SUSE: 2022:2586-2 important: ldb, samba | LinuxSecurity.com

   SUSE Security Update: Security update for ldb, samba
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:2586-2
Rating:             important
References:         #1196224 #1198255 #1199247 #1199734 #1200556 
                    #1200964 #1201490 #1201492 #1201493 #1201495 
                    #1201496 
Cross-References:   CVE-2022-2031 CVE-2022-32742 CVE-2022-32744
                    CVE-2022-32745 CVE-2022-32746
CVSS scores:
                    CVE-2022-2031 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-2031 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-32742 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
                    CVE-2022-32742 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
                    CVE-2022-32744 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-32744 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-32745 (NVD) : 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
                    CVE-2022-32745 (SUSE): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
                    CVE-2022-32746 (NVD) : 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
                    CVE-2022-32746 (SUSE): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

Affected Products:
                    openSUSE Leap Micro 5.2
______________________________________________________________________________

   An update that solves 5 vulnerabilities and has 6 fixes is
   now available.

Description:

   This update for ldb, samba fixes the following issues:

   - CVE-2022-32746: Fixed a use-after-free occurring in database audit
     logging (bsc#1201490).
   - CVE-2022-32745: Fixed a remote server crash with an LDAP add or modify
     request (bsc#1201492).
   - CVE-2022-2031: Fixed AD restrictions bypass associated with changing
     passwords (bsc#1201495).
   - CVE-2022-32742: Fixed a memory leak in SMB1 (bsc#1201496).
   - CVE-2022-32744: Fixed an arbitrary password change request for any AD
     user (bsc#1201493).

   The following security bugs were fixed:

   samba was updated to 4.15.8:

   * Use pathref fd instead of io fd in vfs_default_durable_cookie;
     (bso#15042);
   * Setting fruit:resource = stream in vfs_fruit causes a panic; (bso#15099);
   * Add support for bind 9.18; (bso#14986);
   * logging dsdb audit to specific files does not work; (bso#15076);
   * vfs_gpfs with vfs_shadowcopy2 fail to restore file if original file had
     been deleted; (bso#15069);
   * netgroups support removed; (bso#15087); (bsc#1199247);
   * net ads info shows LDAP Server: 0.0.0.0 depending on contacted server;
     (bso#14674); (bsc#1199734);
   * waf produces incorrect names for python extensions with Python 3.11;
     (bso#15071);
   * smbclient commands del & deltree fail with
     NT_STATUS_OBJECT_PATH_NOT_FOUND with DFS; (bso#15100); (bsc#1200556);
   * vfs_gpfs recalls=no option prevents listing files; (bso#15055);
   * waf produces incorrect names for python extensions with Python 3.11;
     (bso#15071);
   * Compile error in source3/utils/regedit_hexedit.c; (bso#15091);
   * ldconfig: /lib64/libsmbconf.so.0 is not a symbolic link; (bso#15108);
   * smbd doesn't handle UPNs for looking up names; (bso#15054);
   * Out-by-4 error in smbd read reply max_send clamp; (bso#14443);

   - Move pdb backends from package samba-libs to package samba-client-libs
     and remove samba-libs requirement from samba-winbind; (bsc#1200964);
     (bsc#1198255);
   - Use the canonical realm name to refresh the Kerberos tickets;
     (bsc#1196224); (bso#14979);
   - Fix  smbclient commands del & deltree failing with
     NT_STATUS_OBJECT_PATH_NOT_FOUND with DFS; (bso#15100); (bsc#1200556).

   ldb was updated to version 2.4.3

   * Fix build problems, waf produces incorrect names for python extensions;
     (bso#15071);


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap Micro 5.2:

      zypper in -t patch openSUSE-Leap-Micro-5.2-2022-2586=1



Package List:

   - openSUSE Leap Micro 5.2 (aarch64 x86_64):

      ldb-debugsource-2.4.3-150300.3.20.1
      libldb2-2.4.3-150300.3.20.1
      libldb2-debuginfo-2.4.3-150300.3.20.1
      samba-client-libs-4.15.8+git.500.d5910280cc7-150300.3.37.1
      samba-client-libs-debuginfo-4.15.8+git.500.d5910280cc7-150300.3.37.1
      samba-debuginfo-4.15.8+git.500.d5910280cc7-150300.3.37.1
      samba-debugsource-4.15.8+git.500.d5910280cc7-150300.3.37.1


References:

   https://www.suse.com/security/cve/CVE-2022-2031.html
   https://www.suse.com/security/cve/CVE-2022-32742.html
   https://www.suse.com/security/cve/CVE-2022-32744.html
   https://www.suse.com/security/cve/CVE-2022-32745.html
   https://www.suse.com/security/cve/CVE-2022-32746.html
   https://bugzilla.suse.com/1196224
   https://bugzilla.suse.com/1198255
   https://bugzilla.suse.com/1199247
   https://bugzilla.suse.com/1199734
   https://bugzilla.suse.com/1200556
   https://bugzilla.suse.com/1200964
   https://bugzilla.suse.com/1201490
   https://bugzilla.suse.com/1201492
   https://bugzilla.suse.com/1201493
   https://bugzilla.suse.com/1201495
   https://bugzilla.suse.com/1201496

SUSE: 2022:2586-2 important: ldb, samba

September 1, 2022
An update that solves 5 vulnerabilities and has 6 fixes is now available

Summary

This update for ldb, samba fixes the following issues: - CVE-2022-32746: Fixed a use-after-free occurring in database audit logging (bsc#1201490). - CVE-2022-32745: Fixed a remote server crash with an LDAP add or modify request (bsc#1201492). - CVE-2022-2031: Fixed AD restrictions bypass associated with changing passwords (bsc#1201495). - CVE-2022-32742: Fixed a memory leak in SMB1 (bsc#1201496). - CVE-2022-32744: Fixed an arbitrary password change request for any AD user (bsc#1201493). The following security bugs were fixed: samba was updated to 4.15.8: * Use pathref fd instead of io fd in vfs_default_durable_cookie; (bso#15042); * Setting fruit:resource = stream in vfs_fruit causes a panic; (bso#15099); * Add support for bind 9.18; (bso#14986); * logging dsdb audit to specific files does not work; (bso#15076); * vfs_gpfs with vfs_shadowcopy2 fail to restore file if original file had been deleted; (bso#15069); * netgroups support removed; (bso#15087); (bsc#1199247); * net ads info shows LDAP Server: 0.0.0.0 depending on contacted server; (bso#14674); (bsc#1199734); * waf produces incorrect names for python extensions with Python 3.11; (bso#15071); * smbclient commands del & deltree fail with NT_STATUS_OBJECT_PATH_NOT_FOUND with DFS; (bso#15100); (bsc#1200556); * vfs_gpfs recalls=no option prevents listing files; (bso#15055); * waf produces incorrect names for python extensions with Python 3.11; (bso#15071); * Compile error in source3/utils/regedit_hexedit.c; (bso#15091); * ldconfig: /lib64/libsmbconf.so.0 is not a symbolic link; (bso#15108); * smbd doesn't handle UPNs for looking up names; (bso#15054); * Out-by-4 error in smbd read reply max_send clamp; (bso#14443); - Move pdb backends from package samba-libs to package samba-client-libs and remove samba-libs requirement from samba-winbind; (bsc#1200964); (bsc#1198255); - Use the canonical realm name to refresh the Kerberos tickets; (bsc#1196224); (bso#14979); - Fix smbclient commands del & deltree failing with NT_STATUS_OBJECT_PATH_NOT_FOUND with DFS; (bso#15100); (bsc#1200556). ldb was updated to version 2.4.3 * Fix build problems, waf produces incorrect names for python extensions; (bso#15071); Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap Micro 5.2: zypper in -t patch openSUSE-Leap-Micro-5.2-2022-2586=1 Package List: - openSUSE Leap Micro 5.2 (aarch64 x86_64): ldb-debugsource-2.4.3-150300.3.20.1 libldb2-2.4.3-150300.3.20.1 libldb2-debuginfo-2.4.3-150300.3.20.1 samba-client-libs-4.15.8+git.500.d5910280cc7-150300.3.37.1 samba-client-libs-debuginfo-4.15.8+git.500.d5910280cc7-150300.3.37.1 samba-debuginfo-4.15.8+git.500.d5910280cc7-150300.3.37.1 samba-debugsource-4.15.8+git.500.d5910280cc7-150300.3.37.1

References

#1196224 #1198255 #1199247 #1199734 #1200556

#1200964 #1201490 #1201492 #1201493 #1201495

#1201496

Cross- CVE-2022-2031 CVE-2022-32742 CVE-2022-32744

CVE-2022-32745 CVE-2022-32746

CVSS scores:

CVE-2022-2031 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-2031 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-32742 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE-2022-32742 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE-2022-32744 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-32744 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-32745 (NVD) : 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H

CVE-2022-32745 (SUSE): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

CVE-2022-32746 (NVD) : 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

CVE-2022-32746 (SUSE): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

Affected Products:

openSUSE Leap Micro 5.2

https://www.suse.com/security/cve/CVE-2022-2031.html

https://www.suse.com/security/cve/CVE-2022-32742.html

https://www.suse.com/security/cve/CVE-2022-32744.html

https://www.suse.com/security/cve/CVE-2022-32745.html

https://www.suse.com/security/cve/CVE-2022-32746.html

https://bugzilla.suse.com/1196224

https://bugzilla.suse.com/1198255

https://bugzilla.suse.com/1199247

https://bugzilla.suse.com/1199734

https://bugzilla.suse.com/1200556

https://bugzilla.suse.com/1200964

https://bugzilla.suse.com/1201490

https://bugzilla.suse.com/1201492

https://bugzilla.suse.com/1201493

https://bugzilla.suse.com/1201495

https://bugzilla.suse.com/1201496

Severity
Announcement ID: SUSE-SU-2022:2586-2
Rating: important

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.