File _patchinfo of Package patchinfo.30947
<patchinfo incident="30947"> <issue tracker="cve" id="2023-42669"/> <issue tracker="cve" id="2023-4091"/> <issue tracker="cve" id="2025-9640"/> <issue tracker="cve" id="2025-10230"/> <issue tracker="bnc" id="1215904">VUL-0: EMBARGOED: CVE-2023-4091: samba: Client can truncate file with read-only permissions</issue> <issue tracker="bnc" id="1215905">VUL-0: EMBARGOED: CVE-2023-42669: samba: rpcecho, enabled and running in AD DC, allows blocking sleep on request</issue> <issue tracker="bnc" id="1251279"/> <issue tracker="bnc" id="1251280"/> <issue tracker="bnc" id="1233880"/> <packager>scabrero</packager> <rating>critical</rating> <category>security</category> <summary>Security update for samba</summary> <description>This update for samba fixes the following issues: - CVE-2025-9640: Fixed vfs_streams_xattr uninitialized memory write (bsc#1251279). - CVE-2025-10230: Fixed command Injection in WINS Server Hook Script (bsc#1251280). - CVE-2023-4091: Fixed a bug where a client can truncate file with read-only permissions. (bsc#1215904). - CVE-2023-42669: Fixed a bug in "rpcecho" development server which allows Denial of Service via sleep() call on AD DC. (bso#1215905). The following non-security bugs were fixed: - Update shipped /etc/samba/smb.conf to point to smb.conf man page (bsc#1233880). </description> </patchinfo>