The branch, master has been updated
       via  54ef6c8 NEWS[4.23.2]: Samba 4.23.2, 4.22.5 and 4.21.9 Security 
Releases are available for Download
      from  6527f82 NEWS[4.23.1]: Samba 4.23.1 Available for Download

https://git.samba.org/?p=samba-web.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit 54ef6c87b451492ea3b87319dec82f1f69050117
Author: Jule Anger <[email protected]>
Date:   Wed Oct 15 11:14:57 2025 +0200

    NEWS[4.23.2]: Samba 4.23.2, 4.22.5 and 4.21.9 Security Releases are 
available for Download
    
    Signed-off-by: Jule Anger <[email protected]>

-----------------------------------------------------------------------

Summary of changes:
 history/header_history.html                      |   3 +
 history/samba-4.21.9.html                        |  47 +++++++++
 history/samba-4.22.5.html                        |  47 +++++++++
 history/samba-4.23.2.html                        |  47 +++++++++
 history/security.html                            |  26 +++++
 posted_news/20251015-084830.4.23.2.body.html     |  31 ++++++
 posted_news/20251015-084830.4.23.2.headline.html |   3 +
 security/CVE-2025-10230.html                     | 118 +++++++++++++++++++++++
 security/CVE-2025-9640.html                      |  88 +++++++++++++++++
 9 files changed, 410 insertions(+)
 create mode 100644 history/samba-4.21.9.html
 create mode 100644 history/samba-4.22.5.html
 create mode 100644 history/samba-4.23.2.html
 create mode 100644 posted_news/20251015-084830.4.23.2.body.html
 create mode 100644 posted_news/20251015-084830.4.23.2.headline.html
 create mode 100644 security/CVE-2025-10230.html
 create mode 100644 security/CVE-2025-9640.html


Changeset truncated at 500 lines:

diff --git a/history/header_history.html b/history/header_history.html
index a399f14..23ec76f 100755
--- a/history/header_history.html
+++ b/history/header_history.html
@@ -9,13 +9,16 @@
                <li><a href="/samba/history/">Release Notes</a>
                <li class="navSub">
                        <ul>
+                       <li><a href="samba-4.23.2.html">samba-4.23.2</a></li>
                        <li><a href="samba-4.23.1.html">samba-4.23.1</a></li>
                        <li><a href="samba-4.23.0.html">samba-4.23.0</a></li>
+                       <li><a href="samba-4.22.5.html">samba-4.22.5</a></li>
                        <li><a href="samba-4.22.4.html">samba-4.22.4</a></li>
                        <li><a href="samba-4.22.3.html">samba-4.22.3</a></li>
                        <li><a href="samba-4.22.2.html">samba-4.22.2</a></li>
                        <li><a href="samba-4.22.1.html">samba-4.22.1</a></li>
                        <li><a href="samba-4.22.0.html">samba-4.22.0</a></li>
+                       <li><a href="samba-4.21.9.html">samba-4.21.9</a></li>
                        <li><a href="samba-4.21.8.html">samba-4.21.8</a></li>
                        <li><a href="samba-4.21.7.html">samba-4.21.7</a></li>
                        <li><a href="samba-4.21.6.html">samba-4.21.6</a></li>
diff --git a/history/samba-4.21.9.html b/history/samba-4.21.9.html
new file mode 100644
index 0000000..aa18688
--- /dev/null
+++ b/history/samba-4.21.9.html
@@ -0,0 +1,47 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd";>
+<html xmlns="http://www.w3.org/1999/xhtml";>
+<head>
+<title>Samba 4.21.9 - Release Notes</title>
+</head>
+<body>
+<H2>Samba 4.21.9 Available for Download</H2>
+<p>
+<a 
href="https://download.samba.org/pub/samba/stable/samba-4.21.9.tar.gz";>Samba 
4.21.9 (gzipped)</a><br>
+<a 
href="https://download.samba.org/pub/samba/stable/samba-4.21.9.tar.asc";>Signature</a>
+</p>
+<p>
+<a 
href="https://download.samba.org/pub/samba/patches/samba-4.21.8-4.21.9.diffs.gz";>Patch
 (gzipped) against Samba 4.21.8</a><br>
+<a 
href="https://download.samba.org/pub/samba/patches/samba-4.21.8-4.21.9.diffs.asc";>Signature</a>
+</p>
+<p>
+<pre>
+                   ==============================
+                   Release Notes for Samba 4.21.9
+                          October 15, 2025
+                   ==============================
+
+
+This is a security release in order to address the following defects:
+
+o CVE-2025-9640:  Uninitialized memory disclosure via vfs_streams_xattr.
+                  https://www.samba.org/samba/security/CVE-2025-9640.html
+
+o CVE-2025-10230: Command injection via WINS server hook script.
+                  https://www.samba.org/samba/security/CVE-2025-10230.html
+
+
+Changes since 4.21.8
+--------------------
+
+o  Douglas Bagnall &lt;[email protected]&gt;
+   * BUG 15903: CVE-2025-10230.
+
+o  Andrew Walker &lt;[email protected]&gt;
+   * BUG 15885: CVE-2025-9640.
+
+
+</pre>
+</p>
+</body>
+</html>
diff --git a/history/samba-4.22.5.html b/history/samba-4.22.5.html
new file mode 100644
index 0000000..8d424e0
--- /dev/null
+++ b/history/samba-4.22.5.html
@@ -0,0 +1,47 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd";>
+<html xmlns="http://www.w3.org/1999/xhtml";>
+<head>
+<title>Samba 4.22.5 - Release Notes</title>
+</head>
+<body>
+<H2>Samba 4.22.5 Available for Download</H2>
+<p>
+<a 
href="https://download.samba.org/pub/samba/stable/samba-4.22.5.tar.gz";>Samba 
4.22.5 (gzipped)</a><br>
+<a 
href="https://download.samba.org/pub/samba/stable/samba-4.22.5.tar.asc";>Signature</a>
+</p>
+<p>
+<a 
href="https://download.samba.org/pub/samba/patches/samba-4.22.4-4.22.5.diffs.gz";>Patch
 (gzipped) against Samba 4.22.4</a><br>
+<a 
href="https://download.samba.org/pub/samba/patches/samba-4.22.4-4.22.5.diffs.asc";>Signature</a>
+</p>
+<p>
+<pre>
+                   ==============================
+                   Release Notes for Samba 4.22.5
+                          October 15, 2025
+                   ==============================
+
+
+This is a security release in order to address the following defects:
+
+o CVE-2025-9640:  Uninitialized memory disclosure via vfs_streams_xattr.
+                  https://www.samba.org/samba/security/CVE-2025-9640.html
+
+o CVE-2025-10230: Command injection via WINS server hook script.
+                  https://www.samba.org/samba/security/CVE-2025-10230.html
+
+
+Changes since 4.22.4
+--------------------
+
+o  Douglas Bagnall &lt;[email protected]&gt;
+   * BUG 15903: CVE-2025-10230.
+
+o  Andrew Walker &lt;[email protected]&gt;
+   * BUG 15885: CVE-2025-9640.
+
+
+</pre>
+</p>
+</body>
+</html>
diff --git a/history/samba-4.23.2.html b/history/samba-4.23.2.html
new file mode 100644
index 0000000..38108f7
--- /dev/null
+++ b/history/samba-4.23.2.html
@@ -0,0 +1,47 @@
++<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
++ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd";>
++<html xmlns="http://www.w3.org/1999/xhtml";>
++<head>
++<title>Samba 4.23.2 - Release Notes</title>
++</head>
++<body>
++<H2>Samba 4.23.2 Available for Download</H2>
++<p>
++<a 
href="https://download.samba.org/pub/samba/stable/samba-4.23.2.tar.gz";>Samba 
4.23.2 (gzipped)</a><br>
++<a 
href="https://download.samba.org/pub/samba/stable/samba-4.23.2.tar.asc";>Signature</a>
++</p>
++<p>
++<a 
href="https://download.samba.org/pub/samba/patches/samba-4.23.1-4.23.2.diffs.gz";>Patch
 (gzipped) against Samba 4.23.1</a><br>
++<a 
href="https://download.samba.org/pub/samba/patches/samba-4.23.1-4.23.2.diffs.asc";>Signature</a>
++</p>
++<p>
++<pre>
++                   ==============================
++                   Release Notes for Samba 4.23.2
++                          October 15, 2025
++                   ==============================
++
++
++This is a security release in order to address the following defects:
++
++o CVE-2025-9640:  Uninitialized memory disclosure via vfs_streams_xattr.
++                  https://www.samba.org/samba/security/CVE-2025-9640.html
++
++o CVE-2025-10230: Command injection via WINS server hook script.
++                  https://www.samba.org/samba/security/CVE-2025-10230.html
++
++
++Changes since 4.23.1
++--------------------
++
++o  Douglas Bagnall &lt;[email protected]&gt;
++   * BUG 15903: CVE-2025-10230.
++
++o  Andrew Walker &lt;[email protected]&gt;
++   * BUG 15885: CVE-2025-9640.
++
++
++</pre>
++</p>
++</body>
++</html>
diff --git a/history/security.html b/history/security.html
index d359aff..67b0b55 100755
--- a/history/security.html
+++ b/history/security.html
@@ -31,6 +31,32 @@ link to full release notes for each release.</p>
        <td><em>CVE ID #</em></td>
        <td><em>Details</em></td>
       </tr>
+
+       <tr>
+       <td>15 October 2025</td>
+       <td>
+       <a 
href="/samba/ftp/patches/security/samba-4.23.2-security-2025-10-15.patch">
+       patch for Samba 4.23.2</a><br/>
+       <a 
href="/samba/ftp/patches/security/samba-4.22.5-security-2025-10-15.patch">
+       patch for Samba 4.22.5</a><br/>
+       <a 
href="/samba/ftp/patches/security/samba-4.21.9-security-2025-10-15.patch">
+       patch for Samba 4.21.9</a><br/>
+       </td>
+       <td>
+       CVE-2025-10230 and CVE-2025-9640.
+       Please see announcements for details.
+       </td>
+       <td>Please refer to the advisories.</td>
+       <td>
+       <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10230";>CVE-2025-10230</a>,
+       <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9640";>CVE-2025-9640</a>.
+       </td>
+       <td>
+       <a href="/samba/security/CVE-2025-10230.html">Announcement</a>,
+       <a href="/samba/security/CVE-2025-9640.html">Announcement</a>.
+       </td>
+       </tr>
+
        <tr>
        <td>10 October 2023</td>
        <td>
diff --git a/posted_news/20251015-084830.4.23.2.body.html 
b/posted_news/20251015-084830.4.23.2.body.html
new file mode 100644
index 0000000..60ac6b3
--- /dev/null
+++ b/posted_news/20251015-084830.4.23.2.body.html
@@ -0,0 +1,31 @@
+<!-- BEGIN: posted_news/20251015-084830.4.23.2.body.html -->
+<h5><a name="4.23.2">15 October 2025</a></h5>
+<p class=headline>Samba 4.23.2, 4.22.5 and 4.21.9 Security Releases are 
available for Download</p>
+<p>
+<a href="/samba/security/CVE-2025-10230.html">CVE-2025-10230</a> and
