Описание
Security update for samba and ldb
This update for samba and ldb fixes the following issues:
- CVE-2020-25718: Fixed that an RODC can issue (forge) administrator tickets to other servers (bsc#1192246).
- CVE-2021-3738: Fixed crash in dsdb stack (bsc#1192215).
- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
- CVE-2020-25719: Fixed AD DC Username based races when no PAC is given (bsc#1192247).
- CVE-2020-25722: Fixed AD DC UPN vs samAccountName not checked (top-level bug for AD DC validation issues) (bsc#1192283).
- CVE-2021-23192: Fixed dcerpc requests to don't check all fragments against the first auth_state (bsc#1192214).
- CVE-2020-25721: Fixed fill in the new HAS_SAM_NAME_AND_SID values (bsc#1192505).
Samba was updated to 4.13.13
- rodc_rwdc test flaps;(bso#14868).
- Backport bronze bit fixes, tests, and selftest improvements; (bso#14881).
- Provide a fix for MS CVE-2020-17049 in Samba [SECURITY] 'Bronze bit' S4U2Proxy Constrained Delegation bypass in Samba with embedded Heimdal;(bso#14642).
- Python ldb.msg_diff() memory handling failure;(bso#14836).
- 'in' operator on ldb.Message is case sensitive;(bso#14845).
- Fix Samba support for UF_NO_AUTH_DATA_REQUIRED;(bso#14871).
- Allow special chars like '@' in samAccountName when generating the salt;(bso#14874).
- Fix transit path validation;(bso#12998).
- Prepare to operate with MIT krb5 >= 1.20;(bso#14870).
- rpcclient NetFileEnum and net rpc file both cause lock order violation: brlock.tdb, share_entries.tdb;(bso#14645).
- Python ldb.msg_diff() memory handling failure;(bso#14836).
- Release LDB 2.3.1 for Samba 4.14.9;(bso#14848).
Samba was updated to 4.13.12:
- Address a signifcant performance regression in database access in the AD DC since Samba 4.12;(bso#14806).
- Fix performance regression in lsa_LookupSids3/LookupNames4 since Samba 4.9 by using an explicit database handle cache; (bso#14807).
- An unuthenticated user can crash the AD DC KDC by omitting the server name in a TGS-REQ;(bso#14817).
- Address flapping samba_tool_drs_showrepl test;(bso#14818).
- Address flapping dsdb_schema_attributes test;(bso#14819).
- An unuthenticated user can crash the AD DC KDC by omitting the server name in a TGS-REQ;(bso#14817).
- Fix CTDB flag/status update race conditions(bso#14784).
Samba was updated to 4.13.11:
- smbd: panic on force-close share during offload write; (bso#14769).
- Fix returned attributes on fake quota file handle and avoid hitting the VFS;(bso#14731).
- smbd: 'deadtime' parameter doesn't work anymore;(bso#14783).
- net conf list crashes when run as normal user;(bso#14787).
- Work around special SMB2 READ response behavior of NetApp Ontap 7.3.7;(bso#14607).
- Start the SMB encryption as soon as possible;(bso#14793).
- Winbind should not start if the socket path for the privileged pipe is too long;(bso#14792).
ldb was updated to 2.2.2:
- CVE-2020-25718: samba: An RODC can issue (forge) administrator tickets to other servers; (bsc#1192246); (bso#14558)
- CVE-2021-3738: samba: crash in dsdb stack; (bsc#1192215);(bso#14848)
Release ldb 2.2.2
- Corrected python behaviour for 'in' for LDAP attributes contained as part of ldb.Message;(bso#14845).
- Fix memory handling in ldb.msg_diff Corrected python docstrings;(bso#14836)
- Backport bronze bit fixes, tests, and selftest improvements; (bso#14881).
Список пакетов
Image SLES15-SP3-BYOS-Azure
Image SLES15-SP3-BYOS-EC2-HVM
Image SLES15-SP3-BYOS-GCE
Image SLES15-SP3-CHOST-BYOS-Aliyun
Image SLES15-SP3-CHOST-BYOS-Azure
Image SLES15-SP3-CHOST-BYOS-EC2
Image SLES15-SP3-CHOST-BYOS-GCE
Image SLES15-SP3-CHOST-BYOS-SAP-CCloud
Image SLES15-SP3-EC2-ECS-HVM
Image SLES15-SP3-EC2-HVM
Image SLES15-SP3-GCE
Image SLES15-SP3-HPC-Azure
Image SLES15-SP3-HPC-BYOS-Azure
Image SLES15-SP3-HPC-BYOS-EC2-HVM
Image SLES15-SP3-HPC-BYOS-GCE
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM
Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE
Image SLES15-SP3-SAP-Azure
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP3-SAP-BYOS-Azure
Image SLES15-SP3-SAP-BYOS-EC2-HVM
Image SLES15-SP3-SAP-BYOS-GCE
Image SLES15-SP3-SAP-EC2-HVM
Image SLES15-SP3-SAP-GCE
Image SLES15-SP3-SAPCAL-Azure
Image SLES15-SP3-SAPCAL-EC2-HVM
Image SLES15-SP3-SAPCAL-GCE
SUSE Linux Enterprise High Availability Extension 15 SP3
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Module for Basesystem 15 SP3
SUSE Linux Enterprise Module for Python 2 15 SP3
Ссылки
- Link for SUSE-SU-2021:3647-1
- E-Mail link for SUSE-SU-2021:3647-1
- SUSE Security Ratings
- SUSE Bug 1014440
- SUSE Bug 1192214
- SUSE Bug 1192215
- SUSE Bug 1192246
- SUSE Bug 1192247
- SUSE Bug 1192283
- SUSE Bug 1192284
- SUSE Bug 1192505
- SUSE CVE CVE-2016-2124 page
- SUSE CVE CVE-2020-25717 page
- SUSE CVE CVE-2020-25718 page
- SUSE CVE CVE-2020-25719 page
- SUSE CVE CVE-2020-25721 page
- SUSE CVE CVE-2020-25722 page
- SUSE CVE CVE-2021-23192 page
- SUSE CVE CVE-2021-3738 page
Описание
A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
Затронутые продукты
Ссылки
- CVE-2016-2124
- SUSE Bug 1014440
Описание
A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.
Затронутые продукты
Ссылки
- CVE-2020-25717
- SUSE Bug 1192284
- SUSE Bug 1192505
- SUSE Bug 1192601
- SUSE Bug 1192849
- SUSE Bug 1193011
- SUSE Bug 1194049
- SUSE Bug 1194307
- SUSE Bug 1195815
- SUSE Bug 1196344
- SUSE Bug 1196717
- SUSE Bug 1196920
- SUSE Bug 1205061
Описание
A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets.
Затронутые продукты
Ссылки
- CVE-2020-25718
- SUSE Bug 1192246
Описание
A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found within. The result could include total domain compromise.
Затронутые продукты
Ссылки
- CVE-2020-25719
- SUSE Bug 1192247
Описание
Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). Samba as an AD DC now provides a way for Linux applications to obtain a reliable SID (and samAccountName) in issued tickets.
Затронутые продукты
Ссылки
- CVE-2020-25721
- SUSE Bug 1192505
- SUSE Bug 1195833
Описание
Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise.
Затронутые продукты
Ссылки
- CVE-2020-25722
- SUSE Bug 1192283
Описание
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
Затронутые продукты
Ссылки
- CVE-2021-23192
- SUSE Bug 1192214
Описание
In DCE/RPC it is possible to share the handles (cookies for resource state) between multiple connections via a mechanism called 'association groups'. These handles can reference connections to our sam.ldb database. However while the database was correctly shared, the user credentials state was only pointed at, and when one connection within that association group ended, the database would be left pointing at an invalid 'struct session_info'. The most likely outcome here is a crash, but it is possible that the use-after-free could instead allow different user state to be pointed at and this might allow more privileged access.
Затронутые продукты
Ссылки
- CVE-2021-3738
- SUSE Bug 1192215