openSUSE Security Update: Security update for samba ______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:3650-1 Rating: important References: #1014440 #1192214 #1192284 Cross-References: CVE-2016-2124 CVE-2020-25717 CVE-2021-23192
CVSS scores: CVE-2020-25717 (SUSE): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVE-2021-23192 (SUSE): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Affected Products: openSUSE Leap 15.3 ______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for samba fixes the following issues:
- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440). - CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284). - CVE-2021-23192: Fixed dcerpc requests to don't check all fragments against the first auth_state (bsc#1192214).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3650=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libndr0-4.11.14+git.308.666c63d4eea-4.28.1 libndr0-debuginfo-4.11.14+git.308.666c63d4eea-4.28.1
- openSUSE Leap 15.3 (x86_64):
libndr0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 libndr0-32bit-debuginfo-4.11.14+git.308.666c63d4eea-4.28.1
References:
https://www.suse.com/security/cve/CVE-2016-2124.html https://www.suse.com/security/cve/CVE-2020-25717.html https://www.suse.com/security/cve/CVE-2021-23192.html https://bugzilla.suse.com/1014440 https://bugzilla.suse.com/1192214 https://bugzilla.suse.com/1192284
security-announce@lists.opensuse.org