summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-cchardet_2.1.7.bb
diff options
context:
space:
mode:
authorArchana Polampalli <archana.polampalli@windriver.com>2023-11-23 06:13:07 +0000
committerArmin Kuster <akuster808@gmail.com>2023-12-13 13:35:51 -0500
commitad3dc46c878ae8bd90e720c672d159fe5763dbe3 (patch)
tree5beeee0002ea6f89070dc519c71b2b855f9805f2 /meta-python/recipes-devtools/python/python3-cchardet_2.1.7.bb
parent01c0aaaf620f9eeb073f39ce5149f08bb6a32cb0 (diff)
downloadmeta-openembedded-ad3dc46c878ae8bd90e720c672d159fe5763dbe3.tar.gz
samba: fix CVE-2023-4091
A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions. References: https://nvd.nist.gov/vuln/detail/CVE-2023-4091 Fix is patched to the function call smbd_check_access_rights_fsp() of open_file(), But in samba_4.14.14 smbd_check_access_rights() is used, from samba_4.15.0 onwards smbd_check_access_rights() was replaced with smbd_check_access_rights_fsp() and samba_4.14.14 is still vulnerable through smbd_check_access_rights(). Ref: https://github.com/samba-team/samba/commit/3f61369d153419158c0f223e6f81c0bb07275833 https://github.com/samba-team/samba/commit/26dc10bdb2cff3eece4a2874931b4058f9f87d68 Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-cchardet_2.1.7.bb')
0 files changed, 0 insertions, 0 deletions