+<a href="/samba/security/CVE-2025-9640.html">CVE-2025-9640</a>.
+</p>
+
+<p>
+The uncompressed tarball has been signed using GnuPG (ID AA99442FB680B620).
+<p>
+
+<p>
+The 4.23.2 source code can be <a 
href="https://download.samba.org/pub/samba/stable/samba-4.23.2.tar.gz";>downloaded
 now</a>.
+A <a 
href="https://download.samba.org/pub/samba/patches/samba-4.23.1-4.23.2.diffs.gz";>patch
 against Samba 4.23.1</a> is also available.
+See <a href="https://www.samba.org/samba/history/samba-4.23.2.html";>the 
release notes for more info</a>.
+</p>
+
+<p>
+The 4.22.5 source code can be <a 
href="https://download.samba.org/pub/samba/stable/samba-4.22.5.tar.gz";>downloaded
 now</a>.
+A <a 
href="https://download.samba.org/pub/samba/patches/samba-4.22.4-4.22.5.diffs.gz";>patch
 against Samba 4.22.4</a> is also available.
+See <a href="https://www.samba.org/samba/history/samba-4.22.5.html";>the 
release notes for more info</a>.
+</p>
+
+<p>
+The 4.21.9 source code can be <a 
href="https://download.samba.org/pub/samba/stable/samba-4.21.9.tar.gz";>downloaded
 now</a>.
+A <a 
href="https://download.samba.org/pub/samba/patches/samba-4.21.8-4.21.9.diffs.gz";>patch
 against Samba 4.21.8</a> is also available.
+See <a href="https://www.samba.org/samba/history/samba-4.21.9.html";>the 
release notes for more info</a>.
+</p>
+
+<!-- END: posted_news/20251015-084830.4.23.2.body.html -->
diff --git a/posted_news/20251015-084830.4.23.2.headline.html 
b/posted_news/20251015-084830.4.23.2.headline.html
new file mode 100644
index 0000000..62c24f8
--- /dev/null
+++ b/posted_news/20251015-084830.4.23.2.headline.html
@@ -0,0 +1,3 @@
+<!-- BEGIN: posted_news/20251015-084830.4.23.2.headline.html -->
+<li> 15 October 2025 <a href="#4.23.2">Samba 4.23.2, 4.22.5 and 4.21.9 
Security Releases are available for Download</a></li>
+<!-- END: posted_news/20251015-084830.4.23.2.headline.html -->
diff --git a/security/CVE-2025-10230.html b/security/CVE-2025-10230.html
new file mode 100644
index 0000000..d35412c
--- /dev/null
+++ b/security/CVE-2025-10230.html
@@ -0,0 +1,118 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd";>
+<html xmlns="http://www.w3.org/1999/xhtml";>
+
+<head>
+<title>Samba - Security Announcement Archive</title>
+</head>
+
+<body>
+
+   <H2>CVE-2025-10230.html:</H2>
+
+<p>
+<pre>
+=================================================================
+== Subject:     Command injection via WINS server hook script
+==
+== CVE ID#:     CVE-2025-10230
+==
+== Versions:    All versions since 4.0
+==
+== Summary:     If the &#x27;wins hook&#x27; parameter is set on a domain
+==              controller with the WINS server enabled,
+==              unauthenticated remote code execution is possible.
+=================================================================
+
+===========
+Description
+===========
+
+If a Samba server has WINS support enabled (it is off by default), and
+it has a &#x27;wins hook&#x27; parameter specified, the program specified by
+that parameter will be run whenever a WINS name is changed.
+
+The WINS server used by the Samba Active Directory Domain Controller
+did not validate the names passed to the wins hook program, and it
+passed them by inserting them into a string run by a shell.
+
+WINS is an obsolete and trusting protocol, and clients can request any
+name that fits within the 15 character NetBIOS limit. This includes
+some shell metacharacters, making it possible to run arbitrary
+commands on the host.
+
+The WINS server used by Samba when it is not a domain controller is
+unaffected.
+
+==================
+Patch Availability
+==================
+
+Patches addressing this issue have been posted to:
+
+    https://www.samba.org/samba/security/
+
+Additionally, Samba 4.23.2, 4.22.5, and 4.21.9 have been issued as
+security releases to correct the defect. Samba administrators are
+advised to upgrade to these releases or apply the patch as soon as
+possible.
+
+==================
+CVSSv3 calculation
+==================
+
+CVSS:3.1: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H  (10.0)
+
+==========
+Workaround
+==========
+
+Avoid setting the &#x27;wins hook&#x27; parameter in the smb.conf of a Samba AD
+Domain Controller.
+
+The &#x27;wins hook&#x27; parameter is only effective when &#x27;wins 
support&#x27; is
+enabled. In other words, this combination is safe, regardless of &#x27;wins
+hook&#x27;:
+
+        server role = domain controller
+        wins support = no
+
+The default value for &#x27;wins support&#x27; is &#x27;no&#x27;, so it is 
safe (though
+pointless) for &#x27;wins hook&#x27; occurs if &#x27;wins support&#x27; does 
not.
+
+It does NOT help to have &#x27;wins hook&#x27; set to a non-existent or
+non-executable path, but an explicitly empty value
+
+        wins hook =
+
+is OK.
+
+When &#x27;server role&#x27; is not &#x27;domain controller&#x27; (or its 
synonyms &#x27;active
+directory domain controller&#x27;, &#x27;dc&#x27;), the server is not affected.
+Specifically, &#x27;member&#x27; or &#x27;standalone&#x27; servers use a 
different WINS
+server that is not vulnerable.
+
+The &#x27;wins hook&#x27; parameter is unlikely to be useful on a domain
+controller, and administrators who use it might want to reconsider
+that choice even on a patched server. It may not be supported in
+future Samba releases.
+
+=======
+Credits
+=======
+
+Reported by Igor Morgenstern of Aisle Research.
+
+Patches provided by Douglas Bagnall of the Samba team and Catalyst IT.
+
+This advisory written by Douglas Bagnall.
+
+==========================================================
+== Our Code, Our Bugs, Our Responsibility.
+== The Samba Team
+==========================================================
+
+
+</pre>
+</body>
+</html>
diff --git a/security/CVE-2025-9640.html b/security/CVE-2025-9640.html
new file mode 100644
index 0000000..09d3f0d
--- /dev/null
+++ b/security/CVE-2025-9640.html
@@ -0,0 +1,88 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd";>
+<html xmlns="http://www.w3.org/1999/xhtml";>
+
+<head>
+<title>Samba - Security Announcement Archive</title>
+</head>
+
+<body>
+
+   <H2>CVE-2025-9640.html:</H2>
+
+<p>
+<pre>
+===========================================================
+== Subject:     uninitialized memory disclosure via vfs_streams_xattr
+==
+== CVE ID#:     CVE-2025-9640
+==
+== Versions:    All versions since 3.2
+==
+== Summary:     Uninitialised memory can be written into alternate data
+==              streams, possibly leaking sensitive data.
+===========================================================
+
+===========
+Description
+===========
+
+An authenticated user can read an unlimited number of samples of
+discarded heap memory, due to a failure to initialise memory in
+streams_xattr_pwrite() in the vfs_streams_xattr file server module.
+
+This is achieved by issuing write requests that creates holes in the
+file.
+
+Samba erases known secrets before freeing the associated memory, which
+somewhat mitigates the data leak.
+
+==================
+Patch Availability
+==================
+
+Patches addressing this issues have been posted to:
+
+    https://www.samba.org/samba/security/
+
+Additionally, Samba 4.23.2, 4.22.5, and 4.21.9 have been issued as
+security releases to correct the defect. Samba administrators are
+advised to upgrade to these releases or apply the patch as soon as
+possible.
+
+====================
+CVSSv3.1 calculation
+====================
+
+AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N (4.3)
+
+==========
+Workaround
+==========
+
+Systems that don&#x27;t use vfs_streams_xattr are not affected. If you are
+not sure, look for the string &quot;streams_xattr&quot; in your smb.conf. If
+there is a line like this
+
+    vfs objects = streams_xattr [and possibly other terms]
+
+removing &#x27;streams_xattr&#x27; from the &#x27;vfs objects&#x27; list will 
avoid the
+vulnerability but will affect functionality.
+
+=======
+Credits
+=======
+
+Reported and fixed by Andrew Walker of IX Systems and the Samba Team.
+
+This advisory written by Douglas Bagnall of Catalyst IT and the Samba
+Team.
+
+==========================================================
+== Our Code, Our Bugs, Our Responsibility.
+== The Samba Team
+==========================================================
+
+</pre>
+</body>
+</html>


-- 
Samba Website Repository

Reply via email to