var-202201-0295
Vulnerability from variot

The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of AppleDouble entries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer.

The specific flaw exists within the parsing of EA metadata when opening files in smbd.

The problem in vfs_fruit exists in the default configuration of the fruit VFS module using fruit:metadata=netatalk or fruit:resource=file. If both options are set to different settings than the default values, the system is not affected by the security issue.

================== Patch Availability ==================

Patches addressing both these issues have been posted to:

https://www.samba.org/samba/security/

Additionally, Samba 4.13.17, 4.14.12 and 4.15.5 have been issued as security releases to correct the defect.

================== CVSSv3 calculation ==================

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C

Base score 9.9.

========== Workaround ==========

As a workaround remove the "fruit" VFS module from the list of configured VFS objects in any "vfs objects" line in the Samba configuration smb.conf.

Note that changing the VFS module settings fruit:metadata or fruit:resource to use the unaffected setting causes all stored information to be inaccessible and will make it appear to macOS clients as if the information is lost.

======= Credits =======

Originally reported by Orange Tsai from DEVCORE.

Patches provided by Ralph Böhme of the Samba team.

========================================================== == Our Code, Our Bugs, Our Responsibility. == The Samba Team ========================================================== .

For details on migrating Samba/CTDB configuration files, refer to:

https://access.redhat.com/solutions/4311261

  1. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. ========================================================================== Ubuntu Security Notice USN-5260-1 February 01, 2022

samba vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 21.10
  • Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Samba.

Software Description: - samba: SMB/CIFS file, print, and login server for Unix

Details:

Orange Tsai discovered that the Samba vfs_fruit module incorrectly handled certain memory operations. (CVE-2021-44142)

Michael Hanselmann discovered that Samba incorrectly created directories. In certain configurations, a remote attacker could possibly create a directory on the server outside of the shared directory. (CVE-2021-43566)

Kees van Vloten discovered that Samba incorrectly handled certain aliased SPN checks. A remote attacker could possibly use this issue to impersonate services. (CVE-2022-0336)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 21.10: samba 2:4.13.17~dfsg-0ubuntu0.21.10.1

Ubuntu 20.04 LTS: samba 2:4.13.17~dfsg-0ubuntu0.21.04.1

This update uses a new upstream release, which includes additional bug fixes. In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Critical: samba security and bug fix update Advisory ID: RHSA-2022:0331-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:0331 Issue date: 2022-01-31 CVE Names: CVE-2021-44142 ==================================================================== 1. Summary:

An update for samba is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat CodeReady Linux Builder EUS (v. 8.4) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS EUS (v.8.4) - aarch64, noarch, ppc64le, s390x, x86_64

  1. Description:

Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.

Security Fix(es):

  • samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution (CVE-2021-44142)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Fix username map script regression introduced with CVE-2020-25717 (BZ#2046173)

  • Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the smb service will be restarted automatically.

  1. Package List:

Red Hat Enterprise Linux BaseOS EUS (v.8.4):

Source: samba-4.13.3-9.el8_4.src.rpm

aarch64: ctdb-4.13.3-9.el8_4.aarch64.rpm ctdb-debuginfo-4.13.3-9.el8_4.aarch64.rpm ctdb-tests-4.13.3-9.el8_4.aarch64.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.aarch64.rpm libsmbclient-4.13.3-9.el8_4.aarch64.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm libwbclient-4.13.3-9.el8_4.aarch64.rpm libwbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm python3-samba-4.13.3-9.el8_4.aarch64.rpm python3-samba-debuginfo-4.13.3-9.el8_4.aarch64.rpm python3-samba-test-4.13.3-9.el8_4.aarch64.rpm samba-4.13.3-9.el8_4.aarch64.rpm samba-client-4.13.3-9.el8_4.aarch64.rpm samba-client-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-client-libs-4.13.3-9.el8_4.aarch64.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-common-libs-4.13.3-9.el8_4.aarch64.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-common-tools-4.13.3-9.el8_4.aarch64.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-debugsource-4.13.3-9.el8_4.aarch64.rpm samba-krb5-printing-4.13.3-9.el8_4.aarch64.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-libs-4.13.3-9.el8_4.aarch64.rpm samba-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-test-4.13.3-9.el8_4.aarch64.rpm samba-test-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-test-libs-4.13.3-9.el8_4.aarch64.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-4.13.3-9.el8_4.aarch64.rpm samba-winbind-clients-4.13.3-9.el8_4.aarch64.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-krb5-locator-4.13.3-9.el8_4.aarch64.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-modules-4.13.3-9.el8_4.aarch64.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.aarch64.rpm

noarch: samba-common-4.13.3-9.el8_4.noarch.rpm samba-pidl-4.13.3-9.el8_4.noarch.rpm

ppc64le: ctdb-4.13.3-9.el8_4.ppc64le.rpm ctdb-debuginfo-4.13.3-9.el8_4.ppc64le.rpm ctdb-tests-4.13.3-9.el8_4.ppc64le.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.ppc64le.rpm libsmbclient-4.13.3-9.el8_4.ppc64le.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm libwbclient-4.13.3-9.el8_4.ppc64le.rpm libwbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm python3-samba-4.13.3-9.el8_4.ppc64le.rpm python3-samba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm python3-samba-test-4.13.3-9.el8_4.ppc64le.rpm samba-4.13.3-9.el8_4.ppc64le.rpm samba-client-4.13.3-9.el8_4.ppc64le.rpm samba-client-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-client-libs-4.13.3-9.el8_4.ppc64le.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-common-libs-4.13.3-9.el8_4.ppc64le.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-common-tools-4.13.3-9.el8_4.ppc64le.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-debugsource-4.13.3-9.el8_4.ppc64le.rpm samba-krb5-printing-4.13.3-9.el8_4.ppc64le.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-libs-4.13.3-9.el8_4.ppc64le.rpm samba-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-test-4.13.3-9.el8_4.ppc64le.rpm samba-test-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-test-libs-4.13.3-9.el8_4.ppc64le.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-clients-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-krb5-locator-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-modules-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.ppc64le.rpm

s390x: ctdb-4.13.3-9.el8_4.s390x.rpm ctdb-debuginfo-4.13.3-9.el8_4.s390x.rpm ctdb-tests-4.13.3-9.el8_4.s390x.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.s390x.rpm libsmbclient-4.13.3-9.el8_4.s390x.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm libwbclient-4.13.3-9.el8_4.s390x.rpm libwbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm python3-samba-4.13.3-9.el8_4.s390x.rpm python3-samba-debuginfo-4.13.3-9.el8_4.s390x.rpm python3-samba-test-4.13.3-9.el8_4.s390x.rpm samba-4.13.3-9.el8_4.s390x.rpm samba-client-4.13.3-9.el8_4.s390x.rpm samba-client-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-client-libs-4.13.3-9.el8_4.s390x.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-common-libs-4.13.3-9.el8_4.s390x.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-common-tools-4.13.3-9.el8_4.s390x.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-debugsource-4.13.3-9.el8_4.s390x.rpm samba-krb5-printing-4.13.3-9.el8_4.s390x.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-libs-4.13.3-9.el8_4.s390x.rpm samba-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-test-4.13.3-9.el8_4.s390x.rpm samba-test-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-test-libs-4.13.3-9.el8_4.s390x.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-4.13.3-9.el8_4.s390x.rpm samba-winbind-clients-4.13.3-9.el8_4.s390x.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-krb5-locator-4.13.3-9.el8_4.s390x.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-modules-4.13.3-9.el8_4.s390x.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.s390x.rpm

x86_64: ctdb-4.13.3-9.el8_4.x86_64.rpm ctdb-debuginfo-4.13.3-9.el8_4.i686.rpm ctdb-debuginfo-4.13.3-9.el8_4.x86_64.rpm ctdb-tests-4.13.3-9.el8_4.x86_64.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.i686.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.x86_64.rpm libsmbclient-4.13.3-9.el8_4.i686.rpm libsmbclient-4.13.3-9.el8_4.x86_64.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.i686.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm libwbclient-4.13.3-9.el8_4.i686.rpm libwbclient-4.13.3-9.el8_4.x86_64.rpm libwbclient-debuginfo-4.13.3-9.el8_4.i686.rpm libwbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm python3-samba-4.13.3-9.el8_4.i686.rpm python3-samba-4.13.3-9.el8_4.x86_64.rpm python3-samba-debuginfo-4.13.3-9.el8_4.i686.rpm python3-samba-debuginfo-4.13.3-9.el8_4.x86_64.rpm python3-samba-test-4.13.3-9.el8_4.x86_64.rpm samba-4.13.3-9.el8_4.x86_64.rpm samba-client-4.13.3-9.el8_4.x86_64.rpm samba-client-debuginfo-4.13.3-9.el8_4.i686.rpm samba-client-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-client-libs-4.13.3-9.el8_4.i686.rpm samba-client-libs-4.13.3-9.el8_4.x86_64.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-common-libs-4.13.3-9.el8_4.x86_64.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-common-tools-4.13.3-9.el8_4.x86_64.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.i686.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-debuginfo-4.13.3-9.el8_4.i686.rpm samba-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-debugsource-4.13.3-9.el8_4.i686.rpm samba-debugsource-4.13.3-9.el8_4.x86_64.rpm samba-krb5-printing-4.13.3-9.el8_4.x86_64.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.i686.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-libs-4.13.3-9.el8_4.i686.rpm samba-libs-4.13.3-9.el8_4.x86_64.rpm samba-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-test-4.13.3-9.el8_4.x86_64.rpm samba-test-debuginfo-4.13.3-9.el8_4.i686.rpm samba-test-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-test-libs-4.13.3-9.el8_4.x86_64.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-vfs-glusterfs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-4.13.3-9.el8_4.x86_64.rpm samba-winbind-clients-4.13.3-9.el8_4.x86_64.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-krb5-locator-4.13.3-9.el8_4.x86_64.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-modules-4.13.3-9.el8_4.i686.rpm samba-winbind-modules-4.13.3-9.el8_4.x86_64.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winexe-4.13.3-9.el8_4.x86_64.rpm samba-winexe-debuginfo-4.13.3-9.el8_4.x86_64.rpm

Red Hat CodeReady Linux Builder EUS (v. 8.4):

aarch64: ctdb-debuginfo-4.13.3-9.el8_4.aarch64.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.aarch64.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm libsmbclient-devel-4.13.3-9.el8_4.aarch64.rpm libwbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm libwbclient-devel-4.13.3-9.el8_4.aarch64.rpm python3-samba-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-client-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-debugsource-4.13.3-9.el8_4.aarch64.rpm samba-devel-4.13.3-9.el8_4.aarch64.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-test-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.aarch64.rpm

ppc64le: ctdb-debuginfo-4.13.3-9.el8_4.ppc64le.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.ppc64le.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm libsmbclient-devel-4.13.3-9.el8_4.ppc64le.rpm libwbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm libwbclient-devel-4.13.3-9.el8_4.ppc64le.rpm python3-samba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-client-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-debugsource-4.13.3-9.el8_4.ppc64le.rpm samba-devel-4.13.3-9.el8_4.ppc64le.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-test-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.ppc64le.rpm

s390x: ctdb-debuginfo-4.13.3-9.el8_4.s390x.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.s390x.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm libsmbclient-devel-4.13.3-9.el8_4.s390x.rpm libwbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm libwbclient-devel-4.13.3-9.el8_4.s390x.rpm python3-samba-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-client-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-debugsource-4.13.3-9.el8_4.s390x.rpm samba-devel-4.13.3-9.el8_4.s390x.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-test-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.s390x.rpm

x86_64: ctdb-debuginfo-4.13.3-9.el8_4.i686.rpm ctdb-debuginfo-4.13.3-9.el8_4.x86_64.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.i686.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.x86_64.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.i686.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm libsmbclient-devel-4.13.3-9.el8_4.i686.rpm libsmbclient-devel-4.13.3-9.el8_4.x86_64.rpm libwbclient-debuginfo-4.13.3-9.el8_4.i686.rpm libwbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm libwbclient-devel-4.13.3-9.el8_4.i686.rpm libwbclient-devel-4.13.3-9.el8_4.x86_64.rpm python3-samba-debuginfo-4.13.3-9.el8_4.i686.rpm python3-samba-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-client-debuginfo-4.13.3-9.el8_4.i686.rpm samba-client-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.i686.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-debuginfo-4.13.3-9.el8_4.i686.rpm samba-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-debugsource-4.13.3-9.el8_4.i686.rpm samba-debugsource-4.13.3-9.el8_4.x86_64.rpm samba-devel-4.13.3-9.el8_4.i686.rpm samba-devel-4.13.3-9.el8_4.x86_64.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.i686.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-test-debuginfo-4.13.3-9.el8_4.i686.rpm samba-test-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-vfs-glusterfs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winexe-debuginfo-4.13.3-9.el8_4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2021-44142 https://access.redhat.com/security/updates/classification/#critical

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBYfg3odzjgjWX9erEAQimyg/+NRtV8CgeDBg2ekQ0/JSEE2zUM2tOUbls W+8ZipOxqyu22gfT+gutgPbFOmeqDIPcIz7GxV+6UU8p6Tyet/JxHTfYabAaUzFs 7k/xPFkxrq//ckbz3aJGmrSRQRwvMAmYKuUQ+0Bci3uc+EN4e9hD71hzrfNeWuOZ +5bM6mjoXeWn/QN9pxP09VG+aHbEFd0X8pXpjv4ttYTYvRfmdwKsr2xsRqFT4LmC 0MOb7IKjyi35BdhbiKNMehUFnY1HAhIIrAATelYbgQSgFAb5yB9KgBiKleWtmn5e 5WUjn4Mg0b0nIqEBIfmCm+ogLx2VgK952cUupCOR3OAe+EIpFLBlZQ0JHgzhBTIH Pb6DU2KuQeFjleHKjue2gl6hKQkO63zsNL74C8yXo1qGIXZPP5s7ZdeceeGHEUE3 aK0F9YZyb6X59I5tITGkXcR52X/B5KEy/5c1bFj/fmG6mjOYIhzl6uNcPYfTUVnC iED392+3QCd1cP4SHME+KG2gm9ynK08QKkoCbkLunoBC/Nohne/qxIgTJF2SBIO5 IQ+JVGdhOv8l0MlJXL29rFuX726+zUlDFjkz+2a+HbUdQy0ZhNcAsWacBqWFIrDZ mDBLLGeog1t43BldL8/i5BMbtoqzNGn/jpSf5VOudBTyXjnWhRW5DyKIA3KXpeRq 0OyQIwaeKPA=hemV -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce .

CVE-2022-0336

Kees van Vloten reported that Samba AD users with permission to
write to an account can impersonate arbitrary services.

For the oldstable distribution (buster), these problems have been fixed in version 2:4.9.5+dfsg-5+deb10u3. As per DSA 5015-1, CVE-2022-0336 has not been addressed for the oldstable distribution (buster).

For the stable distribution (bullseye), these problems have been fixed in version 2:4.13.13+dfsg-1~deb11u3. Additionally, some followup fixes for CVE-2020-25717 are included in this update (Cf.

For the detailed security status of samba please refer to its security tracker page at: https://security-tracker.debian.org/tracker/samba

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmIGeeJfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0SBDg//TfBB+gXbb751f6ltULdhmZUtEVL1Kyns8/LpEkKKKNU8AS8FOsLQs/o8 ICNJ3Fqv9XYqZ0Kc8w4w800jq6svy4nXkwRIiOzN0WqKXxNDZMzqDs0ACVyNQgE8 Pfugf+M5FAawPl5WhBtY+g+uUiwwjz7+UZ1eYcxLf1PT6lQLZ043WLT4mwUcB5vI 1vbmDwlLQXxkLHwvL8bmjiM0wt3E4w+6IdspEfC0wsR4biyoG2vkUWuPGuuNnsNO 8gDyuNaSRUCNEEDiMR8WBwwd9WTvvlrlmHvOS1mBQy2SX/2270apRWN0WSYJ16ee qgtWpB7aPNJGMS2z6lE7VgZ0l2mlvqoTm7SkXH3RjZTisXQjqKZ7LojckDghdWz2 XaWLQMFb7S2ezaDoUE8NcXWXxyzC0LrFVoiOsK69bXT7IoBtamWO/ZjChdEo+9rd X906cyro9CMtPIcb5Czc5Rj0EstbDplVr9Xma42KTJcYVCp5GQ/aJ0ZKtoFctITp ZbWACwfu5xj6XbpkAYnQDkMsjhrrlsTX804oODcUPhDdV/L+rI17Yz2ofqMpk8Pl Xpuk/YWVjheB1fLpAGh1e5OtXBbBodrlSoLWwz9pvwkZYzUQHBUcbWD9IXlbKG92 2mmOQDnboWcGLiKxMjch4B7nVmspOn5FFwZN0PP0/mMdFZpNqyU= =UWmB -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202309-06


                                       https://security.gentoo.org/

Severity: High Title: Samba: Multiple Vulnerabilities Date: September 17, 2023 Bugs: #820566, #821688, #830983, #832433, #861512, #866225, #869122, #878273, #880437, #886153, #903621, #905320, #910334 ID: 202309-06


Synopsis

Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.

Background

Samba is a suite of SMB and CIFS client/server programs.

Affected packages

Package Vulnerable Unaffected


net-fs/samba < 4.18.4 >= 4.18.4

Description

Multiple vulnerabilities have been discovered in Samba. Please review the CVE identifiers referenced below for details.

Impact

Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Resolution

All Samba users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/samba-4.18.4"

