[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2022:4395-1 -- SLES samba, libsamba-policy-devel, libsamba-policy-python3-devel, libsamba-policy0-python3

ID: oval:org.secpod.oval:def:89048025Date: (C)2023-01-04   (M)2024-04-29
Class: PATCHFamily: unix




This update for samba fixes the following issues: Version update to 4.15.12. Security issues fixed: - CVE-2022-2031: Fixed AD users that could have bypassed certain restrictions associated with changing passwords . - CVE-2022-32742: Fixed SMB1 code that does not correctly verify SMB1write, SMB1write_and_close, SMB1write_and_unlock lengths . - CVE-2022-32744: Fixed AD users that could have forged password change requests for any user . - CVE-2022-32745: Fixed AD users that could have crashed the server process with an LDAP add or modify request . - CVE-2022-32746: Fixed a use-after-free occurring in database audit logging . - CVE-2022-3437: Fixed buffer overflow in Heimdal unwrap_des3 . - CVE-2022-42898: Fixed Samba buffer overflow vulnerabilities on 32-bit systems . Bug fixes: - Install a systemd drop-in file for named service to allow read/write access to the DLZ directory . - Possible use after free of connection_struct when iterating smbd_server_connection-greater than connections .

Platform:
SUSE Linux Enterprise Server 15 SP3
SUSE Linux Enterprise Desktop 15 SP3
Product:
samba
libsamba-policy-devel
libsamba-policy-python3-devel
libsamba-policy0-python3
Reference:
SUSE-SU-2022:4395-1
CVE-2022-2031
CVE-2022-32742
CVE-2022-32744
CVE-2022-32745
CVE-2022-32746
CVE-2022-3437
CVE-2022-42898
CVE    7
CVE-2022-32746
CVE-2022-2031
CVE-2022-32744
CVE-2022-32745
...
CPE    6
cpe:/a:samba:samba
cpe:/a:samba:libsamba-policy-devel
cpe:/a:samba:libsamba-policy-python3-devel
cpe:/a:samba:libsamba-policy0-python3
...

© SecPod Technologies