Bug 6859 - [Anolis OS 23] Bugfix for CVE-2023-3961
Summary: [Anolis OS 23] Bugfix for CVE-2023-3961
Status: RESOLVED FIXED
Alias: None
Product: Anolis OS 23
Classification: Anolis OS
Component: BaseOS Packages (show other bugs) BaseOS Packages
Version: unspecified
Hardware: All Linux
: P4-Low S4-trivial
Target Milestone: ---
Assignee: happy_orange
QA Contact: bolong_tbl
URL:
Whiteboard:
Keywords: CVE
Depends on:
Blocks:
 
Reported: 2023-10-17 11:49 UTC by 小龙
Modified: 2023-10-17 11:49 UTC (History)
0 users

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description 小龙 admin 2023-10-17 11:49:30 UTC
Description:
A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes.

Broken commit info:

Bugfix commit info:
https://download.samba.orghttps://download.samba.org/pub/samba/ftp/patches/security/samba-4.18.8-security-2023-10-10.patch
https://download.samba.orghttps://download.samba.org/pub/samba/ftp/patches/security/samba-4.17.12-security-2023-10-10.patch
https://download.samba.orghttps://download.samba.org/pub/samba/ftp/patches/security/samba-4.19.1-security-2023-10-10.patch
Comment 1 小龙 admin 2023-10-17 11:49:44 UTC
PR: 
https://gitee.com/src-anolis-os/samba/pulls/36