Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update: samba #1184

Closed
dongsupark opened this issue Sep 22, 2023 · 0 comments · Fixed by flatcar/scripts#1191
Closed

update: samba #1184

dongsupark opened this issue Sep 22, 2023 · 0 comments · Fixed by flatcar/scripts#1191
Labels
advisory security advisory cvss/HIGH > 7 && < 9 assessed CVSS security security concerns

Comments

@dongsupark
Copy link
Member

dongsupark commented Sep 22, 2023

Name: samba
CVEs: CVE-2021-44142, CVE-2022-1615
CVSSs: 8.8, 5.5
Action Needed: update to >= 4.17.5

Summary:

  • CVE-2021-44142: The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root.
  • CVE-2022-1615: In Samba, GnuTLS gnutls_rnd() can fail and give predictable random values.

See also https://security.gentoo.org/glsa/202309-06.
(Note: That GLSA entry has 34 different CVEs, but only 2 affects Flatcar. In most cases they affect smbd, AD & DC, which are disabled in Flatcar. However, there were actually 2 rare cases that affect Flatcar, one in a vfs module, the other in lib.)

refmap.gentoo:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
advisory security advisory cvss/HIGH > 7 && < 9 assessed CVSS security security concerns
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant