Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-3792-1 | samba security update |
![]() |
DSA-5525-1 | samba security update |
![]() |
DSA-5647-1 | samba security update |
![]() |
EUVD-2023-53981 | A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions. |
![]() |
USN-6425-1 | Samba vulnerabilities |
![]() |
USN-6425-3 | Samba vulnerabilities |
Solution
No solution given by the vendor.
Workaround
The vulnerability is most commonly associated with the "acl_xattr" module and can be mitigated by setting: ~~~ "acl_xattr:ignore system acls = no" ~~~
Sat, 30 Aug 2025 07:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-08-30T06:03:45.905Z
Reserved: 2023-08-02T09:43:21.439Z
Link: CVE-2023-4091

Updated: 2024-08-02T07:17:11.687Z

Status : Modified
Published: 2023-11-03T08:15:08.197
Modified: 2024-11-21T08:34:22.283
Link: CVE-2023-4091


No data.