This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU67270
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-1615
CWE-ID:
CWE-330 - Use of Insufficiently Random Values
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to usage of predictable random values within the GnuTLS gnutls_rnd() function. A remote user can decrypt sensitive information.
Update the affected package samba to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Module for Python2: 15-SP3
SUSE Manager Retail Branch Server: 4.2
SUSE Linux Enterprise Micro: 5.2
SUSE Linux Enterprise High Availability: 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
openSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Basesystem: 15-SP3
samba-doc: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-winbind-libs-32bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-winbind-libs-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-python3-32bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-python3-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-32bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-devel-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-libs-32bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-libs-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-32bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ad-dc-libs-32bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ad-dc-libs-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy0-python3-32bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy0-python3-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-python3-64bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-python3-64bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-64bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-64bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-64bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-64bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy0-python3-64bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy0-python3-64bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ceph-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ceph: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-winbind-libs-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-winbind-libs: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-winbind-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-winbind: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-tool: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-test-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-test: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-python3-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-python3: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-python3-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-python3: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ldb-ldap-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ldb-ldap: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-gpupdate: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-dsdb-modules-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-dsdb-modules: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-devel: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ad-dc-libs-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ad-dc-libs: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ad-dc-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ad-dc: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy0-python3-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy0-python3: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy-python3-devel: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy-devel: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
ctdb-pcp-pmda-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
ctdb-pcp-pmda: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
ctdb-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
ctdb: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-debugsource: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-libs-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-libs: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
http://www.suse.com/support/update/announcement/2022/suse-su-20223955-1/
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU67271
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-32743
CWE-ID:
CWE-276 - Incorrect Default Permissions
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to Samba does not validate the Validated-DNS-Host-Name for the dNSHostName attribute. A remote attacker can set an arbitrary hostname and perform MitM attack.
Update the affected package samba to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Module for Python2: 15-SP3
SUSE Manager Retail Branch Server: 4.2
SUSE Linux Enterprise Micro: 5.2
SUSE Linux Enterprise High Availability: 15-SP3
SUSE Linux Enterprise Desktop: 15-SP3
openSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Basesystem: 15-SP3
samba-doc: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-winbind-libs-32bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-winbind-libs-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-python3-32bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-python3-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-32bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-devel-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-libs-32bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-libs-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-32bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ad-dc-libs-32bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ad-dc-libs-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy0-python3-32bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy0-python3-32bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-python3-64bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-python3-64bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-64bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-64bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-64bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-64bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy0-python3-64bit-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy0-python3-64bit: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ceph-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ceph: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-winbind-libs-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-winbind-libs: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-winbind-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-winbind: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-tool: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-test-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-test: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-python3-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-python3: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-python3-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-python3: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-libs: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ldb-ldap-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ldb-ldap: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-gpupdate: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-dsdb-modules-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-dsdb-modules: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-devel: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ad-dc-libs-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ad-dc-libs: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ad-dc-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-ad-dc: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy0-python3-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy0-python3: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy-python3-devel: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
libsamba-policy-devel: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
ctdb-pcp-pmda-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
ctdb-pcp-pmda: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
ctdb-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
ctdb: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-debugsource: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-libs-debuginfo: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
samba-client-libs: before 4.15.8+git.527.8d0c05d313e-150300.3.40.2
http://www.suse.com/support/update/announcement/2022/suse-su-20223955-1/
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?