samba-4.18.6-2.el8_9.ML.1
エラータID: AXSA:2024-7345:01
リリース日:
2024/01/10 Wednesday - 10:55
題名:
samba-4.18.6-2.el8_9.ML.1
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- Samba の SMB クライアントには、クライアント側のパイプ名
のサニタイズ処理に問題があるため、リモートの攻撃者により、
ローカルディレクトリ内の UNIX ドメインソケットへ接続する
ための細工されたパイプ名の処理を介して、パストラバーサル
攻撃を可能とする脆弱性が存在します。(CVE-2023-3961)
- Samba の SMB クライアントには、acl_xattr VFS モジュール
の設定で "acl_xattr:ignore system acls = yes" を指定し、OS の
ファイルシステムの権限チェックを無効化した環境において、
リモートの攻撃者により、ファイル破壊 (意図しないファイル
の切り詰め) を可能とする脆弱性が存在します。
(CVE-2023-4091)
- Samba の rpcecho の dcesrv_echo_TestSleep() 関数には、
処理がブロックされてしまう問題があるため、リモートの攻撃者
により、サービス拒否攻撃を可能とする脆弱性が存在します。
(CVE-2023-42669)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2023-3961
A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes.
A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes.
CVE-2023-4091
A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.
A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.
CVE-2023-42669
A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task.
A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task.
追加情報:
N/A
ダウンロード:
SRPMS
- samba-4.18.6-2.el8_9.ML.1.src.rpm
MD5: ecaad04acb0806ba26d1d4fb463a3728
SHA-256: 34f478d28bc7bf98f2d0ff26172f404fe690dfaa6d6ab85de5b171bc5b86e3a0
Size: 25.20 MB
Asianux Server 8 for x86_64
- ctdb-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 6676d58fde4081b85bd5c697b5983ae6
SHA-256: 085eb4fdf39391418873300c41d008b24ede7a84897c90b6866b59717841e59a
Size: 814.09 kB - libnetapi-4.18.6-2.el8_9.ML.1.i686.rpm
MD5: f20bc2e350bb504838393778a2a7c9c8
SHA-256: be461c3c126018e607b38605917a9a7cbd47518eeec18a5faf24ec96e27753cc
Size: 226.52 kB - libnetapi-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: f8eddb708360999b174a09c429a4770c
SHA-256: 5c048397ca0d2f197cc898e0ceef99c83ee78dec783ec98fc41db97c11785650
Size: 214.04 kB - libnetapi-devel-4.18.6-2.el8_9.ML.1.i686.rpm
MD5: 471b8ddf674f02b647f7cd42879045c3
SHA-256: 651c91e97d2b29378768b1216043e5f9293529d3bd26b8366883ef2d20d3c70f
Size: 107.38 kB - libnetapi-devel-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 72d0f649239b27d55b16b88f2a021e7a
SHA-256: 6fe7f3028823789c01e0170cc04b1aefd3ea286dc5c45f5f77e063c7d20ed6aa
Size: 107.36 kB - libsmbclient-4.18.6-2.el8_9.ML.1.i686.rpm
MD5: 595649b0cfac98c91173243230cfa251
SHA-256: 5c648368d0f0a27189a3165d0fdc06ae128321b6979c690382fccb4a2ffa947e
Size: 159.40 kB - libsmbclient-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: e7955cfaf5d394ae3ed09a3ac8f9cb30
SHA-256: 7097ba34e95da6b9c85d5345669e0febb6445b467247d89aca3020ecc2814688
Size: 153.91 kB - libsmbclient-devel-4.18.6-2.el8_9.ML.1.i686.rpm
MD5: 567a01652d0396911cde74e6adc53e7e
SHA-256: c05002a6edb0e8573e49ded6d6ff3c707f0dbe37fe03c23f2c637e8b0b15da68
Size: 118.81 kB - libsmbclient-devel-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 0db73355e3af9b973e9a7c6b3c714f87
SHA-256: 5b58567aab437de6cdf2f624ff531c992df47041d4efff888a52f4afcdbebacd
Size: 118.79 kB - libwbclient-4.18.6-2.el8_9.ML.1.i686.rpm
MD5: c3a6f3ec71bf0cb04278cd216d7f29b6
SHA-256: aa7fbbb9ee64588d3b7edfaea05c0510cd00f306fb4678ac1ccf218f76bf9a10
Size: 129.82 kB - libwbclient-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: b631f2dc9ded144e302dd7c5842cdbc8
SHA-256: 5ffda0a1c60a1bd034718e45ca027d6cc007881677c17b2f8f0f8449f489d649
Size: 126.27 kB - libwbclient-devel-4.18.6-2.el8_9.ML.1.i686.rpm
MD5: e38411b6598f905c48da9525cf548d8c
