Описание
Security update for ldb, samba
This update for ldb, samba fixes the following issues:
- CVE-2022-32746: Fixed a use-after-free occurring in database audit logging (bsc#1201490).
- CVE-2022-32745: Fixed a remote server crash with an LDAP add or modify request (bsc#1201492).
- CVE-2022-2031: Fixed AD restrictions bypass associated with changing passwords (bsc#1201495).
- CVE-2022-32742: Fixed a memory leak in SMB1 (bsc#1201496).
- CVE-2022-32744: Fixed an arbitrary password change request for any AD user (bsc#1201493).
The following non-security bug were fixed:
ldb was updated to version 2.4.3:
- Fix build problems, waf produces incorrect names for python extensions; (bso#15071);
samba was updated to 4.15.8:
- Use pathref fd instead of io fd in vfs_default_durable_cookie; (bso#15042);
- Setting fruit:resource = stream in vfs_fruit causes a panic; (bso#15099);
- Add support for bind 9.18; (bso#14986);
- logging dsdb audit to specific files does not work; (bso#15076);
- vfs_gpfs with vfs_shadowcopy2 fail to restore file if original file had been deleted; (bso#15069);
- netgroups support removed; (bso#15087); (bsc#1199247);
- net ads info shows LDAP Server: 0.0.0.0 depending on contacted server; (bso#14674); (bsc#1199734);
- waf produces incorrect names for python extensions with Python 3.11; (bso#15071);
- smbclient commands del & deltree fail with NT_STATUS_OBJECT_PATH_NOT_FOUND with DFS; (bso#15100); (bsc#1200556);
- vfs_gpfs recalls=no option prevents listing files; (bso#15055);
- waf produces incorrect names for python extensions with Python 3.11; (bso#15071);
- Compile error in source3/utils/regedit_hexedit.c; (bso#15091);
- ldconfig: /lib64/libsmbconf.so.0 is not a symbolic link; (bso#15108);
- smbd doesn't handle UPNs for looking up names; (bso#15054);
- Out-by-4 error in smbd read reply max_send clamp; (bso#14443);
- Move pdb backends from package samba-libs to package samba-client-libs and remove samba-libs requirement from samba-winbind; (bsc#1200964); (bsc#1198255);
- Use the canonical realm name to refresh the Kerberos tickets; (bsc#1196224); (bso#14979);
- Fix smbclient commands del & deltree failing with NT_STATUS_OBJECT_PATH_NOT_FOUND with DFS; (bso#15100); (bsc#1200556).
Список пакетов
Image SLES15-SP4
Image SLES15-SP4-Azure-Basic
Image SLES15-SP4-Azure-Standard
Image SLES15-SP4-BYOS
Image SLES15-SP4-BYOS-Azure
Image SLES15-SP4-BYOS-EC2
Image SLES15-SP4-BYOS-GCE
Image SLES15-SP4-CHOST-BYOS
Image SLES15-SP4-CHOST-BYOS-Aliyun
Image SLES15-SP4-CHOST-BYOS-Azure
Image SLES15-SP4-CHOST-BYOS-EC2
Image SLES15-SP4-CHOST-BYOS-GCE
Image SLES15-SP4-CHOST-BYOS-SAP-CCloud
Image SLES15-SP4-EC2
Image SLES15-SP4-EC2-ECS-HVM
Image SLES15-SP4-GCE
Image SLES15-SP4-HPC
Image SLES15-SP4-HPC-Azure
Image SLES15-SP4-HPC-BYOS
Image SLES15-SP4-HPC-BYOS-Azure
Image SLES15-SP4-HPC-BYOS-EC2
Image SLES15-SP4-HPC-BYOS-GCE
Image SLES15-SP4-HPC-EC2
Image SLES15-SP4-HPC-GCE
Image SLES15-SP4-Hardened-BYOS
Image SLES15-SP4-Hardened-BYOS-Azure
Image SLES15-SP4-Hardened-BYOS-EC2
Image SLES15-SP4-Hardened-BYOS-GCE
Image SLES15-SP4-Manager-Proxy-4-3-BYOS
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE
Image SLES15-SP4-Manager-Server-4-3
Image SLES15-SP4-Manager-Server-4-3-Azure-llc
Image SLES15-SP4-Manager-Server-4-3-Azure-ltd
Image SLES15-SP4-Manager-Server-4-3-BYOS
Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure
Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2
Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE
Image SLES15-SP4-Manager-Server-4-3-EC2-llc
Image SLES15-SP4-Manager-Server-4-3-EC2-ltd
Image SLES15-SP4-SAP
Image SLES15-SP4-SAP-Azure
Image SLES15-SP4-SAP-Azure-LI-BYOS
Image SLES15-SP4-SAP-Azure-LI-BYOS-Production
Image SLES15-SP4-SAP-Azure-VLI-BYOS
Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP4-SAP-BYOS
Image SLES15-SP4-SAP-BYOS-Azure
Image SLES15-SP4-SAP-BYOS-EC2
Image SLES15-SP4-SAP-BYOS-GCE
Image SLES15-SP4-SAP-EC2
Image SLES15-SP4-SAP-GCE
Image SLES15-SP4-SAP-Hardened
Image SLES15-SP4-SAP-Hardened-Azure
Image SLES15-SP4-SAP-Hardened-BYOS
Image SLES15-SP4-SAP-Hardened-BYOS-Azure
Image SLES15-SP4-SAP-Hardened-BYOS-EC2
Image SLES15-SP4-SAP-Hardened-BYOS-GCE
Image SLES15-SP4-SAP-Hardened-EC2
Image SLES15-SP4-SAP-Hardened-GCE
Image SLES15-SP4-SAPCAL
Image SLES15-SP4-SAPCAL-Azure
Image SLES15-SP4-SAPCAL-EC2
Image SLES15-SP4-SAPCAL-GCE
SUSE Linux Enterprise High Availability Extension 15 SP4
SUSE Linux Enterprise Module for Basesystem 15 SP4
openSUSE Leap 15.4
Ссылки
- Link for SUSE-SU-2022:2659-1
- E-Mail link for SUSE-SU-2022:2659-1
- SUSE Security Ratings
- SUSE Bug 1196224
- SUSE Bug 1198255
- SUSE Bug 1199247
- SUSE Bug 1199734
- SUSE Bug 1200556
- SUSE Bug 1200964
- SUSE Bug 1201490
- SUSE Bug 1201492
- SUSE Bug 1201493
- SUSE Bug 1201495
- SUSE Bug 1201496
- SUSE CVE CVE-2022-2031 page
- SUSE CVE CVE-2022-32742 page
- SUSE CVE CVE-2022-32744 page
- SUSE CVE CVE-2022-32745 page
- SUSE CVE CVE-2022-32746 page
Описание
A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other's tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tickets to other services.
Затронутые продукты
Ссылки
- CVE-2022-2031
- SUSE Bug 1201495
- SUSE Bug 1202815
- SUSE Bug 1202999
- SUSE Bug 1205061
- SUSE Bug 1208433
- SUSE Bug 1209664
Описание
A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer).
Затронутые продукты
Ссылки
- CVE-2022-32742
- SUSE Bug 1201496
- SUSE Bug 1202815
Описание
A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover.
Затронутые продукты
Ссылки
- CVE-2022-32744
- SUSE Bug 1201493
- SUSE Bug 1202815
- SUSE Bug 1209664
Описание
A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault.
Затронутые продукты
Ссылки
- CVE-2022-32745
- SUSE Bug 1201492
Описание
A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAccountControl.
Затронутые продукты
Ссылки
- CVE-2022-32746
- SUSE Bug 1201490