Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.
Bug 2222795 (CVE-2023-34968) - CVE-2023-34968 samba: spotlight server-side share path disclosure
Summary: CVE-2023-34968 samba: spotlight server-side share path disclosure
Keywords:
Status: NEW
Alias: CVE-2023-34968
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2222896 2222894 2222895 2224250
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-07-13 18:08 UTC by TEJ RATHI
Modified: 2024-01-30 13:24 UTC (History)
9 users (show)

Fixed In Version: samba 4.16.11, samba 4.17.10, samba 4.18.5
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:6667 0 None None None 2023-11-07 08:22:28 UTC
Red Hat Product Errata RHSA-2023:7139 0 None None None 2023-11-14 15:22:04 UTC
Red Hat Product Errata RHSA-2024:0423 0 None None None 2024-01-24 16:48:23 UTC
Red Hat Product Errata RHSA-2024:0580 0 None None None 2024-01-30 13:24:31 UTC

Description TEJ RATHI 2023-07-13 18:08:20 UTC
As part of the Spotlight protocol, the initial request returns a path associated with the sharename targeted by the RPC request. Samba returns the real server-side share path at this point, as well as returning the absolute server-side path of results in search queries by clients.

Comment 2 TEJ RATHI 2023-07-20 09:21:48 UTC
This CVE is public now - https://www.samba.org/samba/security/CVE-2023-34968.html.

Comment 3 TEJ RATHI 2023-07-20 09:22:18 UTC
Created samba tracking bugs for this issue:

Affects: fedora-all [bug 2224250]

Comment 4 errata-xmlrpc 2023-11-07 08:22:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6667 https://access.redhat.com/errata/RHSA-2023:6667

Comment 5 errata-xmlrpc 2023-11-14 15:22:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:7139 https://access.redhat.com/errata/RHSA-2023:7139

Comment 7 errata-xmlrpc 2024-01-24 16:48:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0423 https://access.redhat.com/errata/RHSA-2024:0423

Comment 8 errata-xmlrpc 2024-01-30 13:24:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:0580 https://access.redhat.com/errata/RHSA-2024:0580


Note You need to log in before you can comment on or make changes to this bug.