vulnerability
Alma Linux: CVE-2023-4091: Moderate: samba security update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:L/Au:S/C:N/I:C/A:N) | Nov 3, 2023 | Nov 16, 2023 | Jan 30, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:N/I:C/A:N)
Published
Nov 3, 2023
Added
Nov 16, 2023
Modified
Jan 30, 2025
Description
A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.
Solution(s)
alma-upgrade-ctdbalma-upgrade-libnetapialma-upgrade-libnetapi-develalma-upgrade-libsmbclientalma-upgrade-libsmbclient-develalma-upgrade-libwbclientalma-upgrade-libwbclient-develalma-upgrade-python3-sambaalma-upgrade-python3-samba-dcalma-upgrade-python3-samba-develalma-upgrade-python3-samba-testalma-upgrade-sambaalma-upgrade-samba-clientalma-upgrade-samba-client-libsalma-upgrade-samba-commonalma-upgrade-samba-common-libsalma-upgrade-samba-common-toolsalma-upgrade-samba-dc-libsalma-upgrade-samba-dcerpcalma-upgrade-samba-develalma-upgrade-samba-krb5-printingalma-upgrade-samba-ldb-ldap-modulesalma-upgrade-samba-libsalma-upgrade-samba-pidlalma-upgrade-samba-testalma-upgrade-samba-test-libsalma-upgrade-samba-toolsalma-upgrade-samba-usersharesalma-upgrade-samba-vfs-iouringalma-upgrade-samba-winbindalma-upgrade-samba-winbind-clientsalma-upgrade-samba-winbind-krb5-locatoralma-upgrade-samba-winbind-modulesalma-upgrade-samba-winexe

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.