{"id":"OESA-2022-1816","summary":"samba security update","details":"Samba is a suite of programs for Linux and Unix to interoperate with Windows.\r\n\r\nSecurity Fix(es): \r\n\nA flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAccountControl.(CVE-2022-32746)\n\nA flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer).(CVE-2022-32742)\n\nA flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users passwords, enabling full domain takeover.(CVE-2022-32744)\n\nAs per samba upstream advisory:All versions of Samba prior to 4.16.x built with Heimdal Kerberos are vulnerable to an Elevation of Privilege attack. If the password of a user expires and need to be changed, a user could get a krbtgt using kpasswd with canonicalization turned on. The KDC should only provide a ticket for kadmin/changepw but returns a krbtgt. So a user could skip the password change and just use the krbtgt to get service tickets and use services in the forest.(CVE-2022-2031)","modified":"2026-03-11T06:22:56.852505Z","published":"2022-08-11T11:04:06Z","upstream":["CVE-2022-2031","CVE-2022-32742","CVE-2022-32744","CVE-2022-32746"],"database_specific":{"severity":"High"},"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1816"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32746"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32742"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32744"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2031"}],"affected":[{"package":{"name":"samba","ecosystem":"openEuler:20.03-LTS-SP1","purl":"pkg:rpm/openEuler/samba&distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.11.12-13.oe1"}]}],"ecosystem_specific":{"aarch64":["samba-libs-4.11.12-13.oe1.aarch64.rpm","libsmbclient-devel-4.11.12-13.oe1.aarch64.rpm","samba-4.11.12-13.oe1.aarch64.rpm","libwbclient-devel-4.11.12-13.oe1.aarch64.rpm","python3-samba-4.11.12-13.oe1.aarch64.rpm","libsmbclient-4.11.12-13.oe1.aarch64.rpm","ctdb-4.11.12-13.oe1.aarch64.rpm","samba-krb5-printing-4.11.12-13.oe1.aarch64.rpm","samba-winbind-clients-4.11.12-13.oe1.aarch64.rpm","samba-dc-provision-4.11.12-13.oe1.aarch64.rpm","samba-test-4.11.12-13.oe1.aarch64.rpm","samba-winbind-modules-4.11.12-13.oe1.aarch64.rpm","samba-help-4.11.12-13.oe1.aarch64.rpm","samba-client-4.11.12-13.oe1.aarch64.rpm","samba-winbind-4.11.12-13.oe1.aarch64.rpm","libwbclient-4.11.12-13.oe1.aarch64.rpm","samba-debugsource-4.11.12-13.oe1.aarch64.rpm","samba-winbind-krb5-locator-4.11.12-13.oe1.aarch64.rpm","python3-samba-test-4.11.12-13.oe1.aarch64.rpm","samba-common-tools-4.11.12-13.oe1.aarch64.rpm","samba-dc-bind-dlz-4.11.12-13.oe1.aarch64.rpm","python3-samba-dc-4.11.12-13.oe1.aarch64.rpm","samba-dc-4.11.12-13.oe1.aarch64.rpm","samba-common-4.11.12-13.oe1.aarch64.rpm","samba-debuginfo-4.11.12-13.oe1.aarch64.rpm","samba-devel-4.11.12-13.oe1.aarch64.rpm","ctdb-tests-4.11.12-13.oe1.aarch64.rpm"],"src":["samba-4.11.12-13.oe1.src.rpm"],"noarch":["samba-pidl-4.11.12-13.oe1.noarch.rpm"],"x86_64":["ctdb-tests-4.11.12-13.oe1.x86_64.rpm","libwbclient-4.11.12-13.oe1.x86_64.rpm","samba-common-tools-4.11.12-13.oe1.x86_64.rpm","samba-dc-provision-4.11.12-13.oe1.x86_64.rpm","samba-debuginfo-4.11.12-13.oe1.x86_64.rpm","samba-client-4.11.12-13.oe1.x86_64.rpm","samba-dc-4.11.12-13.oe1.x86_64.rpm","samba-help-4.11.12-13.oe1.x86_64.rpm","libsmbclient-devel-4.11.12-13.oe1.x86_64.rpm","samba-krb5-printing-4.11.12-13.oe1.x86_64.rpm","samba-winbind-modules-4.11.12-13.oe1.x86_64.rpm","samba-vfs-glusterfs-4.11.12-13.oe1.x86_64.rpm","python3-samba-4.11.12-13.oe1.x86_64.rpm","samba-test-4.11.12-13.oe1.x86_64.rpm","samba-winbind-krb5-locator-4.11.12-13.oe1.x86_64.rpm","samba-debugsource-4.11.12-13.oe1.x86_64.rpm","libsmbclient-4.11.12-13.oe1.x86_64.rpm","samba-common-4.11.12-13.oe1.x86_64.rpm","ctdb-4.11.12-13.oe1.x86_64.rpm","samba-4.11.12-13.oe1.x86_64.rpm","python3-samba-dc-4.11.12-13.oe1.x86_64.rpm","samba-devel-4.11.12-13.oe1.x86_64.rpm","python3-samba-test-4.11.12-13.oe1.x86_64.rpm","samba-libs-4.11.12-13.oe1.x86_64.rpm","samba-winbind-4.11.12-13.oe1.x86_64.rpm","libwbclient-devel-4.11.12-13.oe1.x86_64.rpm","samba-dc-bind-dlz-4.11.12-13.oe1.x86_64.rpm","samba-winbind-clients-4.11.12-13.oe1.x86_64.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2022-1816.json"}}],"schema_version":"1.7.5"}