File _patchinfo of Package patchinfo.29825
<patchinfo incident="29825">
<issue tracker="cve" id="2023-34968"/>
<issue tracker="cve" id="2023-3347"/>
<issue tracker="cve" id="2020-25720"/>
<issue tracker="cve" id="2023-34966"/>
<issue tracker="cve" id="2023-34967"/>
<issue tracker="cve" id="2022-2127"/>
<issue tracker="bnc" id="1213170">VUL-0: EMBARGOED: CVE-2023-3347: samba: SMB2 packet signing not enforced</issue>
<issue tracker="bnc" id="1213172">VUL-0: EMBARGOED: CVE-2023-34967: samba: Samba Spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability</issue>
<issue tracker="bnc" id="1213174">VUL-0: EMBARGOED: CVE-2022-2127: samba: Out-Of-Bounds read in winbind AUTH_CRAP</issue>
<issue tracker="bnc" id="1212375">Some Samba Veto Files Stopped Working after Upgrading to Leap 15.5</issue>
<issue tracker="bnc" id="1213173">VUL-0: EMBARGOED: CVE-2023-34966: samba: Samba Spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability</issue>
<issue tracker="bnc" id="1213171">VUL-0: EMBARGOED: CVE-2023-34968: samba: Spotlight server-side Share Path Disclosure</issue>
<issue tracker="bnc" id="1213386">VUL-0: CVE-2020-25720: samba: create Child permission should not allow full write to all attributes</issue>
<issue tracker="bnc" id="1213384">Jul-2023 update of windows 10/11 breaks trust relationship</issue>
<packager>npower</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for samba</summary>
<description>This update for samba fixes the following issues:
samba was updated to version 4.17.9:
- CVE-2022-2127: Fixed issue where lm_resp_len was not checked properly in winbindd_pam_auth_crap_send (bsc#1213174).
- CVE-2023-34966: Fixed samba spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability (bsc#1213173).
- CVE-2023-34967: Fixed samba spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability (bsc#1213172).
- CVE-2023-34968: Fixed spotlight server-side Share Path Disclosure (bsc#1213171).
- CVE-2023-3347: Fixed issue where SMB2 packet signing not enforced (bsc#1213170).
- CVE-2020-25720: Fixed issue where creating child permission allowed full write to all attributes (bsc#1213386).
Bugfixes:
- Fixed trust relationship failure (bsc#1213384).
- Backported --pidl-developer fixes.
- Fixed smbd_scavenger crash when service smbd is stopped.
- Fixed issue where vfs_fruit might cause a failing open for delete.
- Fixed named crashes on DLZ zone update.
- Fixed issue where winbind recurses into itself via rpcd_lsad.
- Fixed cli_list looping 100% CPU against pre-lanman2 servers.
- Fixed smbclient leaks fds with showacls.
- Fixed aes256 smb3 encryption algorithms not allowed in smb3_sid_parse().
- Fixed winbindd getting stuck on NT_STATUS_RPC_SEC_PKG_ERROR.
- Fixed smbget memory leak if failed to download files recursively.
- Fixed log flood: smbd_calculate_access_mask_fsp: Access denied: message level should be lower.
- Fixed floating point exception (FPE) via cli_pull_send at source3/libsmb/clireadwrite.c.
- Fixed test_tstream_more_tcp_user_timeout_spin fails intermittently on Rackspace GitLab runners.
- Reduce flapping of ridalloc test.
- Fixed unreliable large_ldap test.
- Fixed filename parser not checking veto files smb.conf parameter.
- Fixed mdssvc may crash when initializing.
- Fixed broken large directory optimization for non-lcomp path elements
- Fixed streams_depot failing to create streams.
- Fixed shadow_copy2 and streams_depot issues.
- Fixed wbinfo -u fails on ad dc with >1000 users.
- Fixed winbindd idmap child contacting the domain controller without a need.
- Fixed idmap_autorid may fail to map sids of trusted domains for the first time.
- Fixed idmap_hash doesn't use ID_TYPE_BOTH for reverse mappings.
- Fixed net ads search -P doesn't work against servers in other domains.
- Fixed DS ACEs might be inherited to unrelated object classes.
- Fixed temporary smbXsrv_tcon_global.tdb can't be parsed.
- Fixed setting veto files = /.*/ breaking listing directories (bsc#1212375).
- Fixed dsgetdcname assuming local system uses IPv4.
</description>
</patchinfo>