{"schema_version":"1.7.2","id":"OESA-2023-1233","modified":"2023-04-17T11:05:10Z","published":"2023-04-17T11:05:10Z","upstream":["CVE-2023-0225","CVE-2023-0922"],"summary":"samba security update","details":"Samba is a suite of programs for Linux and Unix to interoperate with Windows.\r\n\r\nSecurity Fix(es):\r\n\r\nA flaw was found in Samba. An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory.(CVE-2023-0225)\r\n\r\nThe Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection.(CVE-2023-0922)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP1","name":"samba","purl":"pkg:rpm/openEuler/samba\u0026distro=openEuler-22.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.17.5-4.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["samba-winbind-4.17.5-4.oe2203sp1.aarch64.rpm","samba-winbind-krb5-locator-4.17.5-4.oe2203sp1.aarch64.rpm","ctdb-4.17.5-4.oe2203sp1.aarch64.rpm","samba-dc-bind-dlz-4.17.5-4.oe2203sp1.aarch64.rpm","samba-client-libs-4.17.5-4.oe2203sp1.aarch64.rpm","libsmbclient-devel-4.17.5-4.oe2203sp1.aarch64.rpm","samba-winbind-modules-4.17.5-4.oe2203sp1.aarch64.rpm","python3-samba-4.17.5-4.oe2203sp1.aarch64.rpm","samba-krb5-printing-4.17.5-4.oe2203sp1.aarch64.rpm","samba-debugsource-4.17.5-4.oe2203sp1.aarch64.rpm","python3-samba-dc-4.17.5-4.oe2203sp1.aarch64.rpm","libwbclient-4.17.5-4.oe2203sp1.aarch64.rpm","samba-common-tools-4.17.5-4.oe2203sp1.aarch64.rpm","samba-winbind-clients-4.17.5-4.oe2203sp1.aarch64.rpm","libsmbclient-4.17.5-4.oe2203sp1.aarch64.rpm","samba-test-4.17.5-4.oe2203sp1.aarch64.rpm","samba-libs-4.17.5-4.oe2203sp1.aarch64.rpm","samba-dc-4.17.5-4.oe2203sp1.aarch64.rpm","samba-dc-libs-4.17.5-4.oe2203sp1.aarch64.rpm","samba-client-4.17.5-4.oe2203sp1.aarch64.rpm","samba-debuginfo-4.17.5-4.oe2203sp1.aarch64.rpm","samba-dc-provision-4.17.5-4.oe2203sp1.aarch64.rpm","samba-common-4.17.5-4.oe2203sp1.aarch64.rpm","libwbclient-devel-4.17.5-4.oe2203sp1.aarch64.rpm","samba-devel-4.17.5-4.oe2203sp1.aarch64.rpm","samba-help-4.17.5-4.oe2203sp1.aarch64.rpm","samba-4.17.5-4.oe2203sp1.aarch64.rpm","python3-samba-test-4.17.5-4.oe2203sp1.aarch64.rpm","samba-usershares-4.17.5-4.oe2203sp1.aarch64.rpm"],"noarch":["samba-pidl-4.17.5-4.oe2203sp1.noarch.rpm"],"src":["samba-4.17.5-4.oe2203sp1.src.rpm"],"x86_64":["samba-krb5-printing-4.17.5-4.oe2203sp1.x86_64.rpm","samba-dc-bind-dlz-4.17.5-4.oe2203sp1.x86_64.rpm","samba-usershares-4.17.5-4.oe2203sp1.x86_64.rpm","libsmbclient-4.17.5-4.oe2203sp1.x86_64.rpm","python3-samba-test-4.17.5-4.oe2203sp1.x86_64.rpm","ctdb-4.17.5-4.oe2203sp1.x86_64.rpm","libwbclient-4.17.5-4.oe2203sp1.x86_64.rpm","samba-common-4.17.5-4.oe2203sp1.x86_64.rpm","samba-debugsource-4.17.5-4.oe2203sp1.x86_64.rpm","samba-winbind-clients-4.17.5-4.oe2203sp1.x86_64.rpm","samba-winbind-4.17.5-4.oe2203sp1.x86_64.rpm","samba-4.17.5-4.oe2203sp1.x86_64.rpm","samba-vfs-glusterfs-4.17.5-4.oe2203sp1.x86_64.rpm","samba-winbind-krb5-locator-4.17.5-4.oe2203sp1.x86_64.rpm","samba-test-4.17.5-4.oe2203sp1.x86_64.rpm","python3-samba-4.17.5-4.oe2203sp1.x86_64.rpm","samba-dc-libs-4.17.5-4.oe2203sp1.x86_64.rpm","samba-winbind-modules-4.17.5-4.oe2203sp1.x86_64.rpm","samba-dc-provision-4.17.5-4.oe2203sp1.x86_64.rpm","samba-client-4.17.5-4.oe2203sp1.x86_64.rpm","samba-dc-4.17.5-4.oe2203sp1.x86_64.rpm","samba-help-4.17.5-4.oe2203sp1.x86_64.rpm","libsmbclient-devel-4.17.5-4.oe2203sp1.x86_64.rpm","samba-devel-4.17.5-4.oe2203sp1.x86_64.rpm","python3-samba-dc-4.17.5-4.oe2203sp1.x86_64.rpm","samba-common-tools-4.17.5-4.oe2203sp1.x86_64.rpm","samba-libs-4.17.5-4.oe2203sp1.x86_64.rpm","samba-client-libs-4.17.5-4.oe2203sp1.x86_64.rpm","samba-debuginfo-4.17.5-4.oe2203sp1.x86_64.rpm","libwbclient-devel-4.17.5-4.oe2203sp1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1233"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0225"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0922"}],"database_specific":{"severity":"Medium"}}