SAMBA+ 4.18.1, 4.17.7 and 4.16.10 have just been released. These are important security releases, please update affected systems as soon as possible. The packages are available for various SUSE and Red Hat platforms as well as for Debian GNU/Linux, Ubuntu and AIX.
The packages address the following security related issues, which only affect the Samba AD DC and related tools:
- CVE-2023-0614 Access controlled AD LDAP attributes can be discovered.
The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC.
Installations with such secrets in their Samba AD should assume they have been obtained and need replacing.
- CVE-2023-0225 Samba AD DC "dnsHostname" attribute can be deleted by unprivileged authenticated users.
An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory.
Affects only Samba 4.17.0 and later versions.
- CVE-2023-0922 Samba AD DC admin tool samba-tool sends passwords in cleartext.
The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection.