SUSE-SU-2022:2586-2: important: Security update for ldb, samba

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu Sep 1 15:08:40 UTC 2022


   SUSE Security Update: Security update for ldb, samba
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:2586-2
Rating:             important
References:         #1196224 #1198255 #1199247 #1199734 #1200556 
                    #1200964 #1201490 #1201492 #1201493 #1201495 
                    #1201496 
Cross-References:   CVE-2022-2031 CVE-2022-32742 CVE-2022-32744
                    CVE-2022-32745 CVE-2022-32746
CVSS scores:
                    CVE-2022-2031 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-2031 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-32742 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
                    CVE-2022-32742 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
                    CVE-2022-32744 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-32744 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-32745 (NVD) : 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
                    CVE-2022-32745 (SUSE): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
                    CVE-2022-32746 (NVD) : 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
                    CVE-2022-32746 (SUSE): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

Affected Products:
                    openSUSE Leap Micro 5.2
______________________________________________________________________________

   An update that solves 5 vulnerabilities and has 6 fixes is
   now available.

Description:

   This update for ldb, samba fixes the following issues:

   - CVE-2022-32746: Fixed a use-after-free occurring in database audit
     logging (bsc#1201490).
   - CVE-2022-32745: Fixed a remote server crash with an LDAP add or modify
     request (bsc#1201492).
   - CVE-2022-2031: Fixed AD restrictions bypass associated with changing
     passwords (bsc#1201495).
   - CVE-2022-32742: Fixed a memory leak in SMB1 (bsc#1201496).
   - CVE-2022-32744: Fixed an arbitrary password change request for any AD
     user (bsc#1201493).

   The following security bugs were fixed:

   samba was updated to 4.15.8:

   * Use pathref fd instead of io fd in vfs_default_durable_cookie;
     (bso#15042);
   * Setting fruit:resource = stream in vfs_fruit causes a panic; (bso#15099);
   * Add support for bind 9.18; (bso#14986);
   * logging dsdb audit to specific files does not work; (bso#15076);
   * vfs_gpfs with vfs_shadowcopy2 fail to restore file if original file had
     been deleted; (bso#15069);
   * netgroups support removed; (bso#15087); (bsc#1199247);
   * net ads info shows LDAP Server: 0.0.0.0 depending on contacted server;
     (bso#14674); (bsc#1199734);
   * waf produces incorrect names for python extensions with Python 3.11;
     (bso#15071);
   * smbclient commands del & deltree fail with
     NT_STATUS_OBJECT_PATH_NOT_FOUND with DFS; (bso#15100); (bsc#1200556);
   * vfs_gpfs recalls=no option prevents listing files; (bso#15055);
   * waf produces incorrect names for python extensions with Python 3.11;
     (bso#15071);
   * Compile error in source3/utils/regedit_hexedit.c; (bso#15091);
   * ldconfig: /lib64/libsmbconf.so.0 is not a symbolic link; (bso#15108);
   * smbd doesn't handle UPNs for looking up names; (bso#15054);
   * Out-by-4 error in smbd read reply max_send clamp; (bso#14443);

   - Move pdb backends from package samba-libs to package samba-client-libs
     and remove samba-libs requirement from samba-winbind; (bsc#1200964);
     (bsc#1198255);
   - Use the canonical realm name to refresh the Kerberos tickets;
     (bsc#1196224); (bso#14979);
   - Fix  smbclient commands del & deltree failing with
     NT_STATUS_OBJECT_PATH_NOT_FOUND with DFS; (bso#15100); (bsc#1200556).

   ldb was updated to version 2.4.3

   * Fix build problems, waf produces incorrect names for python extensions;
     (bso#15071);


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap Micro 5.2:

      zypper in -t patch openSUSE-Leap-Micro-5.2-2022-2586=1



Package List:

   - openSUSE Leap Micro 5.2 (aarch64 x86_64):

      ldb-debugsource-2.4.3-150300.3.20.1
      libldb2-2.4.3-150300.3.20.1
      libldb2-debuginfo-2.4.3-150300.3.20.1
      samba-client-libs-4.15.8+git.500.d5910280cc7-150300.3.37.1
      samba-client-libs-debuginfo-4.15.8+git.500.d5910280cc7-150300.3.37.1
      samba-debuginfo-4.15.8+git.500.d5910280cc7-150300.3.37.1
      samba-debugsource-4.15.8+git.500.d5910280cc7-150300.3.37.1


References:

   https://www.suse.com/security/cve/CVE-2022-2031.html
   https://www.suse.com/security/cve/CVE-2022-32742.html
   https://www.suse.com/security/cve/CVE-2022-32744.html
   https://www.suse.com/security/cve/CVE-2022-32745.html
   https://www.suse.com/security/cve/CVE-2022-32746.html
   https://bugzilla.suse.com/1196224
   https://bugzilla.suse.com/1198255
   https://bugzilla.suse.com/1199247
   https://bugzilla.suse.com/1199734
   https://bugzilla.suse.com/1200556
   https://bugzilla.suse.com/1200964
   https://bugzilla.suse.com/1201490
   https://bugzilla.suse.com/1201492
   https://bugzilla.suse.com/1201493
   https://bugzilla.suse.com/1201495
   https://bugzilla.suse.com/1201496



More information about the sle-updates mailing list