Lucene search

K
suseSuseOPENSUSE-SU-2020:1526-1
HistorySep 25, 2020 - 12:00 a.m.

Security update for samba (important)

2020-09-2500:00:00
lists.opensuse.org
80

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

An update that fixes one vulnerability is now available.

Description:

This update for samba fixes the following issues:

  • ZeroLogon: An elevation of privilege was possible with some non default
    configurations when an attacker established a vulnerable Netlogon secure
    channel connection to a domain controller, using the Netlogon Remote
    Protocol (MS-NRPC) (CVE-2020-1472, bsc#1176579).

  • Update to samba 4.11.13

    • s3: libsmb: Fix SMB2 client rename bug to a Windows server;
      (bso#14403);
    • dsdb: Allow “password hash userPassword schemes = CryptSHA256” to work
      on RHEL7; (bso#14424);
    • dbcheck: Allow a dangling forward link outside our known NCs;
      (bso#14450);
    • lib/debug: Set the correct default backend loglevel to
      MAX_DEBUG_LEVEL; (bso#14426);
    • s3:smbd: PANIC: assert failed in get_lease_type(); (bso#14428);
    • lib/util: do not install “test_util_paths”; (bso#14370);
    • lib:util: Fix smbclient -l basename dir; (bso#14345);
    • s3:smbd: PANIC: assert failed in get_lease_type(); (bso#14428);
    • util: Allow symlinks in directory_create_or_exist; (bso#14166);
    • docs: Fix documentation for require_membership_of of pam_winbind;
      (bso#14358);
    • s3:winbind:idmap_ad: Make failure to get attrnames for schema mode
      fatal; (bso#14425);

This update was imported from the SUSE:SLE-15-SP2:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.2:

    zypper in -t patch openSUSE-2020-1526=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.2i586< - openSUSE Leap 15.2 (i586 x86_64):- openSUSE Leap 15.2 (i586 x86_64):.i586.rpm
openSUSE Leap15.2x86_64< - openSUSE Leap 15.2 (i586 x86_64):- openSUSE Leap 15.2 (i586 x86_64):.x86_64.rpm
openSUSE Leap15.2noarch< - openSUSE Leap 15.2 (noarch):- openSUSE Leap 15.2 (noarch):.noarch.rpm
openSUSE Leap15.2x86_64< - openSUSE Leap 15.2 (x86_64):- openSUSE Leap 15.2 (x86_64):.x86_64.rpm

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C