File _patchinfo of Package patchinfo.29825

<patchinfo incident="29825">
  <issue tracker="cve" id="2023-34968"/>
  <issue tracker="cve" id="2023-3347"/>
  <issue tracker="cve" id="2020-25720"/>
  <issue tracker="cve" id="2023-34966"/>
  <issue tracker="cve" id="2023-34967"/>
  <issue tracker="cve" id="2022-2127"/>
  <issue tracker="bnc" id="1213170">VUL-0: EMBARGOED: CVE-2023-3347: samba: SMB2 packet signing not enforced</issue>
  <issue tracker="bnc" id="1213172">VUL-0: EMBARGOED: CVE-2023-34967: samba: Samba Spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability</issue>
  <issue tracker="bnc" id="1213174">VUL-0: EMBARGOED: CVE-2022-2127: samba: Out-Of-Bounds read in winbind AUTH_CRAP</issue>
  <issue tracker="bnc" id="1212375">Some Samba Veto Files Stopped Working after Upgrading to Leap 15.5</issue>
  <issue tracker="bnc" id="1213173">VUL-0: EMBARGOED: CVE-2023-34966: samba: Samba Spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability</issue>
  <issue tracker="bnc" id="1213171">VUL-0: EMBARGOED: CVE-2023-34968: samba: Spotlight server-side Share Path Disclosure</issue>
  <issue tracker="bnc" id="1213386">VUL-0: CVE-2020-25720: samba: create Child permission should not allow full write to all attributes</issue>
  <issue tracker="bnc" id="1213384">Jul-2023 update of windows 10/11 breaks trust relationship</issue>
  <packager>npower</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for samba</summary>
  <description>This update for samba fixes the following issues:

  samba was updated to version 4.17.9:

  - CVE-2022-2127: Fixed issue where lm_resp_len was not checked properly in winbindd_pam_auth_crap_send (bsc#1213174).
  - CVE-2023-34966: Fixed samba spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability (bsc#1213173).
  - CVE-2023-34967: Fixed samba spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability (bsc#1213172).
  - CVE-2023-34968: Fixed spotlight server-side Share Path Disclosure (bsc#1213171).
  - CVE-2023-3347: Fixed issue where SMB2 packet signing not enforced (bsc#1213170).
  - CVE-2020-25720: Fixed issue where creating child permission allowed full write to all attributes (bsc#1213386).

  Bugfixes:

  - Fixed trust relationship failure (bsc#1213384).
  - Backported --pidl-developer fixes.
  - Fixed smbd_scavenger crash when service smbd is stopped.
  - Fixed issue where vfs_fruit might cause a failing open for delete.
  - Fixed named crashes on DLZ zone update.
  - Fixed issue where winbind recurses into itself via rpcd_lsad.
  - Fixed cli_list looping 100% CPU against pre-lanman2 servers.
  - Fixed smbclient leaks fds with showacls.
  - Fixed aes256 smb3 encryption algorithms not allowed in smb3_sid_parse().
  - Fixed winbindd getting stuck on NT_STATUS_RPC_SEC_PKG_ERROR.
  - Fixed smbget memory leak if failed to download files recursively.
  - Fixed log flood: smbd_calculate_access_mask_fsp: Access denied: message level should be lower.
  - Fixed floating point exception (FPE) via cli_pull_send at source3/libsmb/clireadwrite.c.
  - Fixed test_tstream_more_tcp_user_timeout_spin fails intermittently on Rackspace GitLab runners.
  - Reduce flapping of ridalloc test.
  - Fixed unreliable large_ldap test.
  - Fixed filename parser not checking veto files smb.conf parameter.
  - Fixed mdssvc may crash when initializing.
  - Fixed broken large directory optimization for non-lcomp path elements
  - Fixed streams_depot failing to create streams.
  - Fixed shadow_copy2 and streams_depot issues.
  - Fixed wbinfo -u fails on ad dc with &gt;1000 users.
  - Fixed winbindd idmap child contacting the domain controller without a need.
  - Fixed idmap_autorid may fail to map sids of trusted domains for the first time.
  - Fixed idmap_hash doesn't use ID_TYPE_BOTH for reverse mappings.
  - Fixed net ads search -P doesn't work against servers in other domains.
  - Fixed DS ACEs might be inherited to unrelated object classes.
  - Fixed temporary smbXsrv_tcon_global.tdb can't be parsed.
  - Fixed setting veto files = /.*/ breaking listing directories (bsc#1212375).
  - Fixed dsgetdcname assuming local system uses IPv4.
</description>
</patchinfo>
openSUSE Build Service is sponsored by