References

[ 1 ] CVE-2007-4559 https://nvd.nist.gov/vuln/detail/CVE-2007-4559 [ 2 ] CVE-2016-2124 https://nvd.nist.gov/vuln/detail/CVE-2016-2124 [ 3 ] CVE-2020-17049 https://nvd.nist.gov/vuln/detail/CVE-2020-17049 [ 4 ] CVE-2020-25717 https://nvd.nist.gov/vuln/detail/CVE-2020-25717 [ 5 ] CVE-2020-25718 https://nvd.nist.gov/vuln/detail/CVE-2020-25718 [ 6 ] CVE-2020-25719 https://nvd.nist.gov/vuln/detail/CVE-2020-25719 [ 7 ] CVE-2020-25721 https://nvd.nist.gov/vuln/detail/CVE-2020-25721 [ 8 ] CVE-2020-25722 https://nvd.nist.gov/vuln/detail/CVE-2020-25722 [ 9 ] CVE-2021-3670 https://nvd.nist.gov/vuln/detail/CVE-2021-3670 [ 10 ] CVE-2021-3738 https://nvd.nist.gov/vuln/detail/CVE-2021-3738 [ 11 ] CVE-2021-20251 https://nvd.nist.gov/vuln/detail/CVE-2021-20251 [ 12 ] CVE-2021-20316 https://nvd.nist.gov/vuln/detail/CVE-2021-20316 [ 13 ] CVE-2021-23192 https://nvd.nist.gov/vuln/detail/CVE-2021-23192 [ 14 ] CVE-2021-44141 https://nvd.nist.gov/vuln/detail/CVE-2021-44141 [ 15 ] CVE-2021-44142 https://nvd.nist.gov/vuln/detail/CVE-2021-44142 [ 16 ] CVE-2022-0336 https://nvd.nist.gov/vuln/detail/CVE-2022-0336 [ 17 ] CVE-2022-1615 https://nvd.nist.gov/vuln/detail/CVE-2022-1615 [ 18 ] CVE-2022-2031 https://nvd.nist.gov/vuln/detail/CVE-2022-2031 [ 19 ] CVE-2022-3437 https://nvd.nist.gov/vuln/detail/CVE-2022-3437 [ 20 ] CVE-2022-3592 https://nvd.nist.gov/vuln/detail/CVE-2022-3592 [ 21 ] CVE-2022-32742 https://nvd.nist.gov/vuln/detail/CVE-2022-32742 [ 22 ] CVE-2022-32743 https://nvd.nist.gov/vuln/detail/CVE-2022-32743 [ 23 ] CVE-2022-32744 https://nvd.nist.gov/vuln/detail/CVE-2022-32744 [ 24 ] CVE-2022-32745 https://nvd.nist.gov/vuln/detail/CVE-2022-32745 [ 25 ] CVE-2022-32746 https://nvd.nist.gov/vuln/detail/CVE-2022-32746 [ 26 ] CVE-2022-37966 https://nvd.nist.gov/vuln/detail/CVE-2022-37966 [ 27 ] CVE-2022-37967 https://nvd.nist.gov/vuln/detail/CVE-2022-37967 [ 28 ] CVE-2022-38023 https://nvd.nist.gov/vuln/detail/CVE-2022-38023 [ 29 ] CVE-2022-42898 https://nvd.nist.gov/vuln/detail/CVE-2022-42898 [ 30 ] CVE-2022-45141 https://nvd.nist.gov/vuln/detail/CVE-2022-45141 [ 31 ] CVE-2023-0225 https://nvd.nist.gov/vuln/detail/CVE-2023-0225 [ 32 ] CVE-2023-0614 https://nvd.nist.gov/vuln/detail/CVE-2023-0614 [ 33 ] CVE-2023-0922 https://nvd.nist.gov/vuln/detail/CVE-2023-0922

