Upstream has issued an advisory on March 11: http://www.samba.org/samba/security/CVE-2013-4496 The issue is fixed upstream in 3.6.23, 4.0.16, and 4.1.6. Updated packages uploaded for Mageia 4 and Cauldron. Patched package uploaded for Mageia 3. Advisory: ======================== Updated samba packages fix security vulnerability: In Samba before 3.6.23, the SAMR server neglects to ensure that attempted password changes will update the bad password count, and does not set the lockout flags. This would allow a user unlimited attempts against the password by simply calling ChangePasswordUser2 repeatedly. This is available without any other authentication (CVE-2013-4496). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496 http://www.samba.org/samba/security/CVE-2013-4496 ======================== Updated packages in core/updates_testing: ======================== samba-server-3.6.15-1.4.mga3 samba-client-3.6.15-1.4.mga3 samba-common-3.6.15-1.4.mga3 samba-doc-3.6.15-1.4.mga3 samba-swat-3.6.15-1.4.mga3 samba-winbind-3.6.15-1.4.mga3 nss_wins-3.6.15-1.4.mga3 libsmbclient0-3.6.15-1.4.mga3 libsmbclient0-devel-3.6.15-1.4.mga3 libsmbclient0-static-devel-3.6.15-1.4.mga3 libnetapi0-3.6.15-1.4.mga3 libnetapi-devel-3.6.15-1.4.mga3 libsmbsharemodes0-3.6.15-1.4.mga3 libsmbsharemodes-devel-3.6.15-1.4.mga3 libwbclient0-3.6.15-1.4.mga3 libwbclient-devel-3.6.15-1.4.mga3 samba-virusfilter-clamav-3.6.15-1.4.mga3 samba-virusfilter-fsecure-3.6.15-1.4.mga3 samba-virusfilter-sophos-3.6.15-1.4.mga3 samba-domainjoin-gui-3.6.15-1.4.mga3 samba-server-3.6.23-1.mga4 samba-client-3.6.23-1.mga4 samba-common-3.6.23-1.mga4 samba-doc-3.6.23-1.mga4 samba-swat-3.6.23-1.mga4 samba-winbind-3.6.23-1.mga4 nss_wins-3.6.23-1.mga4 libsmbclient0-3.6.23-1.mga4 libsmbclient0-devel-3.6.23-1.mga4 libsmbclient0-static-devel-3.6.23-1.mga4 libnetapi0-3.6.23-1.mga4 libnetapi-devel-3.6.23-1.mga4 libsmbsharemodes0-3.6.23-1.mga4 libsmbsharemodes-devel-3.6.23-1.mga4 libwbclient0-3.6.23-1.mga4 libwbclient-devel-3.6.23-1.mga4 samba-virusfilter-clamav-3.6.23-1.mga4 samba-virusfilter-fsecure-3.6.23-1.mga4 samba-virusfilter-sophos-3.6.23-1.mga4 samba-domainjoin-gui-3.6.23-1.mga4 from SRPMS: samba-3.6.15-1.4.mga3.src.rpm samba-3.6.23-1.mga4.src.rpm Reproducible: Steps to Reproduce:
Whiteboard: (none) => MGA3TOO
Severity: normal => major
URL: (none) => http://lwn.net/Vulnerabilities/590754/
No poc provided, so just need to test that samba is working. Advisory added to svn.
CC: (none) => davidwhodginsWhiteboard: MGA3TOO => MGA3TOO advisory
Tested mga4_64, Testing complete for samba-3.6.23-1.mga4, Ok for me nothing to report, seems work fine here. samba-server-3.6.23-1.mga4 samba-client-3.6.23-1.mga4 samba-common-3.6.23-1.mga4 samba-doc-3.6.23-1.mga4 samba-swat-3.6.23-1.mga4 samba-winbind-3.6.23-1.mga4 libsmbclient0-3.6.23-1.mga4 libsmbsharemodes0-3.6.23-1.mga4 libwbclient0-3.6.23-1.mga4
CC: (none) => geiger.david68210Whiteboard: MGA3TOO advisory => MGA3TOO advisory mga4-ok-64
Whiteboard: MGA3TOO advisory mga4-ok-64 => MGA3TOO advisory mga4-64-ok
Tested mga4_32, Testing complete for samba-3.6.23-1.mga4, Ok for me nothing to report, seems work fine here too. samba-server-3.6.23-1.mga4 samba-client-3.6.23-1.mga4 samba-common-3.6.23-1.mga4 samba-doc-3.6.23-1.mga4 samba-swat-3.6.23-1.mga4 samba-winbind-3.6.23-1.mga4 libsmbclient0-3.6.23-1.mga4 libsmbsharemodes0-3.6.23-1.mga4 libwbclient0-3.6.23-1.mga4
Whiteboard: MGA3TOO advisory mga4-64-ok => MGA3TOO advisory mga4-64-ok mga4-32-ok
Tested mga3_32, Testing complete for samba-3.6.15-1.4.mga3, Ok for me nothing to report, seems work fine here. samba-server-3.6.15-1.4.mga3 samba-client-3.6.15-1.4.mga3 samba-common-3.6.15-1.4.mga3 samba-doc-3.6.15-1.4.mga3 samba-swat-3.6.15-1.4.mga3 samba-winbind-3.6.15-1.4.mga3 libsmbclient0-3.6.15-1.4.mga3 libsmbsharemodes0-3.6.15-1.4.mga3 libwbclient0-3.6.15-1.4.mga3
Whiteboard: MGA3TOO advisory mga4-64-ok mga4-32-ok => MGA3TOO advisory mga4-64-ok mga4-32-ok mga3-32-ok
Tested mga3_64, Testing complete for samba-3.6.15-1.4.mga3, Ok for me nothing to report, seems work fine here too. samba-server-3.6.15-1.4.mga3 samba-client-3.6.15-1.4.mga3 samba-common-3.6.15-1.4.mga3 samba-doc-3.6.15-1.4.mga3 samba-swat-3.6.15-1.4.mga3 samba-winbind-3.6.15-1.4.mga3 libsmbclient0-3.6.15-1.4.mga3 libsmbsharemodes0-3.6.15-1.4.mga3 libwbclient0-3.6.15-1.4.mga3
Whiteboard: MGA3TOO advisory mga4-64-ok mga4-32-ok mga3-32-ok => MGA3TOO advisory mga4-64-ok mga4-32-ok mga3-32-ok mga3-64-ok
Update validated. See comment 0 for advisory (was already uploaded to SVN). SRPMs: samba-3.6.15-1.4.mga3.src.rpm samba-3.6.23-1.mga4.src.rpm Could sysadmin please push from core/updates_testing to core/updates for Mageia 3 & 4.
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugs
Update pushed: http://advisories.mageia.org/MGASA-2014-0138.html
Status: NEW => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED