Описание
Security update for samba
This update for samba fixes the following issues:
-
CVE-2021-20251: Fixed an issue where the bad password count would not be properly incremented, which could allow attackers to brute force a user's password (bsc#1206546).
-
Updated to version 4.15.13:
- CVE-2022-37966: Fixed an issue where a weak cipher would be selected to encrypt session keys, which could lead to privilege escalation (bsc#1205385).
- CVE-2022-37967: Fixed a potential privilege escalation issue via constrained delegation due to weak a cryptographic algorithm being selected (bsc#1205386).
- CVE-2022-38023: Disabled weak ciphers by default in the Netlogon Secure channel (bsc#1206504).
-
Updated to version 4.15.12:
- CVE-2022-42898: Fixed several buffer overflow vulnerabilities on 32-bit systems (bsc#1205126).
-
Updated to version 4.15.11:
- CVE-2022-3437: Fixed a buffer overflow in Heimdal unwrap_des3() (bsc#1204254).
-
Updated to version 4.15.10:
- Fixed a potential crash due to a concurrency issue (bsc#1200102).
-
Updated to version 4.15.9:
- CVE-2022-32742: Fixed an information leak that could be triggered via SMB1 (bsc#1201496).
- CVE-2022-32746: Fixed a memory corruption issue in database audit logging (bsc#1201490).
- CVE-2022-2031: Fixed AD restrictions bypass associated with changing passwords (bsc#1201495).
- CVE-2022-32745: Fixed a remote server crash that could be triggered with certain LDAP requests (bsc#1201492).
- CVE-2022-32744: Fixed an issue where AD users could have forged password change requests on behalf of other users (bsc#1201493).
Other fixes:
- Fixed a problem when using bind as samba-ad-dc backend related to the named service (bsc#1201689).
Список пакетов
Image SLES15-SP4
Image SLES15-SP4-Azure-Basic
Image SLES15-SP4-Azure-Standard
Image SLES15-SP4-BYOS
Image SLES15-SP4-BYOS-Azure
Image SLES15-SP4-BYOS-EC2
Image SLES15-SP4-BYOS-GCE
Image SLES15-SP4-CHOST-BYOS
Image SLES15-SP4-CHOST-BYOS-Aliyun
Image SLES15-SP4-CHOST-BYOS-Azure
Image SLES15-SP4-CHOST-BYOS-EC2
Image SLES15-SP4-CHOST-BYOS-GCE
Image SLES15-SP4-CHOST-BYOS-SAP-CCloud
Image SLES15-SP4-EC2
Image SLES15-SP4-EC2-ECS-HVM
Image SLES15-SP4-GCE
Image SLES15-SP4-HPC
Image SLES15-SP4-HPC-Azure
Image SLES15-SP4-HPC-BYOS
Image SLES15-SP4-HPC-BYOS-Azure
Image SLES15-SP4-HPC-BYOS-EC2
Image SLES15-SP4-HPC-BYOS-GCE
Image SLES15-SP4-HPC-EC2
Image SLES15-SP4-HPC-GCE
Image SLES15-SP4-Hardened-BYOS
Image SLES15-SP4-Hardened-BYOS-Azure
Image SLES15-SP4-Hardened-BYOS-EC2
Image SLES15-SP4-Hardened-BYOS-GCE
Image SLES15-SP4-Manager-Proxy-4-3-BYOS
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE
Image SLES15-SP4-Manager-Server-4-3
Image SLES15-SP4-Manager-Server-4-3-Azure-llc
Image SLES15-SP4-Manager-Server-4-3-Azure-ltd
Image SLES15-SP4-Manager-Server-4-3-BYOS
Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure
Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2
Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE
Image SLES15-SP4-Manager-Server-4-3-EC2-llc
Image SLES15-SP4-Manager-Server-4-3-EC2-ltd
Image SLES15-SP4-SAP
Image SLES15-SP4-SAP-Azure
Image SLES15-SP4-SAP-Azure-LI-BYOS
Image SLES15-SP4-SAP-Azure-LI-BYOS-Production
Image SLES15-SP4-SAP-Azure-VLI-BYOS
Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP4-SAP-BYOS
Image SLES15-SP4-SAP-BYOS-Azure
Image SLES15-SP4-SAP-BYOS-EC2
Image SLES15-SP4-SAP-BYOS-GCE
Image SLES15-SP4-SAP-EC2
Image SLES15-SP4-SAP-GCE
Image SLES15-SP4-SAP-Hardened
Image SLES15-SP4-SAP-Hardened-Azure
Image SLES15-SP4-SAP-Hardened-BYOS
Image SLES15-SP4-SAP-Hardened-BYOS-Azure
Image SLES15-SP4-SAP-Hardened-BYOS-EC2
Image SLES15-SP4-SAP-Hardened-BYOS-GCE
Image SLES15-SP4-SAP-Hardened-EC2
Image SLES15-SP4-SAP-Hardened-GCE
Image SLES15-SP4-SAPCAL
Image SLES15-SP4-SAPCAL-Azure
Image SLES15-SP4-SAPCAL-EC2
Image SLES15-SP4-SAPCAL-GCE
SUSE Linux Enterprise High Availability Extension 15 SP4
SUSE Linux Enterprise Micro 5.3
SUSE Linux Enterprise Module for Basesystem 15 SP4
openSUSE Leap 15.4
openSUSE Leap Micro 5.3
Ссылки
- Link for SUSE-SU-2023:0160-1
- E-Mail link for SUSE-SU-2023:0160-1
- SUSE Security Ratings
- SUSE Bug 1200102
- SUSE Bug 1201490
- SUSE Bug 1201492
- SUSE Bug 1201493
- SUSE Bug 1201495
- SUSE Bug 1201496
- SUSE Bug 1201689
- SUSE Bug 1204254
- SUSE Bug 1205126
- SUSE Bug 1205385
- SUSE Bug 1205386
- SUSE Bug 1206504
- SUSE Bug 1206546
- SUSE CVE CVE-2021-20251 page
- SUSE CVE CVE-2022-2031 page
- SUSE CVE CVE-2022-32742 page
- SUSE CVE CVE-2022-32744 page
Описание
A flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met.
Затронутые продукты
Ссылки
- CVE-2021-20251
- SUSE Bug 1206546
- SUSE Bug 1208433
- SUSE Bug 1209325
- SUSE Bug 1209664
Описание
A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other's tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tickets to other services.
Затронутые продукты
Ссылки
- CVE-2022-2031
- SUSE Bug 1201495
- SUSE Bug 1202815
- SUSE Bug 1202999
- SUSE Bug 1205061
- SUSE Bug 1208433
- SUSE Bug 1209664
Описание
A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer).
Затронутые продукты
Ссылки
- CVE-2022-32742
- SUSE Bug 1201496
- SUSE Bug 1202815
Описание
A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover.
Затронутые продукты
Ссылки
- CVE-2022-32744
- SUSE Bug 1201493
- SUSE Bug 1202815
- SUSE Bug 1209664
Описание
A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault.
Затронутые продукты
Ссылки
- CVE-2022-32745
- SUSE Bug 1201492
Описание
A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAccountControl.
Затронутые продукты
Ссылки
- CVE-2022-32746
- SUSE Bug 1201490
Описание
A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack.
Затронутые продукты
Ссылки
- CVE-2022-3437
- SUSE Bug 1204254
- SUSE Bug 1205667
- SUSE Bug 1208992
Описание
Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability
Затронутые продукты
Ссылки
- CVE-2022-37966
- SUSE Bug 1205385
- SUSE Bug 1208347
- SUSE Bug 1208433
- SUSE Bug 1209664
Описание
Windows Kerberos Elevation of Privilege Vulnerability
Затронутые продукты
Ссылки
- CVE-2022-37967
- SUSE Bug 1205386
- SUSE Bug 1208347
Описание
Netlogon RPC Elevation of Privilege Vulnerability
Затронутые продукты
Ссылки
- CVE-2022-38023
- SUSE Bug 1206504
- SUSE Bug 1209664
- SUSE Bug 1213694
Описание
PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
Затронутые продукты
Ссылки
- CVE-2022-42898
- SUSE Bug 1205126
- SUSE Bug 1205667
- SUSE Bug 1207423
- SUSE Bug 1207690
- SUSE Bug 1211487
- SUSE Bug 1225675