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/202309-06

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0295",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "samba",
        "scope": null,
        "trust": 2.1,
        "vendor": "samba",
        "version": null
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.4"
      },
      {
        "model": "samba",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "samba",
        "version": "4.15.0"
      },
      {
        "model": "enterprise linux for scientific computing",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "10.0"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.4"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "11.0"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "21.10"
      },
      {
        "model": "enterprise linux for ibm z systems",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.0"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.2"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "20.04"
      },
      {
        "model": "virtualization host",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "4.0"
      },
      {
        "model": "enterprise linux for power little endian eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.2"
      },
      {
        "model": "enterprise linux for ibm z systems eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.2"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.2"
      },
      {
        "model": "diskstation manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "synology",
        "version": "6.2"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "samba",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "samba",
        "version": "4.14.0"
      },
      {
        "model": "gluster storage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "3.5"
      },
      {
        "model": "enterprise linux for power little endian",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.0"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "35"
      },
      {
        "model": "samba",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "samba",
        "version": "4.15.5"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.2"
      },
      {
        "model": "enterprise linux for ibm z systems",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.1"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "34"
      },
      {
        "model": "enterprise linux server update services for sap solutions",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.2"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.0"
      },
      {
        "model": "diskstation manager",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "synology",
        "version": "6.2.4-25556.4"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "16.04"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.4"
      },
      {
        "model": "samba",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "samba",
        "version": "4.13.17"
      },
      {
        "model": "enterprise linux for power little endian eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.4"
      },
      {
        "model": "enterprise linux for ibm z systems eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.4"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "18.04"
      },
      {
        "model": "samba",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "samba",
        "version": "4.14.12"
      },
      {
        "model": "enterprise linux for power little endian",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.4"
      },
      {
        "model": "enterprise linux resilient storage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "enterprise linux for power big endian",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "14.04"
      },
      {
        "model": "codeready linux builder",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": null
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-22-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-245"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-244"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-44142"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "4.15.5",
                "versionStartIncluding": "4.15.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "4.14.12",
                "versionStartIncluding": "4.14.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "4.13.17",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "6.2.4-25556.4",
                "versionStartIncluding": "6.2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_resilient_storage:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:gluster_storage:3.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:codeready_linux_builder:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-44142"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Nguyen Hoang Thach (https://twitter.com/hi_im_d4rkn3ss) and Billy Jheng Bing-Jhong (https://twitter.com/st424204)",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-22-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-245"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-2719"
      }
    ],
    "trust": 2.0
  },
  "cve": "CVE-2021-44142",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "VHN-406753",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-44142",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.4,
            "userInteraction": "NONE",
            "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "ZDI",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-44142",
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "NONE",
            "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2021-44142",
            "trust": 1.4,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-44142",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "ZDI",
            "id": "CVE-2021-44142",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202201-2719",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-406753",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-22-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-245"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-244"
      },
      {
        "db": "VULHUB",
        "id": "VHN-406753"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-2719"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-44142"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide \"...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver.\" Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of AppleDouble entries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. \n\nThe specific flaw exists within the parsing of EA metadata when\nopening files in smbd. \n\nThe problem in vfs_fruit exists in the default configuration of the\nfruit VFS module using fruit:metadata=netatalk or fruit:resource=file. \nIf both options are set to different settings than the default values,\nthe system is not affected by the security issue. \n\n==================\nPatch Availability\n==================\n\nPatches addressing both these issues have been posted to:\n\n    https://www.samba.org/samba/security/\n\nAdditionally, Samba 4.13.17, 4.14.12 and 4.15.5 have been issued as\nsecurity releases to correct the defect. \n\n==================\nCVSSv3 calculation\n==================\n\nCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C\n\nBase score 9.9. \n\n==========\nWorkaround\n==========\n\nAs a workaround remove the \"fruit\" VFS module from the list of\nconfigured VFS objects in any \"vfs objects\" line in the Samba\nconfiguration smb.conf. \n\nNote that changing the VFS module settings fruit:metadata or\nfruit:resource to use the unaffected setting causes all stored\ninformation to be inaccessible and will make it appear to macOS\nclients as if the information is lost. \n\n\n=======\nCredits\n=======\n\nOriginally reported by Orange Tsai from DEVCORE. \n\nPatches provided by Ralph B\u00f6hme of the Samba team. \n\n==========================================================\n== Our Code, Our Bugs, Our Responsibility. \n== The Samba Team\n==========================================================\n. \n\nFor details on migrating Samba/CTDB configuration files, refer to: \n\nhttps://access.redhat.com/solutions/4311261\n\n5. This update provides\nthe corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. ==========================================================================\nUbuntu Security Notice USN-5260-1\nFebruary 01, 2022\n\nsamba vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 21.10\n- Ubuntu 20.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Samba. \n\nSoftware Description:\n- samba: SMB/CIFS file, print, and login server for Unix\n\nDetails:\n\nOrange Tsai discovered that the Samba vfs_fruit module incorrectly handled\ncertain memory operations. (CVE-2021-44142)\n\nMichael Hanselmann discovered that Samba incorrectly created directories. \nIn certain configurations, a remote attacker could possibly create a\ndirectory on the server outside of the shared directory. (CVE-2021-43566)\n\nKees van Vloten discovered that Samba incorrectly handled certain aliased\nSPN checks. A remote attacker could possibly use this issue to impersonate\nservices. (CVE-2022-0336)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 21.10:\n  samba                           2:4.13.17~dfsg-0ubuntu0.21.10.1\n\nUbuntu 20.04 LTS:\n  samba                           2:4.13.17~dfsg-0ubuntu0.21.04.1\n\nThis update uses a new upstream release, which includes additional bug\nfixes. In general, a standard system update will make all the necessary\nchanges. