|
|
Subscribe / Log in / New account

SUSE alert SUSE-SU-2023:0620-1 (samba)

From:  sle-security-updates@lists.suse.com
To:  sle-security-updates@lists.suse.com
Subject:  SUSE-SU-2023:0620-1: important: Security update for samba
Date:  Mon, 06 Mar 2023 12:30:22 -0000
Message-ID:  <167810582215.14088.2084715849874111455@smelt2.suse.de>

# Security update for samba Announcement ID: SUSE-SU-2023:0620-1 Rating: important References: * #1205385 * #1206504 * #1206546 Cross-References: * CVE-2021-20251 * CVE-2022-37966 * CVE-2022-38023 CVSS scores: * CVE-2021-20251 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-37966 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-37966 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-38023 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-38023 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7 * SUSE Linux Enterprise Server 15 SP2 An update that solves three vulnerabilities can now be installed. ## Description: This update for samba fixes the following issues: * CVE-2021-20251: Fixed bad password count that was not incremented atomically (bsc#1206546). * CVE-2022-38023: Fixed weak RC4/HMAC-MD5 NetLogon Secure Channel usage should be avoided (bsc#1206504). * CVE-2022-37966: Fixed privilege elevation vulnerability with option 'kerberos encryption types = legacy' which would force RC4-HMAC as a client even if the server supports AES (bsc#1205385). ## Patch Instructions: To install this SUSE Important update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Enterprise Storage 7 zypper in -t patch SUSE-Storage-7-2023-620=1 ## Package List: * SUSE Enterprise Storage 7 (aarch64 x86_64) * libndr1-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libwbclient0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libsmbclient0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libsamdb0-4.13.13+git.616.557146479a-150200.3.21.1 * libwbclient0-4.13.13+git.616.557146479a-150200.3.21.1 * libsamba-credentials0-4.13.13+git.616.557146479a-150200.3.21.1 * samba-client-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libsamba-passdb0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * samba-client-4.13.13+git.616.557146479a-150200.3.21.1 * samba-libs-python3-4.13.13+git.616.557146479a-150200.3.21.1 * samba-libs-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libsamba-util0-4.13.13+git.616.557146479a-150200.3.21.1 * samba-libs-python3-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libnetapi0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libtevent-util0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libsamba-errors0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libdcerpc0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libdcerpc-binding0-4.13.13+git.616.557146479a-150200.3.21.1 * libndr-krb5pac0-4.13.13+git.616.557146479a-150200.3.21.1 * libndr-nbt0-4.13.13+git.616.557146479a-150200.3.21.1 * libsmbclient0-4.13.13+git.616.557146479a-150200.3.21.1 * samba-4.13.13+git.616.557146479a-150200.3.21.1 * samba-debugsource-4.13.13+git.616.557146479a-150200.3.21.1 * libsamdb0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libsamba-credentials0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libtevent-util0-4.13.13+git.616.557146479a-150200.3.21.1 * ctdb-4.13.13+git.616.557146479a-150200.3.21.1 * samba-winbind-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libsamba-util0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libsamba-passdb0-4.13.13+git.616.557146479a-150200.3.21.1 * libsmbldap2-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libsmbconf0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * ctdb-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libsamba-errors0-4.13.13+git.616.557146479a-150200.3.21.1 * libdcerpc-binding0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libsamba-hostconfig0-4.13.13+git.616.557146479a-150200.3.21.1 * libsmbldap2-4.13.13+git.616.557146479a-150200.3.21.1 * libdcerpc0-4.13.13+git.616.557146479a-150200.3.21.1 * libndr-nbt0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * samba-ceph-4.13.13+git.616.557146479a-150200.3.21.1 * samba-libs-4.13.13+git.616.557146479a-150200.3.21.1 * libndr-standard0-4.13.13+git.616.557146479a-150200.3.21.1 * libndr-krb5pac0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libndr-standard0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * samba-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libsmbconf0-4.13.13+git.616.557146479a-150200.3.21.1 * samba-ceph-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * samba-winbind-4.13.13+git.616.557146479a-150200.3.21.1 * libndr1-4.13.13+git.616.557146479a-150200.3.21.1 * libsamba-hostconfig0-debuginfo-4.13.13+git.616.557146479a-150200.3.21.1 * libnetapi0-4.13.13+git.616.557146479a-150200.3.21.1 ## References: * https://www.suse.com/security/cve/CVE-2021-20251.html * https://www.suse.com/security/cve/CVE-2022-37966.html * https://www.suse.com/security/cve/CVE-2022-38023.html * https://bugzilla.suse.com/show_bug.cgi?id=1205385 * https://bugzilla.suse.com/show_bug.cgi?id=1206504 * https://bugzilla.suse.com/show_bug.cgi?id=1206546


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds