"This are security releases in order to address the following defects:
o CVE-2023-0225: An incomplete access check on dnsHostName allows
but otherwise unprivileged users to delete this attribute
any object in the directory.
o CVE-2023-0922: The Samba AD DC administration tool, when operating against a
remote LDAP server, will by default send new or reset
passwords over a signed-only connection.
o CVE-2023-0614: The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919
Confidential attribute disclosure via LDAP filters was
insufficient and an attacker may be able to obtain
confidential BitLocker recovery keys from a Samba AD DC.
Installations with such secrets in their Samba AD should
assume they have been obtained and need replacing.
These CVEs appear to have been fixed in 4.18.1, released 29th March, see https://www.samba.org/samba/history/
However, more recent is 4.18.2 which was released Apr 19, 2023; release notes at https://www.samba.org/samba/history/samba-4.18.2.html
In addition to bumping 4.17 (to 4.17.8) - https://bugs.gentoo.org/906104 and presumably 4.18 (to 4.18.2) and 4.16 (to 4.16.10) we may also want to drop 4.15 given it is marked as EOL per https://wiki.samba.org/index.php/Samba_Release_Planning
The bug has been referenced in the following commit(s):
Author: GLSAMaker <firstname.lastname@example.org>
AuthorDate: 2023-09-17 05:56:23 +0000
Commit: Sam James <email@example.com>
CommitDate: 2023-09-17 05:56:46 +0000
[ GLSA 202309-06 ] Samba: Multiple Vulnerabilities
Signed-off-by: GLSAMaker <firstname.lastname@example.org>
Signed-off-by: Sam James <email@example.com>
glsa-202309-06.xml | 86 ++++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 86 insertions(+)