{"id":"USN-5936-1","summary":"samba vulnerabilities","details":"Evgeny Legerov discovered that Samba incorrectly handled buffers in\ncertain GSSAPI routines of Heimdal. A remote attacker could possibly use\nthis issue to cause Samba to crash, resulting in a denial of service.\n(CVE-2022-3437)\n\nTom Tervoort discovered that Samba incorrectly used weak rc4-hmac Kerberos\nkeys. A remote attacker could possibly use this issue to elevate\nprivileges. (CVE-2022-37966, CVE-2022-37967)\n\nIt was discovered that Samba supported weak RC4/HMAC-MD5 in NetLogon Secure\nChannel. A remote attacker could possibly use this issue to elevate\nprivileges. (CVE-2022-38023)\n\nGreg Hudson discovered that Samba incorrectly handled PAC parsing. On\n32-bit systems, a remote attacker could use this issue to escalate\nprivileges, or possibly execute arbitrary code. (CVE-2022-42898)\n\nJoseph Sutton discovered that Samba could be forced to issue rc4-hmac\nencrypted Kerberos tickets. A remote attacker could possibly use this issue\nto escalate privileges. This issue only affected Ubuntu 20.04 LTS and\nUbuntu 22.04 LTS. (CVE-2022-45141)\n\nWARNING: This update upgrades the version of Samba to 4.15.13. Please see\nthe upstream release notes for important changes in the new version:\n\nhttps://www.samba.org/samba/history/samba-4.15.0.html\n\nIn addition, the security fixes included in this new version introduce\nseveral important behavior changes which may cause compatibility problems\ninteracting with systems still expecting the former behavior. Please see\nthe following upstream advisories for more information:\n\nhttps://www.samba.org/samba/security/CVE-2022-37966.html\nhttps://www.samba.org/samba/security/CVE-2022-37967.html\nhttps://www.samba.org/samba/security/CVE-2022-38023.html\n","modified":"2026-02-10T04:43:00Z","published":"2023-03-08T13:02:34Z","related":["UBUNTU-CVE-2022-3437","UBUNTU-CVE-2022-37966","UBUNTU-CVE-2022-37967","UBUNTU-CVE-2022-38023","UBUNTU-CVE-2022-42898","UBUNTU-CVE-2022-45141"],"upstream":["CVE-2022-3437","CVE-2022-37966","CVE-2022-37967","CVE-2022-38023","CVE-2022-42898","CVE-2022-45141","UBUNTU-CVE-2022-3437","UBUNTU-CVE-2022-37966","UBUNTU-CVE-2022-37967","UBUNTU-CVE-2022-38023","UBUNTU-CVE-2022-42898","UBUNTU-CVE-2022-45141"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5936-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3437"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-37966"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-37967"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-38023"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-42898"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-45141"}],"affected":[{"package":{"name":"samba","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/samba@2:4.15.13+dfsg-0ubuntu0.20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:4.15.13+dfsg-0ubuntu0.20.04.1"}]}],"versions":["2:4.10.7+dfsg-0ubuntu2","2:4.10.7+dfsg-0ubuntu3","2:4.11.1+dfsg-3ubuntu1","2:4.11.1+dfsg-3ubuntu2","2:4.11.1+dfsg-3ubuntu4","2:4.11.5+dfsg-1ubuntu1","2:4.11.5+dfsg-1ubuntu2","2:4.11.6+dfsg-0ubuntu1","2:4.11.6+dfsg-0ubuntu1.1","2:4.11.6+dfsg-0ubuntu1.2","2:4.11.6+dfsg-0ubuntu1.3","2:4.11.6+dfsg-0ubuntu1.4","2:4.11.6+dfsg-0ubuntu1.5","2:4.11.6+dfsg-0ubuntu1.6","2:4.11.6+dfsg-0ubuntu1.8","2:4.11.6+dfsg-0ubuntu1.9","2:4.11.6+dfsg-0ubuntu1.10","2:4.13.14+dfsg-0ubuntu0.20.04.1","2:4.13.14+dfsg-0ubuntu0.20.04.2","2:4.13.14+dfsg-0ubuntu0.20.04.3","2:4.13.14+dfsg-0ubuntu0.20.04.4","2:4.13.17~dfsg-0ubuntu0.21.04.1","2:4.13.17~dfsg-0ubuntu0.21.04.2","2:4.13.17~dfsg-0ubuntu1.20.04.1","2:4.13.17~dfsg-0ubuntu1.20.04.2","2:4.13.17~dfsg-0ubuntu1.20.04.4","2:4.13.17~dfsg-0ubuntu1.20.04.5"],"ecosystem_specific":{"binaries":[{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"ctdb"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"libnss-winbind"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"libpam-winbind"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"libsmbclient"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"libsmbclient-dev"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"libwbclient-dev"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"libwbclient0"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"python3-samba"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"registry-tools"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"samba"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"samba-common"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"samba-common-bin"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"samba-dev"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"samba-dsdb-modules"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"samba-libs"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"samba-testsuite"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"samba-vfs-modules"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"smbclient"},{"binary_version":"2:4.15.13+dfsg-0ubuntu0.20.04.1","binary_name":"winbind"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2022-3437","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-37966","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-37967","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-38023","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-42898","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-45141","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5936-1.json"}}],"schema_version":"1.7.3"}