Bug 2154362 (CVE-2022-38023)
Summary: | CVE-2022-38023 samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marco Benatto <mbenatto> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | abokovoy, aboscatt, anoopcs, arachman, asn, bthekkep, cbesson, cchiang, dkarpele, gdeschner, kyoshida, lveyde, mdogra, michal.skrivanek, mperina, pfilipen, rgopired, rhs-smb, sbalasub, sbonazzo |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | samba 4.15.13, samba 4.16.8, samba 4.15.13 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in samba. The Netlogon RPC implementations may use the rc4-hmac encryption algorithm, which is considered weak and should be avoided even if the client supports more modern encryption types. This issue could allow an attacker who knows the plain text content communicated between the samba client and server to craft data with the same MD5 calculation and replace it without being detected.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-05-17 02:33:27 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2154363, 2154364, 2154365, 2154366, 2154367, 2154368, 2154369, 2154370, 2154371, 2154372, 2154373, 2160019 | ||
Bug Blocks: | 2154280 |
Description
Marco Benatto
2022-12-16 17:47:06 UTC
Created samba tracking bugs for this issue: Affects: fedora-all [bug 2154363] This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:0637 https://access.redhat.com/errata/RHSA-2023:0637 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:0638 https://access.redhat.com/errata/RHSA-2023:0638 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:0639 https://access.redhat.com/errata/RHSA-2023:0639 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0838 https://access.redhat.com/errata/RHSA-2023:0838 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:1090 https://access.redhat.com/errata/RHSA-2023:1090 Doesn't this issue impact RHEL 8.6? If it does not, shouldn't the CVE page(https://access.redhat.com/security/cve/cve-2022-38023) explicitly state that? I have a customer who is complaining about this CVE in CoreOS 4.11.28 (shipped with their ARO cluster). CoreOS 4.11.28 is built with RHEL 8.6 EUS (https://access.redhat.com/articles/6907891) This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2127 https://access.redhat.com/errata/RHSA-2023:2127 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:2136 https://access.redhat.com/errata/RHSA-2023:2136 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:2137 https://access.redhat.com/errata/RHSA-2023:2137 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-38023 This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 Via RHSA-2023:3491 https://access.redhat.com/errata/RHSA-2023:3491 |