DSA-5205-1 samba -- security update

Related Vulnerabilities: CVE-2022-2031   CVE-2022-32742   CVE-2022-32744   CVE-2022-32745   CVE-2022-32746  

Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix. CVE-2022-2031 Luke Howard reported that Samba AD users can bypass certain restrictions associated with changing passwords. A user who has been requested to change their password can exploit this to obtain and use tickets to other services. CVE-2022-32742 Luca Moro reported that a SMB1 client with write access to a share can cause server memory content to be leaked. CVE-2022-32744 Joseph Sutton reported that Samba AD users can forge password change requests for any user, resulting in privilege escalation. CVE-2022-32745 Joseph Sutton reported that Samba AD users can crash the server process with a specially crafted LDAP add or modify request. CVE-2022-32746 Joseph Sutton and Andrew Bartlett reported that Samba AD users can cause a use-after-free in the server process with a specially crafted LDAP add or modify request. For the stable distribution (bullseye), these problems have been fixed in version 2:4.13.13+dfsg-1~deb11u5. The fix for CVE-2022-32745 required an update to ldb 2:2.2.3-2~deb11u2 to correct the defect. We recommend that you upgrade your samba packages. For the detailed security status of samba please refer to its security tracker page at: https://security-tracker.debian.org/tracker/samba

Debian Security Advisory

DSA-5205-1 samba -- security update

Date Reported:
11 Aug 2022
Affected Packages:
samba
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 1016449.
In Mitre's CVE dictionary: CVE-2022-2031, CVE-2022-32742, CVE-2022-32744, CVE-2022-32745, CVE-2022-32746.
More information:

Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix.

  • CVE-2022-2031

    Luke Howard reported that Samba AD users can bypass certain restrictions associated with changing passwords. A user who has been requested to change their password can exploit this to obtain and use tickets to other services.

  • CVE-2022-32742

    Luca Moro reported that a SMB1 client with write access to a share can cause server memory content to be leaked.

  • CVE-2022-32744

    Joseph Sutton reported that Samba AD users can forge password change requests for any user, resulting in privilege escalation.

  • CVE-2022-32745

    Joseph Sutton reported that Samba AD users can crash the server process with a specially crafted LDAP add or modify request.

  • CVE-2022-32746

    Joseph Sutton and Andrew Bartlett reported that Samba AD users can cause a use-after-free in the server process with a specially crafted LDAP add or modify request.

For the stable distribution (bullseye), these problems have been fixed in version 2:4.13.13+dfsg-1~deb11u5. The fix for CVE-2022-32745 required an update to ldb 2:2.2.3-2~deb11u2 to correct the defect.

We recommend that you upgrade your samba packages.

For the detailed security status of samba please refer to its security tracker page at: https://security-tracker.debian.org/tracker/samba