MGASA-2022-0299

Source
https://advisories.mageia.org/MGASA-2022-0299.html
Import Source
https://advisories.mageia.org/MGASA-2022-0299.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0299
Related
Published
2022-08-25T21:21:07Z
Modified
2022-08-25T20:15:19Z
Summary
Updated ldb/samba/sssd packages fix security vulnerability
Details

Fixed AD restrictions bypass associated with changing passwords (bsc#1201495). (CVE-2022-2031) Fixed a memory leak in SMB1 (bsc#1201496). (CVE-2022-32742) Fixed an arbitrary password change request for any AD user (bsc#1201493). (CVE-2022-32744) Fixed a remote server crash with an LDAP add or modify request (bsc#1201492) (CVE-2022-32745) Fixed a use-after-free occurring in database audit logging (bsc#1201490). (CVE-2022-32746)

References
Credits

Affected packages

Mageia:8 / ldb

Package

Name
ldb
Purl
pkg:rpm/mageia/ldb?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.4-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / samba

Package

Name
samba
Purl
pkg:rpm/mageia/samba?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.14.14-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / sssd

Package

Name
sssd
Purl
pkg:rpm/mageia/sssd?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.0-1.4.mga8

Ecosystem specific

{
    "section": "core"
}