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Critical: samba security and bug fix update\nAdvisory ID:       RHSA-2022:0331-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2022:0331\nIssue date:        2022-01-31\nCVE Names:         CVE-2021-44142\n====================================================================\n1. Summary:\n\nAn update for samba is now available for Red Hat Enterprise Linux 8.4\nExtended Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat CodeReady Linux Builder EUS (v. 8.4) - aarch64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux BaseOS EUS (v.8.4) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. Description:\n\nSamba is an open-source implementation of the Server Message Block (SMB)\nprotocol and the related Common Internet File System (CIFS) protocol, which\nallow PC-compatible machines to share files, printers, and various\ninformation. \n\nSecurity Fix(es):\n\n* samba: Out-of-bounds heap read/write vulnerability in VFS module\nvfs_fruit allows code execution (CVE-2021-44142)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* Fix username map script regression introduced with CVE-2020-25717\n(BZ#2046173)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the smb service will be restarted\nautomatically. \n\n5. Package List:\n\nRed Hat Enterprise Linux BaseOS EUS (v.8.4):\n\nSource:\nsamba-4.13.3-9.el8_4.src.rpm\n\naarch64:\nctdb-4.13.3-9.el8_4.aarch64.rpm\nctdb-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nctdb-tests-4.13.3-9.el8_4.aarch64.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nlibsmbclient-4.13.3-9.el8_4.aarch64.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nlibwbclient-4.13.3-9.el8_4.aarch64.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm\npython3-samba-4.13.3-9.el8_4.aarch64.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.aarch64.rpm\npython3-samba-test-4.13.3-9.el8_4.aarch64.rpm\nsamba-4.13.3-9.el8_4.aarch64.rpm\nsamba-client-4.13.3-9.el8_4.aarch64.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-client-libs-4.13.3-9.el8_4.aarch64.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-common-libs-4.13.3-9.el8_4.aarch64.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-common-tools-4.13.3-9.el8_4.aarch64.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-debugsource-4.13.3-9.el8_4.aarch64.rpm\nsamba-krb5-printing-4.13.3-9.el8_4.aarch64.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-libs-4.13.3-9.el8_4.aarch64.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-test-4.13.3-9.el8_4.aarch64.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-test-libs-4.13.3-9.el8_4.aarch64.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-clients-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-krb5-locator-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-modules-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.aarch64.rpm\n\nnoarch:\nsamba-common-4.13.3-9.el8_4.noarch.rpm\nsamba-pidl-4.13.3-9.el8_4.noarch.rpm\n\nppc64le:\nctdb-4.13.3-9.el8_4.ppc64le.rpm\nctdb-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nctdb-tests-4.13.3-9.el8_4.ppc64le.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nlibsmbclient-4.13.3-9.el8_4.ppc64le.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nlibwbclient-4.13.3-9.el8_4.ppc64le.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\npython3-samba-4.13.3-9.el8_4.ppc64le.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\npython3-samba-test-4.13.3-9.el8_4.ppc64le.rpm\nsamba-4.13.3-9.el8_4.ppc64le.rpm\nsamba-client-4.13.3-9.el8_4.ppc64le.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-client-libs-4.13.3-9.el8_4.ppc64le.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-common-libs-4.13.3-9.el8_4.ppc64le.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-common-tools-4.13.3-9.el8_4.ppc64le.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-debugsource-4.13.3-9.el8_4.ppc64le.rpm\nsamba-krb5-printing-4.13.3-9.el8_4.ppc64le.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-libs-4.13.3-9.el8_4.ppc64le.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-test-4.13.3-9.el8_4.ppc64le.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-test-libs-4.13.3-9.el8_4.ppc64le.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-clients-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-krb5-locator-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-modules-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\n\ns390x:\nctdb-4.13.3-9.el8_4.s390x.rpm\nctdb-debuginfo-4.13.3-9.el8_4.s390x.rpm\nctdb-tests-4.13.3-9.el8_4.s390x.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.s390x.rpm\nlibsmbclient-4.13.3-9.el8_4.s390x.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm\nlibwbclient-4.13.3-9.el8_4.s390x.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm\npython3-samba-4.13.3-9.el8_4.s390x.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.s390x.rpm\npython3-samba-test-4.13.3-9.el8_4.s390x.rpm\nsamba-4.13.3-9.el8_4.s390x.rpm\nsamba-client-4.13.3-9.el8_4.s390x.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-client-libs-4.13.3-9.el8_4.s390x.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-common-libs-4.13.3-9.el8_4.s390x.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-common-tools-4.13.3-9.el8_4.s390x.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-debugsource-4.13.3-9.el8_4.s390x.rpm\nsamba-krb5-printing-4.13.3-9.el8_4.s390x.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-libs-4.13.3-9.el8_4.s390x.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-test-4.13.3-9.el8_4.s390x.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-test-libs-4.13.3-9.el8_4.s390x.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-clients-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-krb5-locator-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-modules-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.s390x.rpm\n\nx86_64:\nctdb-4.13.3-9.el8_4.x86_64.rpm\nctdb-debuginfo-4.13.3-9.el8_4.i686.rpm\nctdb-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nctdb-tests-4.13.3-9.el8_4.x86_64.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.i686.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nlibsmbclient-4.13.3-9.el8_4.i686.rpm\nlibsmbclient-4.13.3-9.el8_4.x86_64.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.i686.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nlibwbclient-4.13.3-9.el8_4.i686.rpm\nlibwbclient-4.13.3-9.el8_4.x86_64.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.i686.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm\npython3-samba-4.13.3-9.el8_4.i686.rpm\npython3-samba-4.13.3-9.el8_4.x86_64.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.i686.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.x86_64.rpm\npython3-samba-test-4.13.3-9.el8_4.x86_64.rpm\nsamba-4.13.3-9.el8_4.x86_64.rpm\nsamba-client-4.13.3-9.el8_4.x86_64.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-client-libs-4.13.3-9.el8_4.i686.rpm\nsamba-client-libs-4.13.3-9.el8_4.x86_64.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-common-libs-4.13.3-9.el8_4.x86_64.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-common-tools-4.13.3-9.el8_4.x86_64.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-debugsource-4.13.3-9.el8_4.i686.rpm\nsamba-debugsource-4.13.3-9.el8_4.x86_64.rpm\nsamba-krb5-printing-4.13.3-9.el8_4.x86_64.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-libs-4.13.3-9.el8_4.i686.rpm\nsamba-libs-4.13.3-9.el8_4.x86_64.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-test-4.13.3-9.el8_4.x86_64.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-test-libs-4.13.3-9.el8_4.x86_64.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-vfs-glusterfs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-clients-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-krb5-locator-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-modules-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-modules-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winexe-4.13.3-9.el8_4.x86_64.rpm\nsamba-winexe-debuginfo-4.13.3-9.el8_4.x86_64.rpm\n\nRed Hat CodeReady Linux Builder EUS (v. 8.4):\n\naarch64:\nctdb-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nlibsmbclient-devel-4.13.3-9.el8_4.aarch64.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nlibwbclient-devel-4.13.3-9.el8_4.aarch64.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-debugsource-4.13.3-9.el8_4.aarch64.rpm\nsamba-devel-4.13.3-9.el8_4.aarch64.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.aarch64.rpm\n\nppc64le:\nctdb-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nlibsmbclient-devel-4.13.3-9.el8_4.ppc64le.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nlibwbclient-devel-4.13.3-9.el8_4.ppc64le.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-debugsource-4.13.3-9.el8_4.ppc64le.rpm\nsamba-devel-4.13.3-9.el8_4.ppc64le.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\n\ns390x:\nctdb-debuginfo-4.13.3-9.el8_4.s390x.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.s390x.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm\nlibsmbclient-devel-4.13.3-9.el8_4.s390x.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm\nlibwbclient-devel-4.13.3-9.el8_4.s390x.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-debugsource-4.13.3-9.el8_4.s390x.rpm\nsamba-devel-4.13.3-9.el8_4.s390x.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.s390x.rpm\n\nx86_64:\nctdb-debuginfo-4.13.3-9.el8_4.i686.rpm\nctdb-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.i686.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.i686.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nlibsmbclient-devel-4.13.3-9.el8_4.i686.rpm\nlibsmbclient-devel-4.13.3-9.el8_4.x86_64.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.i686.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nlibwbclient-devel-4.13.3-9.el8_4.i686.rpm\nlibwbclient-devel-4.13.3-9.el8_4.x86_64.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.i686.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-debugsource-4.13.3-9.el8_4.i686.rpm\nsamba-debugsource-4.13.3-9.el8_4.x86_64.rpm\nsamba-devel-4.13.3-9.el8_4.i686.rpm\nsamba-devel-4.13.3-9.el8_4.x86_64.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-vfs-glusterfs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winexe-debuginfo-4.13.3-9.el8_4.