File _patchinfo of Package patchinfo.29825
<patchinfo incident="29825"> <issue tracker="cve" id="2023-34968"/> <issue tracker="cve" id="2023-3347"/> <issue tracker="cve" id="2020-25720"/> <issue tracker="cve" id="2023-34966"/> <issue tracker="cve" id="2023-34967"/> <issue tracker="cve" id="2022-2127"/> <issue tracker="bnc" id="1213170">VUL-0: EMBARGOED: CVE-2023-3347: samba: SMB2 packet signing not enforced</issue> <issue tracker="bnc" id="1213172">VUL-0: EMBARGOED: CVE-2023-34967: samba: Samba Spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability</issue> <issue tracker="bnc" id="1213174">VUL-0: EMBARGOED: CVE-2022-2127: samba: Out-Of-Bounds read in winbind AUTH_CRAP</issue> <issue tracker="bnc" id="1212375">Some Samba Veto Files Stopped Working after Upgrading to Leap 15.5</issue> <issue tracker="bnc" id="1213173">VUL-0: EMBARGOED: CVE-2023-34966: samba: Samba Spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability</issue> <issue tracker="bnc" id="1213171">VUL-0: EMBARGOED: CVE-2023-34968: samba: Spotlight server-side Share Path Disclosure</issue> <issue tracker="bnc" id="1213386">VUL-0: CVE-2020-25720: samba: create Child permission should not allow full write to all attributes</issue> <issue tracker="bnc" id="1213384">Jul-2023 update of windows 10/11 breaks trust relationship</issue> <packager>npower</packager> <rating>important</rating> <category>security</category> <summary>Security update for samba</summary> <description>This update for samba fixes the following issues: samba was updated to version 4.17.9: - CVE-2022-2127: Fixed issue where lm_resp_len was not checked properly in winbindd_pam_auth_crap_send (bsc#1213174). - CVE-2023-34966: Fixed samba spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability (bsc#1213173). - CVE-2023-34967: Fixed samba spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability (bsc#1213172). - CVE-2023-34968: Fixed spotlight server-side Share Path Disclosure (bsc#1213171). - CVE-2023-3347: Fixed issue where SMB2 packet signing not enforced (bsc#1213170). - CVE-2020-25720: Fixed issue where creating child permission allowed full write to all attributes (bsc#1213386). Bugfixes: - Fixed trust relationship failure (bsc#1213384). - Backported --pidl-developer fixes. - Fixed smbd_scavenger crash when service smbd is stopped. - Fixed issue where vfs_fruit might cause a failing open for delete. - Fixed named crashes on DLZ zone update. - Fixed issue where winbind recurses into itself via rpcd_lsad. - Fixed cli_list looping 100% CPU against pre-lanman2 servers. - Fixed smbclient leaks fds with showacls. - Fixed aes256 smb3 encryption algorithms not allowed in smb3_sid_parse(). - Fixed winbindd getting stuck on NT_STATUS_RPC_SEC_PKG_ERROR. - Fixed smbget memory leak if failed to download files recursively. - Fixed log flood: smbd_calculate_access_mask_fsp: Access denied: message level should be lower. - Fixed floating point exception (FPE) via cli_pull_send at source3/libsmb/clireadwrite.c. - Fixed test_tstream_more_tcp_user_timeout_spin fails intermittently on Rackspace GitLab runners. - Reduce flapping of ridalloc test. - Fixed unreliable large_ldap test. - Fixed filename parser not checking veto files smb.conf parameter. - Fixed mdssvc may crash when initializing. - Fixed broken large directory optimization for non-lcomp path elements - Fixed streams_depot failing to create streams. - Fixed shadow_copy2 and streams_depot issues. - Fixed wbinfo -u fails on ad dc with >1000 users. - Fixed winbindd idmap child contacting the domain controller without a need. - Fixed idmap_autorid may fail to map sids of trusted domains for the first time. - Fixed idmap_hash doesn't use ID_TYPE_BOTH for reverse mappings. - Fixed net ads search -P doesn't work against servers in other domains. - Fixed DS ACEs might be inherited to unrelated object classes. - Fixed temporary smbXsrv_tcon_global.tdb can't be parsed. - Fixed setting veto files = /.*/ breaking listing directories (bsc#1212375). - Fixed dsgetdcname assuming local system uses IPv4. </description> </patchinfo>