Security update for samba

Announcement ID: SUSE-SU-2025:21026-1
Release Date: 2025-11-18T22:58:29Z
Rating: critical
References:
Cross-References:
CVSS scores:
  • CVE-2025-10230 ( SUSE ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • CVE-2025-10230 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • CVE-2025-9640 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2025-9640 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Affected Products:
  • SUSE Linux Micro 6.2

An update that solves two vulnerabilities and has four fixes can now be installed.

Description:

This update for samba fixes the following issues:

Update to 4.22.5:

  • CVE-2025-10230: Command injection via WINS server hook script (bsc#1251280).
  • CVE-2025-9640: uninitialized memory disclosure via vfs_streams_xattr (bsc#1251279).

  • Relax samba-gpupdate requirement for cepces, certmonger, and sscep to a recommends. They are only required if utilizing certificate auto enrollment (bsc#1249087).

  • Disable timeouts for smb.service so that possibly slow running ExecStartPre script 'update-samba-security-profile' doesn't cause service start to fail due to timeouts (bsc#1249181).

  • Ensure semanage is pulled in as a requirement when samba in installed when selinux security access mechanism that is used (bsc#1249180).

  • don't attempt to label paths that don't exist, also remove unecessary evaluation of semange & restorecon cmds (bsc#1249179).

Update to 4.22.4:

  • netr_LogonSamLogonEx returns NR_STATUS_ACCESS_DENIED with SysvolReady=0
  • getpwuid does not shift to new DC when current DC is down
  • Windows security hardening locks out schannel'ed netlogon dc calls like netr_DsRGetDCName-
  • Unresponsive second DC can cause idmapping failure when using idmap_ad-
  • kinit command is failing with Missing cache Error.
  • Figuring out the DC name from IP address fails and breaks fork_domain_child().
  • vfs_streams_depot fstatat broken.
  • Delayed leader broadcast can block ctdb forever.
  • Apparently there is a conflict between shadow_copy2 module and virusfilter (action quarantine).
  • Fix handling of empty GPO link.
  • SMB ACL inheritance doesn't work for files created.

  • adjust gpgme build dependency for future-proofing

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Micro 6.2
    zypper in -t patch SUSE-SL-Micro-6.2-22=1

Package List:

  • SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64)
    • samba-client-libs-debuginfo-4.22.5+git.431.dc5a539f124-160000.1.1
    • samba-client-libs-4.22.5+git.431.dc5a539f124-160000.1.1
    • libldb2-debuginfo-4.22.5+git.431.dc5a539f124-160000.1.1
    • samba-debugsource-4.22.5+git.431.dc5a539f124-160000.1.1
    • samba-debuginfo-4.22.5+git.431.dc5a539f124-160000.1.1
    • libldb2-4.22.5+git.431.dc5a539f124-160000.1.1

References: