https://www.samba.org/samba/security/CVE-2023-42670.html
    https://www.cve.org/CVERecord?id=CVE-2023-3961
    https://www.cve.org/CVERecord?id=CVE-2023-4091
    https://www.cve.org/CVERecord?id=CVE-2023-4154
    https://www.cve.org/CVERecord?id=CVE-2023-42669
    https://www.cve.org/CVERecord?id=CVE-2023-42670
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/samba-4.18.8-i586-1_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/samba-4.18.8-x86_64-1_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/samba-4.19.1-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/samba-4.19.1-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 15.0 package:
7a7344afe9d59b27b908c8a927cfa9ae  samba-4.18.8-i586-1_slack15.0.txz

Slackware x86_64 15.0 package:
c723758c3f69631631b40117ba48752d  samba-4.18.8-x86_64-1_slack15.0.txz

Slackware -current package:
a9467bac9d8ca0fe92ad92b80b8d406a  n/samba-4.19.1-i586-1.txz

Slackware x86_64 -current package:
1b038aa7dce7800f0ae8ea4026bec019  n/samba-4.19.1-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg samba-4.18.8-i586-1_slack15.0.txz

Then, if Samba is running restart it:

# /etc/rc.d/rc.samba restart


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list:                          |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back containing instructions to    |
| complete the process.  Please do not reply to this email address.      |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----

iEYEARECAAYFAmUmQ/AACgkQakRjwEAQIjNYtACfTcyHgraRdTmPspsL1EYPoFWu
6kIAoIdPk3VFKQ36So2oIpettPHVXcNi
=6GfM
-----END PGP SIGNATURE-----

Slackware™ is a trademark of Patrick Volkerding.