SHA-256: b05e43a57edf86dad339d373d3d98a375a8b4ee2e67e9e4f2c12b324bdc12c25
Size: 106.62 kB - libwbclient-devel-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 12ea66356a9faaf6779452214542eb73
SHA-256: 531aae2f6dbb44615e1d34a370ffd9361cdaca547319e74c16533018453940f3
Size: 106.60 kB - python3-samba-4.18.6-2.el8_9.ML.1.i686.rpm
MD5: c2a62d5e5fc45695df6715e37e139999
SHA-256: d2521affbf1ceda0380e74eb5ac0a6e955756bbaef2bc59bd1dea534161ffb3a
Size: 3.29 MB - python3-samba-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 9aca87c1a5f2756d66099869b43869c4
SHA-256: 89135517b0f140b88d86d80b01a248d2f070c5ab41554851a8ae8c360134a593
Size: 3.41 MB - python3-samba-dc-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: c71b7538491c1707740e40e6f12bac16
SHA-256: a0e63954f0c77e46ea9dbef26d5e835f83f0b3551e6fc20cebca70a78dcd00f8
Size: 419.83 kB - python3-samba-devel-4.18.6-2.el8_9.ML.1.i686.rpm
MD5: f5b5bc97e243f1c98a68711aaa0854a7
SHA-256: eb2dc206f6e3ba0f44eb790a8f62eeeac01a71820c6d4202183a60716987134b
Size: 97.30 kB - python3-samba-devel-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 611972714eff5f68a35bdc111b6e0dad
SHA-256: a7fbea4e1f67dbd0cb072b20bc3cc02d3f542f936a64883885a279bf14ccbae8
Size: 97.29 kB - python3-samba-test-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 2777ef58fa7d2df279fdb8586f113af7
SHA-256: 1167fbb365da0a9858a4a1e90b34f2be8b99e2d29649aa6bda4c32dd0a0ec012
Size: 1.19 MB - samba-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: a0a819219244013cdc769e89a558bcea
SHA-256: a75b33600567a740f8ad28757f90f3162d3e3edb3395a0c9f88255cb335765de
Size: 0.99 MB - samba-client-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: f8de427ba10f88ce08e05fa5759f798a
SHA-256: 13c8013fb6efa187dd15351ca663734e11bc6a2713ceb0523044eca2ed46d036
Size: 726.65 kB - samba-client-libs-4.18.6-2.el8_9.ML.1.i686.rpm
MD5: 8cfce0c9ccd9d40004e635a59cf77f48
SHA-256: 86adcc713e44bed767133ab9084b913aa25f1194dc7ee52e22e34e6f50fd3624
Size: 5.39 MB - samba-client-libs-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 7cca2065e306035b3ab57fd53af38e1d
SHA-256: a4c9bac8280604528cdb2afab624d2a865ce5888ae06aa5200bcafb5964aed73
Size: 5.02 MB - samba-common-4.18.6-2.el8_9.ML.1.noarch.rpm
MD5: b81d39b8ef10717536f079988605668d
SHA-256: 38f73acca46e7c139a4d5272d189d37ab253656e079db315b592402cfe8eca47
Size: 231.41 kB - samba-common-libs-4.18.6-2.el8_9.ML.1.i686.rpm
MD5: e9efcfe29986c4a759f53a9c397721e8
SHA-256: 848418ed359cbee06830b9d0c35cc72c16734cfb5c9d77e0cd3eb74f198c63eb
Size: 190.99 kB - samba-common-libs-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 2839df9eae032cd6221a5e5f8607945f
SHA-256: 39cfc6e42e05de678af5f56d15a4519c87fe33cb8f42ec2b6f672b81bda02c4d
Size: 180.98 kB - samba-common-tools-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 08183c9ada38b95157ecacbeeae41136
SHA-256: 10f2e91cbaaa9663686c05670412b30916fc8005ad8b1aa1647648d171d78852
Size: 531.24 kB - samba-dcerpc-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: b05d4b9ca9bd82bab1c821f44aada8ac
SHA-256: 1aa75279847f213a0f79e0878a7d10c97c2da4569bde0ce115cf3348d9ed2685
Size: 754.73 kB - samba-dc-libs-4.18.6-2.el8_9.ML.1.i686.rpm
MD5: 2774edd91c620dbee016f0f2d73187f3
SHA-256: 3ac52b8a9c9dcabd8e2494762e1b8140f83ae350d874ff78f686b5703a1263d2
Size: 113.64 kB - samba-dc-libs-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 6bedd1e0bfe7f7d02c5c50790ced83b7
SHA-256: fc6f1d42c19fc7f7a63e4f2b00ca3191b6fa770b3cb9cb2a280e5164a45f32d4
