Описание
Security update for ldb, samba, talloc, tdb, tevent
This update for ldb, samba, talloc, tdb, tevent fixes the following security issues:
-
ldb was updated to version 1.1.24.
- Fix ldap \00 search expression attack dos; CVE-2015-3223; (bso#11325)
- Fix remote read memory exploit in ldb; CVE-2015-5330; (bso#11599)
- Move ldb_(un)pack_data into ldb_module.h for testing
- Fix installation of _ldb_text.py
- Fix propagation of ldb errors through tdb
- Fix bug triggered by having an empty message in database during search
-
Move the ldb-cmdline library to the ldb-tools package as the packaged binaries depend on it.
-
Update the samba library distribution key file 'ldb.keyring'; (bso#945116).
Samba was updated to fix these issues:
- Malicious request can cause samba ldap server to hang, spinning using cpu; CVE-2015-3223; (bso#11325); (bsc#958581).
- Remote read memory exploit in ldb; cve-2015-5330; (bso#11599); (bsc#958586).
- Insufficient symlink verification (file access outside the share); CVE-2015-5252; (bso#11395); (bsc#958582).
- No man in the middle protection when forcing smb encryption on the client side; CVE-2015-5296; (bso#11536); (bsc#958584).
- Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2); CVE-2015-5299; (bso#11529); (bsc#958583).
- Fix microsoft ms15-096 to prevent machine accounts from being changed into user accounts; CVE-2015-8467; (bso#11552); (bsc#958585).
- Changing log level of two entries to from 1 to 3; (bso#9912).
- Vfs_gpfs: re-enable share modes; (bso#11243).
- Wafsamba: also build libraries with relro protection; (bso#11346).
- Ctdb: strip trailing spaces from nodes file; (bso#11365).
- S3-smbd: fix old dos client doing wildcard delete - gives a attribute type of zero; (bso#11452).
- Nss_wins: do not run into use after free issues when we access memory allocated on the globals and the global being reinitialized; (bso#11563).
- Async_req: fix non-blocking connect(); (bso#11564).
- Auth: gensec: fix a memory leak; (bso#11565).
- Lib: util: make non-critical message a warning; (bso#11566).
- Fix winbindd crashes with samlogon for trusted domain user; (bso#11569); (bsc#949022).
- Smbd: send smb2 oplock breaks unencrypted; (bso#11570).
- Ctdb: open the ro tracking db with perms 0600 instead of 0000; (bso#11577).
- Manpage: correct small typo error; (bso#11584).
- S3: smbd: if ea's are turned off on a share don't allow an smb2 create containing them; (bso#11589).
- Backport some valgrind fixes from upstream master; (bso#11597).
- S3: smbd: have_file_open_below() fails to enumerate open files below an open directory handle; (bso#11615).
- Docs: fix some typos in the idmap config section of man 5 smb.conf; (bso#11619).
- Cleanup and enhance the pidl sub package.
- S3: smbd: fix our access-based enumeration on 'hide unreadable' to match Windows; (bso#10252).
- Smbd: fix file name buflen and padding in notify repsonse; (bso#10634).
- Kerberos: make sure we only use prompter type when available; (bso#11038).
- S3:ctdbd_conn: make sure we destroy tevent_fd before closing the socket; (bso#11316).
- Dcerpc.idl: accept invalid dcerpc_bind_nak pdus; (bso#11327).
- Fix a deadlock in tdb; (bso#11381).
- S3: smbd: fix mkdir race condition; (bso#11486).
- Pam_winbind: fix a segfault if initialization fails; (bso#11502).
- S3: dfs: fix a crash when the dfs targets are disabled; (bso#11509).
- S3: smbd: fix opening/creating :stream files on the root share directory; (bso#11522).
- Net: fix a crash with 'net ads keytab create'; (bso#11528).
- S3: smbd: fix a crash in unix_convert() and a null pointer bug introduced by previous 'raw' stream fix (bso#11522); (bso#11535).
- Vfs_fruit: return value of ad_pack in vfs_fruit.c; (bso#11543).
- Vfs_commit: set the fd on open before calling smb_vfs_fstat; (bso#11547).
- Fix bug in smbstatus where the lease info is not printed; (bso#11549).
- S3:smbstatus: add stream name to share_entry_forall(); (bso#11550).
- Prevent null pointer access in samlogon fallback when security credentials are null; (bsc#949022).
- Fix 100% cpu in winbindd when logging in with 'user must change password on next logon'; (bso#11038).
talloc was updated to version 2.1.5; (bsc#954658) (bsc#951660).
- Test that talloc magic differs between processes.
- Increment minor version due to added talloc_test_get_magic.
- Provide tests access to talloc_magic.
- Test magic protection measures.
tdb was updated to version 1.3.8; (bsc#954658).
- First fix deadlock in the interaction between fcntl and mutex locking; (bso#11381)
- Improved python3 bindings
- Fix runtime detection for robust mutexes in the standalone build; (bso#11326).
- Possible fix for the build with robust mutexes on solaris 11; (bso#11319).
- Abi change: tdb_chainlock_read_nonblock() has been added, a nonblock variant of tdb_chainlock_read()
- Do not build test binaries if it's not a standalone build
- Fix cid 1034842 resource leak
- Fix cid 1034841 resource leak
- Don't let tdb_wrap_open() segfault with name==null
- Toos: allow transactions with tdb_mutex_locking
- Test: add tdb1-run-mutex-transaction1 test
- Allow transactions on on tdb's with tdb_mutex_locking
- Test: tdb_clear_if_first | tdb_mutex_locking, o_rdonly is a valid combination
- Allow tdb_open_ex() with o_rdonly of tdb_feature_flag_mutex tdbs.
- Fix a comment
- Fix tdb_runtime_check_for_robust_mutexes()
- Improve wording in a comment
- Tdb.h needs bool type; obsoletes include_stdbool_bso10625.patch
- Tdb_wrap: make mutexes easier to use
- Tdb_wrap: only pull in samba-debug
- Tdb_wrap: standalone compile without includes.h
- Tdb_wrap: tdb_wrap.h doesn't need struct loadparm_context
- Update to version 1.3.1.
- Tools: fix a compiler warning
- Defragment the freelist in tdb_allocate_from_freelist()
- Add 'freelist_size' sub-command to tdbtool
- Use tdb_freelist_merge_adjacent in tdb_freelist_size()
- Add tdb_freelist_merge_adjacent()
- Add utility function check_merge_ptr_with_left_record()
- Simplify tdb_free() using check_merge_with_left_record()
- Add utility function check_merge_with_left_record()
- Improve comments for tdb_free().
- Factor merge_with_left_record() out of tdb_free()
- Fix debug message in tdb_free()
- Reduce indentation in tdb_free() for merging left
- Increase readability of read_record_on_left()
- Factor read_record_on_left() out of tdb_free()
- Build: improve detection of srcdir.
tevent was updated to 0.9.26; (bsc#954658).
- New tevent_thread_proxy api
- Minor build fixes
- Fix compile error in solaris ports backend.
- Fix access after free in tevent_common_check_signal(); (bso#11308).
- Improve pytevent bindings.
- Testsuite fixes.
- Improve the documentation of the tevent_add_fd() assumtions. it must be talloc_free'ed before closing the fd! (bso##11141); (bso#11316).
- Ignore unexpected signal events in the same way the epoll backend does.
- Update the tevent_data.dox tutrial stuff to fix some errors, including white space problems.
- Use tevent_req_simple_recv_unix in a few places.
- Remove unused exit_code in tevent_select.c
- Remove unused exit_code in tevent_poll.c
- Build: improve detection of srcdir
- Lib: tevent: make tevent_sig_increment atomic.
- Update flags in tevent pkgconfig file
Список пакетов
SUSE Linux Enterprise Desktop 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server for SAP Applications 12
SUSE Linux Enterprise Software Development Kit 12
Ссылки
- Link for SUSE-SU-2015:2304-1
- E-Mail link for SUSE-SU-2015:2304-1
- SUSE Security Ratings
- SUSE Bug 295284
- SUSE Bug 773464
- SUSE Bug 872912
- SUSE Bug 901813
- SUSE Bug 902421
- SUSE Bug 910378
- SUSE Bug 912457
- SUSE Bug 913304
- SUSE Bug 923374
- SUSE Bug 931854
- SUSE Bug 936909
- SUSE Bug 939051
- SUSE Bug 947552
- SUSE Bug 949022
- SUSE Bug 951660
- SUSE Bug 953382
- SUSE Bug 954658
Описание
The ldb_wildcard_compare function in ldb_match.c in ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles certain zero values, which allows remote attackers to cause a denial of service (infinite loop) via crafted packets.
Затронутые продукты
Ссылки
- CVE-2015-3223
- SUSE Bug 958581
Описание
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
Затронутые продукты
Ссылки
- CVE-2015-5252
- SUSE Bug 958582
Описание
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c.
Затронутые продукты
Ссылки
- CVE-2015-5296
- SUSE Bug 1058622
- SUSE Bug 958584
- SUSE Bug 973031
Описание
The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory.
Затронутые продукты
Ссылки
- CVE-2015-5299
- SUSE Bug 958583
Описание
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database value.
Затронутые продукты
Ссылки
- CVE-2015-5330
- SUSE Bug 958581
- SUSE Bug 958586
Описание
The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restrictions by leveraging the existence of a domain with both a Samba DC and a Windows DC, a similar issue to CVE-2015-2535.
Затронутые продукты
Ссылки
- CVE-2015-8467
- SUSE Bug 958585