Samba 4.18.5, 4.17.10., 4.16.11 Security Releases are available for Download
This are security releases in order to address the following defects:
o CVE-2022-2127: When winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in winbind and possibly crash it.
https://www.samba.org/samba/security/CVE-2022-2127.html
o CVE-2023-3347: SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory.
https://www.samba.org/samba/security/CVE-2023-3347.html
o CVE-2023-34966: An infinite loop bug in Samba's mdssvc RPC service for Spotlight can be triggered by an unauthenticated attacker by issuing a malformed RPC request.
https://www.samba.org/samba/security/CVE-2023-34966.html
o CVE-2023-34967: Missing type validation in Samba's mdssvc RPC service for Spotlight can be used by an unauthenticated attacker to trigger a process crash in a shared RPC mdssvc worker process.
https://www.samba.org/samba/security/CVE-2023-34967.html
o CVE-2023-34968: As part of the Spotlight protocol Samba discloses the server-side absolute path of shares and files and directories in search results.
https://www.samba.org/samba/security/CVE-2023-34968.html
Changes
-------
o Ralph Boehme [slow@samba.org]
* BUG 15072: CVE-2022-2127.
* BUG 15340: CVE-2023-34966.
* BUG 15341: CVE-2023-34967.
* BUG 15388: CVE-2023-34968.
* BUG 15397: CVE-2023-3347.
o Samuel Cabrero [scabrero@samba.org]
* BUG 15072: CVE-2022-2127.
o Volker Lendecke [vl@samba.org]
* BUG 15072: CVE-2022-2127.
o Stefan Metzmacher [metze@samba.org]
* BUG 15418: Secure channel faulty since Windows 10/11 update 07/2023.
#######################################
Reporting bugs & Development Discussion
#######################################
Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical:matrix.org matrix room, or
#samba-technical IRC channel on irc.libera.chat.
If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored. All bug reports should
be filed under the Samba 4.1 and newer product in the project's Bugzilla
database ( https://bugzilla.samba.org/).
======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================
================
Download Details
================
The uncompressed tarballs and patch files have been signed
using GnuPG (ID AA99442FB680B620). The source code can be downloaded
from:
https://download.samba.org/pub/samba/stable/
The release notes are available online at:
https://www.samba.org/samba/history/samba-4.18.5.html
https://www.samba.org/samba/history/samba-4.17.10.html
https://www.samba.org/samba/history/samba-4.16.11.html
Our Code, Our Bugs, Our Responsibility.
( https://bugzilla.samba.org/)
--Enjoy
The Samba Team
The Samba 4.18.5, 4.17.10., and 4.16.11 security releases are now available for download. Samba is the standard Windows interoperability suite of programs for Linux and Unix.