Size: 112.00 kB - samba-devel-4.18.6-2.el8_9.ML.1.i686.rpm
MD5: 259b92f2762ac4f148dce9b89e6170d7
SHA-256: df3595a228bc67826c049ec3ea920b99f43fbf4858f52998ac07a9969c0c7e3e
Size: 309.27 kB - samba-devel-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 2f6fdda0ae9c236937d87075530749fc
SHA-256: f36fd44a1995bb0f82b0913cf99bd44138c6b715b734d96ebcf26bd4f73dd96b
Size: 309.39 kB - samba-krb5-printing-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 97ee3a518f7b7aae8db4cb17bb5a6ef6
SHA-256: 1391c95c54c3bbe8780571342bc400bf3fc09832fbd2e7f1cef863759997239a
Size: 104.77 kB - samba-ldb-ldap-modules-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 697d761b26782d0a343c5946d03dd1aa
SHA-256: ddb1d6cc7e068d2066ebedf0a1d99c7bdb22d5c04dca4595fd6a3f74d8312f6b
Size: 110.54 kB - samba-libs-4.18.6-2.el8_9.ML.1.i686.rpm
MD5: dfe01031719fe39e32cc7875b17b14b8
SHA-256: 7e6c84e27a9efc879b701e24b518fd63fc2370b18786b5102ec421419145d6ca
Size: 206.57 kB - samba-libs-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 607671fa54a38c815a4a977825274e8c
SHA-256: b6c6165f50dd88936d6db3d44339ddb9f195b738b287b34219a463c3148a54a9
Size: 199.25 kB - samba-pidl-4.18.6-2.el8_9.ML.1.noarch.rpm
MD5: e304fd2ef85ad1e53043aec831dd8648
SHA-256: 96598bccbf09cf6c3349eb2b102f12e48287f51cbed18afd3e2f428749c74895
Size: 202.07 kB - samba-test-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: e64d15e85a663bf75535cd2e3c8cfa95
SHA-256: 9bdd358b5f4987de7bcd5032e4d1188fed3c643fef9a5e3a3c4e9648124498c5
Size: 2.30 MB - samba-test-libs-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 9b24b1467772d1995d9a1ccfd0d8a77c
SHA-256: 1e22254d93e468af10c943bda0691e91d75447d0ff7ca746f0d1973b0d71226c
Size: 124.95 kB - samba-tools-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 950dc02718f238a71eed28163d569a7b
SHA-256: 955010fbcd15d6da0c03e4398f03507b8828fab8f4b0b9fe31fa0bbe6b75f187
Size: 106.86 kB - samba-usershares-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 3e2f872b133fed3f47549e8e70982ada
SHA-256: bf9ff5f0eb7d250fbf51d9e2caf6c4bd8956b80e77463add8d54c8f5ad8d4e2c
Size: 97.28 kB - samba-vfs-iouring-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: b99afd723bc7c3bdba1a6b4925c14353
SHA-256: 8808ca572e4f08393369975d4654b7567e7e3adf2a643eddae6a2889a11b3dea
Size: 107.70 kB - samba-winbind-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: a2d02e9456fc611dfc8e6ff968453281
SHA-256: 42ff6f110e7e9bd3c21d49b046c9bcc7b044e1ffcd3332a3b4706c5191b86773
Size: 485.42 kB - samba-winbind-clients-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: a22b1466beeab27319db1346b61ed444
SHA-256: fe875451e670dfdb13beda564d12c1206e786a91e15da71a430eb72fd20ff51c
Size: 180.07 kB - samba-winbind-krb5-locator-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 17d0cd6e629101276350ae922a7018f8
SHA-256: 0b6b5ffd3799666ae7b70a0c43ad2f40735c9eb1fabe457dbf8b4f8741800868
Size: 129.83 kB - samba-winbind-modules-4.18.6-2.el8_9.ML.1.i686.rpm
MD5: 31573c22a8adf8cc0140b68882afc5d7
SHA-256: 847833f8ab60875b896cbc3ded91d24a71a0b2359b4463e0a50ec4ab588797fe
Size: 174.55 kB - samba-winbind-modules-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 80cb6ae997d8f8ee3109b1a5ae97c0a7
SHA-256: 2ba6b34d672eba43de115dcd526908b103311c0a0bd790e0af62e954ef846072
Size: 167.51 kB - samba-winexe-4.18.6-2.el8_9.ML.1.x86_64.rpm
MD5: 3d28197e2469cc3cb02486c00e91949b
SHA-256: ce2d6dbae3059b750aa14f16b7b008d5af197452c7d76380b32fe808dda30cf2
Size: 135.93 kB