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2021-44142\nhttps://access.redhat.com/security/updates/classification/#critical\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2022 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n0OyQIwaeKPA=hemV\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nCVE-2022-0336\n\n    Kees van Vloten reported that Samba AD users with permission to\n    write to an account can impersonate arbitrary services. \n\nFor the oldstable distribution (buster), these problems have been fixed\nin version 2:4.9.5+dfsg-5+deb10u3. As per DSA 5015-1, CVE-2022-0336 has\nnot been addressed for the oldstable distribution (buster). \n\nFor the stable distribution (bullseye), these problems have been fixed\nin version 2:4.13.13+dfsg-1~deb11u3. Additionally, some followup fixes\nfor CVE-2020-25717 are included in this update (Cf. \n\nFor the detailed security status of samba please refer to its security\ntracker page at:\nhttps://security-tracker.debian.org/tracker/samba\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\n2mmOQDnboWcGLiKxMjch4B7nVmspOn5FFwZN0PP0/mMdFZpNqyU=\n=UWmB\n-----END PGP SIGNATURE-----\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 202309-06\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n    Title: Samba: Multiple Vulnerabilities\n     Date: September 17, 2023\n     Bugs: #820566, #821688, #830983, #832433, #861512, #866225, #869122, #878273, #880437, #886153, #903621, #905320, #910334\n       ID: 202309-06\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been discovered in Samba, the worst of\nwhich could result in root remote code execution. \n\nBackground\n==========\n\nSamba is a suite of SMB and CIFS client/server programs. \n\nAffected packages\n=================\n\nPackage       Vulnerable    Unaffected\n------------  ------------  ------------\nnet-fs/samba  \u003c 4.18.4      \u003e= 4.18.4\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Samba. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Samba users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=net-fs/samba-4.18.4\"\n\nReferences\n==========\n\n[ 1 ] CVE-2007-4559\n      https://nvd.nist.gov/vuln/detail/CVE-2007-4559\n[ 2 ] CVE-2016-2124\n      https://nvd.nist.gov/vuln/detail/CVE-2016-2124\n[ 3 ] CVE-2020-17049\n      https://nvd.nist.gov/vuln/detail/CVE-2020-17049\n[ 4 ] CVE-2020-25717\n      https://nvd.nist.gov/vuln/detail/CVE-2020-25717\n[ 5 ] CVE-2020-25718\n      https://nvd.nist.gov/vuln/detail/CVE-2020-25718\n[ 6 ] CVE-2020-25719\n      https://nvd.nist.gov/vuln/detail/CVE-2020-25719\n[ 7 ] CVE-2020-25721\n      https://nvd.nist.gov/vuln/detail/CVE-2020-25721\n[ 8 ] CVE-2020-25722\n      https://nvd.nist.gov/vuln/detail/CVE-2020-25722\n[ 9 ] CVE-2021-3670\n      https://nvd.nist.gov/vuln/detail/CVE-2021-3670\n[ 10 ] CVE-2021-3738\n      https://nvd.nist.gov/vuln/detail/CVE-2021-3738\n[ 11 ] CVE-2021-20251\n      https://nvd.nist.gov/vuln/detail/CVE-2021-20251\n[ 12 ] CVE-2021-20316\n      https://nvd.nist.gov/vuln/detail/CVE-2021-20316\n[ 13 ] CVE-2021-23192\n      https://nvd.nist.gov/vuln/detail/CVE-2021-23192\n[ 14 ] CVE-2021-44141\n      https://nvd.nist.gov/vuln/detail/CVE-2021-44141\n[ 15 ] CVE-2021-44142\n      https://nvd.nist.gov/vuln/detail/CVE-2021-44142\n[ 16 ] CVE-2022-0336\n      https://nvd.nist.gov/vuln/detail/CVE-2022-0336\n[ 17 ] CVE-2022-1615\n      https://nvd.nist.gov/vuln/detail/CVE-2022-1615\n[ 18 ] CVE-2022-2031\n      https://nvd.nist.gov/vuln/detail/CVE-2022-2031\n[ 19 ] CVE-2022-3437\n      https://nvd.nist.gov/vuln/detail/CVE-2022-3437\n[ 20 ] CVE-2022-3592\n      https://nvd.nist.gov/vuln/detail/CVE-2022-3592\n[ 21 ] CVE-2022-32742\n      https://nvd.nist.gov/vuln/detail/CVE-2022-32742\n[ 22 ] CVE-2022-32743\n      https://nvd.nist.gov/vuln/detail/CVE-2022-32743\n[ 23 ] CVE-2022-32744\n      https://nvd.nist.gov/vuln/detail/CVE-2022-32744\n[ 24 ] CVE-2022-32745\n      https://nvd.nist.gov/vuln/detail/CVE-2022-32745\n[ 25 ] CVE-2022-32746\n      https://nvd.nist.gov/vuln/detail/CVE-2022-32746\n[ 26 ] CVE-2022-37966\n      https://nvd.nist.gov/vuln/detail/CVE-2022-37966\n[ 27 ] CVE-2022-37967\n      https://nvd.nist.gov/vuln/detail/CVE-2022-37967\n[ 28 ] CVE-2022-38023\n      https://nvd.nist.gov/vuln/detail/CVE-2022-38023\n[ 29 ] CVE-2022-42898\n      https://nvd.nist.gov/vuln/detail/CVE-2022-42898\n[ 30 ] CVE-2022-45141\n      https://nvd.nist.gov/vuln/detail/CVE-2022-45141\n[ 31 ] CVE-2023-0225\n      https://nvd.nist.gov/vuln/detail/CVE-2023-0225\n[ 32 ] CVE-2023-0614\n      https://nvd.nist.gov/vuln/detail/CVE-2023-0614\n[ 33 ] CVE-2023-0922\n      https://nvd.nist.gov/vuln/detail/CVE-2023-0922\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202309-06\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2023 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-44142"
      },
      {
        "db": "CERT/CC",
        "id": "VU#119678"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-245"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-244"
      },
      {
        "db": "VULHUB",
        "id": "VHN-406753"
      },
      {
        "db": "PACKETSTORM",
        "id": "165801"
      },
      {
        "db": "PACKETSTORM",
        "id": "165905"
      },
      {
        "db": "PACKETSTORM",
        "id": "165842"
      },
      {
        "db": "PACKETSTORM",
        "id": "165797"
      },
      {
        "db": "PACKETSTORM",
        "id": "165796"
      },
      {
        "db": "PACKETSTORM",
        "id": "165793"
      },
      {
        "db": "PACKETSTORM",
        "id": "169234"
      },
      {
        "db": "PACKETSTORM",
        "id": "174695"
      }
    ],
    "trust": 4.32
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-406753",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-406753"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-44142",
        "trust": 5.5
      },
      {
        "db": "CERT/CC",
        "id": "VU#119678",
        "trust": 2.5
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-246",
        "trust": 1.3
      },
      {
        "db": "PACKETSTORM",
        "id": "165842",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-15846",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-15833",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-245",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-16156",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-244",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "166137",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "165906",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "169234",
        "trust": 0.7
      },
      {
        "db": "CS-HELP",
        "id": "SB2022032506",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022021713",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022041954",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022021902",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022021417",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022051734",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022020807",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022022408",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0489",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0795",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0600",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0619",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-2719",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "165793",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "165791",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "165796",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "165797",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "165905",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "165801",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "166138",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "165789",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "165788",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "165790",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-406753",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "174695",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#119678"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-245"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-244"
      },
      {
        "db": "VULHUB",
        "id": "VHN-406753"
      },
      {
        "db": "PACKETSTORM",
        "id": "165801"
      },
      {
        "db": "PACKETSTORM",
        "id": "165905"
      },
      {
        "db": "PACKETSTORM",
        "id": "165842"
      },
      {
        "db": "PACKETSTORM",
        "id": "165797"
      },
      {
        "db": "PACKETSTORM",
        "id": "165796"
      },
      {
        "db": "PACKETSTORM",
        "id": "165793"
      },
      {
        "db": "PACKETSTORM",
        "id": "165791"
      },
      {
        "db": "PACKETSTORM",
        "id": "169234"
      },
      {
        "db": "PACKETSTORM",
        "id": "174695"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-2719"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-44142"
      }
    ]
  },
  "id": "VAR-202201-0295",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-406753"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-07-23T20:12:56.487000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Samba has issued an update to correct this vulnerability.",
        "trust": 2.1,
        "url": "https://www.samba.org/samba/security/cve-2021-44142.html"
      },
      {
        "title": "Samba Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=184448"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-22-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-245"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-244"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-2719"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-125",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-787",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-406753"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-44142"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.8,
        "url": "https://www.samba.org/samba/security/cve-2021-44142.html"
      },
      {
        "trust": 1.7,
        "url": "https://kb.cert.org/vuls/id/119678"
      },
      {
        "trust": 1.7,
        "url": "https://bugzilla.samba.org/show_bug.cgi?id=14914"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin"
