samba is vulnerable to privilege escalation. The vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka ‘Netlogon Elevation of Privilege Vulnerability’.
lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html
lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html
packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html
www.openwall.com/lists/oss-security/2020/09/17/2
lists.debian.org/debian-lts-announce/2020/11/msg00041.html
lists.fedoraproject.org/archives/list/[email protected]/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/
lists.fedoraproject.org/archives/list/[email protected]/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/
lists.fedoraproject.org/archives/list/[email protected]/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
security.gentoo.org/glsa/202012-24
usn.ubuntu.com/4510-1/
usn.ubuntu.com/4510-2/
usn.ubuntu.com/4559-1/
www.kb.cert.org/vuls/id/490028
www.oracle.com/security-alerts/cpuApr2021.html
www.synology.com/security/advisory/Synology_SA_20_21