{"id":"CVE-2023-34967","details":"A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.","modified":"2026-04-09T09:40:03.508915Z","published":"2023-07-20T15:15:11.410Z","related":["ALSA-2023:6667","ALSA-2023:7139","MGASA-2023-0247","SUSE-SU-2023:2888-1","SUSE-SU-2023:2929-1","SUSE-SU-2023:2930-1","SUSE-SU-2023:3060-1","SUSE-SU-2023:3066-1","openSUSE-SU-2024:13071-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"},{"type":"ADVISORY","url":"https://www.samba.org/samba/security/CVE-2023-34967.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230731-0010/"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-34967"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5477"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:6667"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7139"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0423"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0580"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222794"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/samba-team/samba","events":[{"introduced":"0"},{"fixed":"225a003a043eee399b6d266d94440c399b6877e4"},{"introduced":"fbec737d9d3d992b54f52defcba62a304efef8f7"},{"fixed":"5eceb0dfb4a6490da3e7fc58f4b527b16b934195"},{"introduced":"a597a8767fabfe85ee0bcf869407e770a0c3e184"},{"fixed":"50a9b496556c08a451d8f18707fa709de69942ec"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"4.16.11"},{"introduced":"4.17.0"},{"fixed":"4.17.10"},{"introduced":"4.18.0"},{"fixed":"4.18.5"}]}}],"versions":["ldb-1.1.0","ldb-1.1.10","ldb-1.1.11","ldb-1.1.12","ldb-1.1.13","ldb-1.1.14","ldb-1.1.15","ldb-1.1.16","ldb-1.1.17","ldb-1.1.18","ldb-1.1.19","ldb-1.1.2","ldb-1.1.20","ldb-1.1.21","ldb-1.1.22","ldb-1.1.23","ldb-1.1.25","ldb-1.1.26","ldb-1.1.27","ldb-1.1.28","ldb-1.1.29","ldb-1.1.3","ldb-1.1.30","ldb-1.1.31","ldb-1.1.4","ldb-1.1.5","ldb-1.1.6","ldb-1.1.8","ldb-1.1.9","ldb-1.2.0","ldb-1.2.1","ldb-1.2.2","ldb-1.3.0","ldb-1.3.1","ldb-1.3.2","ldb-1.4.0","ldb-1.4.1","ldb-1.5.0","ldb-1.5.1","ldb-1.5.2","ldb-1.6.1","ldb-1.6.2","ldb-1.6.3","ldb-2.0.5","ldb-2.1.0","ldb-2.1.1","ldb-2.2.0","ldb-2.4.0","ldb-2.5.0","ldb-2.5.1","ldb-2.5.2","ldb-2.5.3","ldb-2.6.2","ldb-2.7.2","samba-4.0.0alpha10","samba-4.0.0alpha17","samba-4.0.0alpha18","samba-4.0.0alpha19","samba-4.0.0alpha20","samba-4.0.0alpha21","samba-4.0.0alpha6","samba-4.0.0alpha7","samba-4.0.0alpha8","samba-4.0.0alpha9","samba-4.0.0beta1","samba-4.0.0beta2","samba-4.0.0beta3","samba-4.0.0beta4","samba-4.0.0beta5","samba-4.0.0beta6","samba-4.0.0beta7","samba-4.0.0beta8","samba-4.0.0rc1","samba-4.10.0rc1","samba-4.11.0rc1","samba-4.12.0rc1","samba-4.13.0rc1","samba-4.14.0rc1","samba-4.15.0rc1","samba-4.16.0","samba-4.16.0rc1","samba-4.16.0rc2","samba-4.16.0rc3","samba-4.16.0rc4","samba-4.16.0rc5","samba-4.16.1","samba-4.16.10","samba-4.16.2","samba-4.16.3","samba-4.16.4","samba-4.16.5","samba-4.16.8","samba-4.16.9","samba-4.17.0","samba-4.17.1","samba-4.17.2","samba-4.17.4","samba-4.17.5","samba-4.17.6","samba-4.17.7","samba-4.17.8","samba-4.17.9","samba-4.18.0","samba-4.18.1","samba-4.18.2","samba-4.18.3","samba-4.18.4","samba-4.2.0rc1","samba-4.3.0rc1","samba-4.4.0rc1","samba-4.5.0rc1","samba-4.6.0rc1","samba-4.7.0rc1","samba-4.8.0rc1","samba-4.9.0rc1","talloc-1.3.1","talloc-2.0.0","talloc-2.0.7","talloc-2.0.8","talloc-2.1.0","talloc-2.1.1","talloc-2.1.10","talloc-2.1.11","talloc-2.1.12","talloc-2.1.13","talloc-2.1.14","talloc-2.1.15","talloc-2.1.16","talloc-2.1.2","talloc-2.1.3","talloc-2.1.4","talloc-2.1.5","talloc-2.1.6","talloc-2.1.7","talloc-2.1.8","talloc-2.1.9","talloc-2.2.0","talloc-2.3.0","talloc-2.3.1","talloc-2.3.2","talloc-2.3.3","tdb-1.1.5","tdb-1.2.0","tdb-1.2.1","tdb-1.2.10","tdb-1.2.11","tdb-1.2.12","tdb-1.2.13","tdb-1.3.0","tdb-1.3.1","tdb-1.3.10","tdb-1.3.11","tdb-1.3.12","tdb-1.3.13","tdb-1.3.14","tdb-1.3.15","tdb-1.3.16","tdb-1.3.17","tdb-1.3.18","tdb-1.3.2","tdb-1.3.3","tdb-1.3.4","tdb-1.3.5","tdb-1.3.6","tdb-1.3.7","tdb-1.3.8","tdb-1.3.9","tdb-1.4.0","tdb-1.4.1","tdb-1.4.2","tdb-1.4.3","tdb-1.4.4","tdb-1.4.5","tdb-1.4.6","tevent-0.10.0","tevent-0.10.1","tevent-0.10.2","tevent-0.11.0","tevent-0.9.11","tevent-0.9.12","tevent-0.9.13","tevent-0.9.14","tevent-0.9.15","tevent-0.9.16","tevent-0.9.17","tevent-0.9.18","tevent-0.9.19","tevent-0.9.20","tevent-0.9.21","tevent-0.9.22","tevent-0.9.23","tevent-0.9.24","tevent-0.9.25","tevent-0.9.26","tevent-0.9.27","tevent-0.9.28","tevent-0.9.29","tevent-0.9.30","tevent-0.9.31","tevent-0.9.32","tevent-0.9.33","tevent-0.9.34","tevent-0.9.35","tevent-0.9.36","tevent-0.9.37","tevent-0.9.38","tevent-0.9.39","tevent-0.9.8"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-34967.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}