      },
      {
        "trust": 1.1,
        "url": "https://security.gentoo.org/glsa/202309-06"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-44142"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/cve/cve-2021-44142"
      },
      {
        "trust": 0.8,
        "url": "cve-2021-44142  "
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022051734"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0795"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/samba-buffer-overflow-via-vfs-module-vfs-fruit-37416"
      },
      {
        "trust": 0.6,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-22-246/"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022032506"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/169234/debian-security-advisory-5071-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022021713"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022021417"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022041954"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/165842/ubuntu-security-notice-usn-5260-3.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/165906/red-hat-security-advisory-2022-0457-03.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022020807"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0619"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022021902"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2021-44142/"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022022408"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0600"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/166137/red-hat-security-advisory-2022-0664-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0489"
      },
      {
        "trust": 0.3,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/updates/classification/#critical"
      },
      {
        "trust": 0.3,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.3,
        "url": "https://ubuntu.com/security/notices/usn-5260-1"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0336"
      },
      {
        "trust": 0.1,
        "url": "https://www.samba.org/samba/security/"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/solutions/4311261"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:0458"
      },
      {
        "trust": 0.1,
        "url": "https://ubuntu.com/security/notices/usn-5260-3"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43566"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/samba/2:4.13.17~dfsg-0ubuntu0.21.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/samba/2:4.13.17~dfsg-0ubuntu0.21.10.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/samba/2:4.7.6+dfsg~ubuntu-0ubuntu2.28"
      },
      {
        "trust": 0.1,
        "url": "https://ubuntu.com/security/notices/usn-5260-2"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:0331"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:0330"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "https://security-tracker.debian.org/tracker/samba"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25719"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37966"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-3592"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25717"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-1615"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25722"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32742"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25718"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-44141"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42898"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3738"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32746"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3670"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32744"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37967"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20316"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32743"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-17049"
      },
      {
        "trust": 0.1,
        "url": "https://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38023"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2023-0922"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-3437"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20251"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2023-0614"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2007-4559"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32745"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "https://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25721"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2124"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-45141"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-2031"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2023-0225"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23192"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#119678"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-245"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-244"
      },
      {
        "db": "VULHUB",
        "id": "VHN-406753"
      },
      {
        "db": "PACKETSTORM",
        "id": "165801"
      },
      {
        "db": "PACKETSTORM",
        "id": "165905"
      },
      {
        "db": "PACKETSTORM",
        "id": "165842"
      },
      {
        "db": "PACKETSTORM",
        "id": "165797"
      },
      {
        "db": "PACKETSTORM",
        "id": "165796"
      },
      {
        "db": "PACKETSTORM",
        "id": "165793"
      },
      {
        "db": "PACKETSTORM",
        "id": "165791"
      },
      {
        "db": "PACKETSTORM",
        "id": "169234"
      },
      {
        "db": "PACKETSTORM",
        "id": "174695"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-2719"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-44142"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#119678"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-245"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-244"
      },
      {
        "db": "VULHUB",
        "id": "VHN-406753"
      },
      {
        "db": "PACKETSTORM",
        "id": "165801"
      },
      {
        "db": "PACKETSTORM",
        "id": "165905"
      },
      {
        "db": "PACKETSTORM",
        "id": "165842"
      },
      {
        "db": "PACKETSTORM",
        "id": "165797"
      },
      {
        "db": "PACKETSTORM",
        "id": "165796"
      },
      {
        "db": "PACKETSTORM",
        "id": "165793"
      },
      {
        "db": "PACKETSTORM",
        "id": "165791"
      },
      {
        "db": "PACKETSTORM",
        "id": "169234"
      },
      {
        "db": "PACKETSTORM",
        "id": "174695"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-2719"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-44142"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-01-31T00:00:00",
        "db": "CERT/CC",
        "id": "VU#119678"
      },
      {
        "date": "2022-02-01T00:00:00",
        "db": "ZDI",
        "id": "ZDI-22-246"
      },
      {
        "date": "2022-02-01T00:00:00",
        "db": "ZDI",
        "id": "ZDI-22-245"
      },
      {
        "date": "2022-02-01T00:00:00",
        "db": "ZDI",
        "id": "ZDI-22-244"
      },
      {
        "date": "2022-02-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-406753"
      },
      {
        "date": "2022-02-02T16:21:28",
        "db": "PACKETSTORM",
        "id": "165801"
      },
      {
        "date": "2022-02-09T16:03:23",
        "db": "PACKETSTORM",
        "id": "165905"
      },
      {
        "date": "2022-02-03T16:31:23",
        "db": "PACKETSTORM",
        "id": "165842"
      },
      {
        "date": "2022-02-01T17:04:22",
        "db": "PACKETSTORM",
        "id": "165797"
      },
      {
        "date": "2022-02-01T17:04:16",
        "db": "PACKETSTORM",
        "id": "165796"
      },
      {
        "date": "2022-02-01T17:02:58",
        "db": "PACKETSTORM",
        "id": "165793"
      },
      {
        "date": "2022-02-01T17:02:44",
        "db": "PACKETSTORM",
        "id": "165791"
      },
      {
        "date": "2022-02-28T20:12:00",
        "db": "PACKETSTORM",
        "id": "169234"
      },
      {
        "date": "2023-09-18T13:42:53",
        "db": "PACKETSTORM",
        "id": "174695"
      },
      {
        "date": "2022-01-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202201-2719"
      },
      {
        "date": "2022-02-21T15:15:07.380000",
        "db": "NVD",
        "id": "CVE-2021-44142"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-06-27T00:00:00",
        "db": "CERT/CC",
        "id": "VU#119678"
      },
      {
        "date": "2022-02-01T00:00:00",
        "db": "ZDI",
        "id": "ZDI-22-246"
      },
      {
        "date": "2022-02-01T00:00:00",
        "db": "ZDI",
        "id": "ZDI-22-245"
      },
      {
        "date": "2022-02-01T00:00:00",
        "db": "ZDI",
        "id": "ZDI-22-244"
      },
      {
        "date": "2022-02-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-406753"
      },
      {
        "date": "2022-12-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202201-2719"
      },
      {
        "date": "2023-11-07T03:39:33.470000",
        "db": "NVD",
        "id": "CVE-2021-44142"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "165801"
      },
      {
        "db": "PACKETSTORM",
        "id": "165842"
      },
      {
        "db": "PACKETSTORM",
        "id": "165797"
      },
      {
        "db": "PACKETSTORM",
        "id": "165796"
      },
      {
        "db": "PACKETSTORM",
        "id": "174695"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-2719"
      }
    ],
    "trust": 1.1
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Samba vfs_fruit module insecurely handles extended file attributes",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#119678"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202201-2719"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.