SUSE alert SUSE-SU-2023:3066-1 (samba)
From: | sle-security-updates@lists.suse.com | |
To: | sle-security-updates@lists.suse.com | |
Subject: | SUSE-SU-2023:3066-1: important: Security update for samba | |
Date: | Mon, 31 Jul 2023 16:30:13 -0000 | |
Message-ID: | <169082101363.25036.1244244681543295336@smelt2.suse.de> |
# Security update for samba Announcement ID: SUSE-SU-2023:3066-1 Rating: important References: * #1213171 * #1213172 * #1213173 * #1213174 * #1213384 Cross-References: * CVE-2022-2127 * CVE-2023-34966 * CVE-2023-34967 * CVE-2023-34968 CVSS scores: * CVE-2022-2127 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-2127 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-34966 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-34966 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-34967 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-34967 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-34968 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-34968 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * SUSE Enterprise Storage 7 * SUSE Linux Enterprise Server 15 SP2 An update that solves four vulnerabilities and has one fix can now be installed. ## Description: This update for samba fixes the following issues: * CVE-2022-2127: Fixed issue where lm_resp_len was not checked properly in winbindd_pam_auth_crap_send (bsc#1213174). * CVE-2023-34966: Fixed samba spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability (bsc#1213173). * CVE-2023-34967: Fixed samba spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability (bsc#1213172). * CVE-2023-34968: Fixed spotlight server-side Share Path Disclosure (bsc#1213171). Bugfixes: * Fixed trust relationship failure (bsc#1213384). ## Patch Instructions: To install this SUSE Important update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Enterprise Storage 7 zypper in -t patch SUSE-Storage-7-2023-3066=1 ## Package List: * SUSE Enterprise Storage 7 (aarch64 x86_64) * libndr-nbt0-4.13.13+git.643.8caa136952b-150200.3.26.3 * libndr-standard0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * samba-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsamba-errors0-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsamba-hostconfig0-4.13.13+git.643.8caa136952b-150200.3.26.3 * samba-winbind-4.13.13+git.643.8caa136952b-150200.3.26.3 * libndr1-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsmbclient0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libdcerpc0-4.13.13+git.643.8caa136952b-150200.3.26.3 * samba-libs-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsmbldap2-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsmbldap2-4.13.13+git.643.8caa136952b-150200.3.26.3 * libdcerpc-binding0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * ctdb-4.13.13+git.643.8caa136952b-150200.3.26.3 * samba-client-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libtevent-util0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsamba-passdb0-4.13.13+git.643.8caa136952b-150200.3.26.3 * libnetapi0-4.13.13+git.643.8caa136952b-150200.3.26.3 * libndr-krb5pac0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsamba-errors0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsmbconf0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsamba-util0-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsamba-credentials0-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsamba-hostconfig0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * samba-ceph-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libnetapi0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libdcerpc0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsamba-util0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libndr-standard0-4.13.13+git.643.8caa136952b-150200.3.26.3 * samba-debugsource-4.13.13+git.643.8caa136952b-150200.3.26.3 * samba-winbind-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * samba-libs-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsamba-passdb0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libndr1-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsmbconf0-4.13.13+git.643.8caa136952b-150200.3.26.3 * libwbclient0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * samba-libs-python3-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsamdb0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * samba-libs-python3-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * samba-4.13.13+git.643.8caa136952b-150200.3.26.3 * libdcerpc-binding0-4.13.13+git.643.8caa136952b-150200.3.26.3 * samba-ceph-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsamdb0-4.13.13+git.643.8caa136952b-150200.3.26.3 * samba-client-4.13.13+git.643.8caa136952b-150200.3.26.3 * libwbclient0-4.13.13+git.643.8caa136952b-150200.3.26.3 * ctdb-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libndr-nbt0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsamba-credentials0-debuginfo-4.13.13+git.643.8caa136952b-150200.3.26.3 * libndr-krb5pac0-4.13.13+git.643.8caa136952b-150200.3.26.3 * libsmbclient0-4.13.13+git.643.8caa136952b-150200.3.26.3 * libtevent-util0-4.13.13+git.643.8caa136952b-150200.3.26.3 ## References: * https://www.suse.com/security/cve/CVE-2022-2127.html * https://www.suse.com/security/cve/CVE-2023-34966.html * https://www.suse.com/security/cve/CVE-2023-34967.html * https://www.suse.com/security/cve/CVE-2023-34968.html * https://bugzilla.suse.com/show_bug.cgi?id=1213171 * https://bugzilla.suse.com/show_bug.cgi?id=1213172 * https://bugzilla.suse.com/show_bug.cgi?id=1213173 * https://bugzilla.suse.com/show_bug.cgi?id=1213174 * https://bugzilla.suse.com/show_bug.cgi?id=1213384