Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.0619 samba security update 14 February 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: samba Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2022-0336 CVE-2021-44142 CVE-2020-25717 Reference: ESB-2022.0600 ESB-2022.0559 ESB-2022.0510 ESB-2022.0489 Original Bulletin: http://www.debian.org/security/2022/dsa-5071 Comment: CVSS (Max): 9.9 CVE-2021-44142 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) CVSS Source: Red Hat - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-5071-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso February 11, 2022 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : samba CVE ID : CVE-2021-44142 CVE-2022-0336 Debian Bug : 1001068 1004693 1004694 Several vulnerabilities were discovered in Samba, a SMB/CIFS file, print, and login server for Unix. CVE-2021-44142 Orange Tsai reported an out-of-bounds heap write vulnerability in the VFS module vfs_fruit, which could result in remote execution of arbitrary code as root. CVE-2022-0336 Kees van Vloten reported that Samba AD users with permission to write to an account can impersonate arbitrary services. For the oldstable distribution (buster), these problems have been fixed in version 2:4.9.5+dfsg-5+deb10u3. As per DSA 5015-1, CVE-2022-0336 has not been addressed for the oldstable distribution (buster). For the stable distribution (bullseye), these problems have been fixed in version 2:4.13.13+dfsg-1~deb11u3. Additionally, some followup fixes for CVE-2020-25717 are included in this update (Cf. #1001068). We recommend that you upgrade your samba packages. For the detailed security status of samba please refer to its security tracker page at: https://security-tracker.debian.org/tracker/samba Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmIGeeJfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0SBDg//TfBB+gXbb751f6ltULdhmZUtEVL1Kyns8/LpEkKKKNU8AS8FOsLQs/o8 ICNJ3Fqv9XYqZ0Kc8w4w800jq6svy4nXkwRIiOzN0WqKXxNDZMzqDs0ACVyNQgE8 Pfugf+M5FAawPl5WhBtY+g+uUiwwjz7+UZ1eYcxLf1PT6lQLZ043WLT4mwUcB5vI 1vbmDwlLQXxkLHwvL8bmjiM0wt3E4w+6IdspEfC0wsR4biyoG2vkUWuPGuuNnsNO 8gDyuNaSRUCNEEDiMR8WBwwd9WTvvlrlmHvOS1mBQy2SX/2270apRWN0WSYJ16ee qgtWpB7aPNJGMS2z6lE7VgZ0l2mlvqoTm7SkXH3RjZTisXQjqKZ7LojckDghdWz2 XaWLQMFb7S2ezaDoUE8NcXWXxyzC0LrFVoiOsK69bXT7IoBtamWO/ZjChdEo+9rd X906cyro9CMtPIcb5Czc5Rj0EstbDplVr9Xma42KTJcYVCp5GQ/aJ0ZKtoFctITp ZbWACwfu5xj6XbpkAYnQDkMsjhrrlsTX804oODcUPhDdV/L+rI17Yz2ofqMpk8Pl Xpuk/YWVjheB1fLpAGh1e5OtXBbBodrlSoLWwz9pvwkZYzUQHBUcbWD9IXlbKG92 2mmOQDnboWcGLiKxMjch4B7nVmspOn5FFwZN0PP0/mMdFZpNqyU= =UWmB - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYgmhCeNLKJtyKPYoAQhDyw/+KbdMDy8gtRv6Pz6XnuKdPCeY5RnDb+G2 x7MwieUDDPCUJRJWdPGjfc1XjVflEqzgJON8qw9DbSKdyVNtGSMdZfQwfUMasvmC a6o2QlsfeSf7JkIWV/5rLAmCdBisvfWI1xmgaeuZfe2cn/9dogn5ppbeuSfmPLZP XgFAXVeXEkj8zd2Er+Ve/SnYT/KXLXeGYHzC6Q7l6/L3wIacHDQuMzt5Rfj0nmD7 zcEnRcbVQ0R6gX84/0LSsxhILM72I4K4RYZzGfyz+/h7lM3tc8EqsGJ/yJCkbhb9 f3am0PtjlkF+L49/mhEXQOLykSle8bobc2DiiZT1zYH6M/OceZn6tTwmx5HS1+d5 0PDAhvlFWnFxHBqWc5Mz0TOWoaQTfldPYlAY5D6BkzvFO/9Oct262kwze8kgTnm0 b1mc/XlTj7GFtaL2umWBH5/S0JGuPDHhwt4rjcU6rdQmBfDbUxDqo1PlrC8biC4y eNrUciDW1xfoLCzH1RerTGAfJNz6vzayEI8gGYjO+Nn28DtT3bylvdJ9T/92PcDs 4UnUJpJNsnMOQycvL6Ir2ABNs5drpRu/TNDOcizRkD1qQVMqELDgH75X6UVZKFa7 XQhNauJD7m7/AyXNSA3voB+9/OzTMtbrs1jsu0gnDkAP3nbzsxTXghzuYq0uLQ2S C5ZgvM06DMg= =eZ87 -----END PGP SIGNATURE-----