Mageia 2020-0380: samba security update
Summary
When Samba is used as a domain controller, an unauthenticated attacker on the
network can gain administrator access by exploiting a netlogon protocol flaw
(CVE-2020-1472).
Note that Samba installations are not vulnerable unless they have the smb.conf
lines 'server schannel = no' or 'server schannel = auto'.
References
- https://bugs.mageia.org/show_bug.cgi?id=27299
- https://www.samba.org/samba/history/samba-4.10.18.html
- https://www.samba.org/samba/security/CVE-2020-1472.html
- https://ubuntu.com/security/notices/USN-4510-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472
Resolution
MGASA-2020-0380 - Updated samba packages fix security vulnerability
SRPMS
- 7/core/samba-4.10.18-1.mga7