Missing type validation in Samba's mdssvc RPC service for Spotlight can be used by an unauthenticated attacker to trigger a process crash in a shared RPC mdssvc worker process. As RPC worker processes are shared among multiple client connections, a malicious client can crash the worker process affecting all other clients that are also served by this worker.
This CVE is public now - https://www.samba.org/samba/security/CVE-2023-34967.html
Created samba tracking bugs for this issue: Affects: fedora-all [bug 2224252]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:6667 https://access.redhat.com/errata/RHSA-2023:6667
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:7139 https://access.redhat.com/errata/RHSA-2023:7139
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:0423 https://access.redhat.com/errata/RHSA-2024:0423
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:0580 https://access.redhat.com/errata/RHSA-2024:0580