Security update for ldb, samba
Announcement ID: | SUSE-SU-2022:0361-1 |
---|---|
Rating: | critical |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 11 vulnerabilities, contains one feature and has two security fixes can now be installed.
Description:
This update for ldb, samba fixes the following issues:
Changes in ldb:
- CVE-2020-25718: An RODC can issue (forge) administrator tickets to other servers; (bsc#1192246)
- CVE-2021-3738: Fixed a crash in dsdb stack (bsc#1192215)
Release ldb 2.2.2
- Corrected python behaviour for 'in' for LDAP attributes contained as part of ldb.Message
- Fix memory handling in ldb.msg_diff
- Backport bronze bit fixes, tests, and selftest improvements.
Changes in samba:
-
CVE-2021-44142: Fixed an Out-of-Bound Read/Write on Samba vfs_fruit module; (bsc#1194859)
-
The username map [script] advice from CVE-2020-25717 advisory note has undesired side effects for the local nt token. Fallback to a SID/UID based mapping if the name based lookup fails; (bsc#1192849); (bso#14901).
-
Fix regression introduced by CVE-2020-25717 patches, winbindd does not start when 'allow trusted domains' is off; (bso#14899);
-
CVE-2020-25717: Fixed that a user on the domain can become root on domain members; (bsc#1192284); (bso#14556).
- CVE-2020-25721: auth: Fill in the new HAS_SAM_NAME_AND_SID values; (bsc#1192505); (bso#14564).
- CVE-2020-25718: An RODC can issue (forge) administrator tickets to other servers; (bsc#1192246);(bso#14558).
- CVE-2020-25719: Fixed AD DC Username based races when no PAC is given;(bsc#1192247);(bso#14561).
- CVE-2020-25722: Fixed that AD DC UPN vs samAccountName not checked (top-level bug for AD DC validation issues);(bsc#1192283); (bso#14564).
- CVE-2021-3738: Fixed a crash in dsdb stack;(bsc#1192215); (bso#14468).
-
CVE-2021-23192: Fixed that dcerpc requests don't check all fragments against the first auth_state;(bsc#1192214);(bso#14875).
-
CVE-2016-2124: don't fallback to non spnego authentication if we require kerberos; (bsc#1014440); (bso#12444).
Update to 4.13.13
- rodc_rwdc test flaps;(bso#14868).
- Backport bronze bit fixes, tests, and selftest improvements; (bso#14881).
- Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal;(bso#14642).
- Python ldb.msg_diff() memory handling failure;(bso#14836).
- "in" operator on ldb.Message is case sensitive;(bso#14845).
- Fix Samba support for UF_NO_AUTH_DATA_REQUIRED;(bso#14871).
- Allow special chars like "@" in samAccountName when generating the salt;(bso#14874).
- Fix transit path validation;(bso#12998).
- Prepare to operate with MIT krb5 >= 1.20;(bso#14870).
- rpcclient NetFileEnum and net rpc file both cause lock order violation: brlock.tdb, share_entries.tdb;(bso#14645).
- Python ldb.msg_diff() memory handling failure;(bso#14836).
-
Release LDB 2.3.1 for Samba 4.14.9;(bso#14848).
-
Update to 4.13.12
-
Address a signifcant performance regression in database access in the AD DC since Samba 4.12;(bso#14806).
- Fix performance regression in lsa_LookupSids3/LookupNames4 since Samba 4.9 by using an explicit database handle cache; (bso#14807).
- An unuthenticated user can crash the AD DC KDC by omitting the server name in a TGS-REQ;(bso#14817).
- Address flapping samba_tool_drs_showrepl test;(bso#14818).
- Address flapping dsdb_schema_attributes test;(bso#14819).
- An unuthenticated user can crash the AD DC KDC by omitting the server name in a TGS-REQ;(bso#14817).
-
Fix CTDB flag/status update race conditions(bso#14784).
-
Update to 4.13.11
-
smbd: panic on force-close share during offload write; (bso#14769).
- Fix returned attributes on fake quota file handle and avoid hitting the VFS;(bso#14731).
- smbd: "deadtime" parameter doesn't work anymore;(bso#14783).
- net conf list crashes when run as normal user;(bso#14787).
- Work around special SMB2 READ response behavior of NetApp Ontap 7.3.7;(bso#14607).
- Start the SMB encryption as soon as possible;(bso#14793).
-
Winbind should not start if the socket path for the privileged pipe is too long;(bso#14792).
-
Fix 'net rpc' authentication when using the machine account; (bsc#1189017); (bso#14796);
-
Fix dependency problem upgrading from libndr0 to libndr1; (bsc#1189875);
- Fix dependency problem upgrading from libsmbldap0 to libsmbldap2; (bsc#1189875);
- Fix wrong kvno exported to keytab after net ads changetrustpw due to replication delay; (bsc#1188727);
-
Add Certificate Auto Enrollment Policy; (jsc#SLE-18456).
-
Update to 4.13.10
-
s3: smbd: Ensure POSIX default ACL is mapped into returned Windows ACL for directory handles; (bso#14708);
- Take a copy to make sure we don't reference free'd memory; (bso#14721);
- s3: lib: Fix talloc heirarcy error in parent_smb_fname(); (bso#14722);
- s3: smbd: Remove erroneous TALLOC_FREE(smb_fname_parent) in change_file_owner_to_parent() error path; (bso#14736);
- samba-tool: Give better error information when the 'domain backup restore' fails with a duplicate SID; (bso#14575);
- smbd: Correctly initialize close timestamp fields; (bso#14714);
- Spotlight RPC service doesn't work with vfs_glusterfs; (bso#14740);
- ctdb: Fix a crash in run_proc_signal_handler(); (bso#14475);
- gensec_krb5: Restore ipv6 support for kpasswd; (bso#14750);
- smbXsrv_{open,session,tcon}: Protect smbXsrv_{open,session,tcon}_global_traverse_fn against invalid records; (bso#14752);
- samba-tool domain backup offline doesn't work against bind DLZ backend; (bso#14027);
-
netcmd: Use next_free_rid() function to calculate a SID for restoring a backup; (bso#14669);
-
Update to 4.13.9
-
s3: smbd: SMB1 SMBsplwr doesn't send a reply packet on success; (bso#14696);
- Add documentation for dsdb_group_audit and dsdb_group_json_audit to "log level", synchronise "log level" in smb.conf with the code; (bso#14689);
- Fix smbd panic when two clients open same file; (bso#14672);
- Fix memory leak in the RPC server; (bso#14675);
- s3: smbd: Fix deferred renames; (bso#14679);
- s3-iremotewinspool: Set the per-request memory context; (bso#14675);
- rpc_server3: Fix a memleak for internal pipes; (bso#14675);
- third_party: Update socket_wrapper to version 1.3.2; (bso#11899);
- third_party: Update socket_wrapper to version 1.3.3; (bso#14639);
- idmap_rfc2307 and idmap_nss return wrong mapping for uid/gid conflict; (bso#14663);
-
Fix the build on OmniOS; (bso#14288);
-
Update to 4.13.8
-
CVE-2021-20254: Fix buffer overrun in sids_to_unixids(); (bso#14571
-
Update to 4.13.7
-
Release with dependency on ldb version 2.2.1.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Enterprise Storage 7
zypper in -t patch SUSE-Storage-7-2022-361=1
Package List:
-
SUSE Enterprise Storage 7 (aarch64 x86_64)
- libtevent-util0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libsmbconf0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libtevent-util0-4.13.13+git.545.5897c2d94f3-3.12.1
- libwbclient0-4.13.13+git.545.5897c2d94f3-3.12.1
- libldb2-2.2.2-4.6.1
- libnetapi0-4.13.13+git.545.5897c2d94f3-3.12.1
- ctdb-4.13.13+git.545.5897c2d94f3-3.12.1
- libdcerpc0-4.13.13+git.545.5897c2d94f3-3.12.1
- libsamba-passdb0-4.13.13+git.545.5897c2d94f3-3.12.1
- libndr-nbt0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- samba-libs-python3-4.13.13+git.545.5897c2d94f3-3.12.1
- libndr-standard0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libsamba-hostconfig0-4.13.13+git.545.5897c2d94f3-3.12.1
- python3-ldb-debuginfo-2.2.2-4.6.1
- samba-ceph-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libldb2-debuginfo-2.2.2-4.6.1
- libdcerpc-binding0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libndr1-4.13.13+git.545.5897c2d94f3-3.12.1
- libndr1-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- samba-4.13.13+git.545.5897c2d94f3-3.12.1
- samba-winbind-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libndr-nbt0-4.13.13+git.545.5897c2d94f3-3.12.1
- ldb-debugsource-2.2.2-4.6.1
- libsmbclient0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- samba-libs-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- samba-winbind-4.13.13+git.545.5897c2d94f3-3.12.1
- libsamba-hostconfig0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libnetapi0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libsamdb0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libdcerpc-binding0-4.13.13+git.545.5897c2d94f3-3.12.1
- libsamba-util0-4.13.13+git.545.5897c2d94f3-3.12.1
- samba-ceph-4.13.13+git.545.5897c2d94f3-3.12.1
- libndr-standard0-4.13.13+git.545.5897c2d94f3-3.12.1
- libsamba-credentials0-4.13.13+git.545.5897c2d94f3-3.12.1
- libsmbclient0-4.13.13+git.545.5897c2d94f3-3.12.1
- libsmbldap2-4.13.13+git.545.5897c2d94f3-3.12.1
- libdcerpc0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libsmbldap2-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- samba-libs-python3-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libsamba-errors0-4.13.13+git.545.5897c2d94f3-3.12.1
- libsamba-errors0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libsamba-util0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- samba-debugsource-4.13.13+git.545.5897c2d94f3-3.12.1
- libsamdb0-4.13.13+git.545.5897c2d94f3-3.12.1
- libwbclient0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libndr-krb5pac0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libsamba-credentials0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- samba-client-4.13.13+git.545.5897c2d94f3-3.12.1
- python3-ldb-2.2.2-4.6.1
- ctdb-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- samba-libs-4.13.13+git.545.5897c2d94f3-3.12.1
- samba-client-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libsmbconf0-4.13.13+git.545.5897c2d94f3-3.12.1
- samba-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
- libndr-krb5pac0-4.13.13+git.545.5897c2d94f3-3.12.1
- libsamba-passdb0-debuginfo-4.13.13+git.545.5897c2d94f3-3.12.1
References:
- https://www.suse.com/security/cve/CVE-2016-2124.html
- https://www.suse.com/security/cve/CVE-2020-17049.html
- https://www.suse.com/security/cve/CVE-2020-25717.html
- https://www.suse.com/security/cve/CVE-2020-25718.html
- https://www.suse.com/security/cve/CVE-2020-25719.html
- https://www.suse.com/security/cve/CVE-2020-25721.html
- https://www.suse.com/security/cve/CVE-2020-25722.html
- https://www.suse.com/security/cve/CVE-2021-20254.html
- https://www.suse.com/security/cve/CVE-2021-23192.html
- https://www.suse.com/security/cve/CVE-2021-3738.html
- https://www.suse.com/security/cve/CVE-2021-44142.html
- https://bugzilla.suse.com/show_bug.cgi?id=1014440
- https://bugzilla.suse.com/show_bug.cgi?id=1188727
- https://bugzilla.suse.com/show_bug.cgi?id=1189017
- https://bugzilla.suse.com/show_bug.cgi?id=1189875
- https://bugzilla.suse.com/show_bug.cgi?id=1192214
- https://bugzilla.suse.com/show_bug.cgi?id=1192215
- https://bugzilla.suse.com/show_bug.cgi?id=1192246
- https://bugzilla.suse.com/show_bug.cgi?id=1192247
- https://bugzilla.suse.com/show_bug.cgi?id=1192283
- https://bugzilla.suse.com/show_bug.cgi?id=1192284
- https://bugzilla.suse.com/show_bug.cgi?id=1192505
- https://bugzilla.suse.com/show_bug.cgi?id=1192849
- https://bugzilla.suse.com/show_bug.cgi?id=1194859
- https://jira.suse.com/browse/SLE-18456