CVE-2021-20208
Published: 19 April 2021
A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credentials of the host. The highest threat from this vulnerability is to data confidentiality and integrity.
Notes
Author | Note |
---|---|
mdeslaur | per Red Hat bug, 6.13 was missing two important fixes, and 6.14 is required. per Debian, causes a regression, see: https://bugs.debian.org/989080 https://www.spinics.net/lists/linux-cifs/msg21976.html |
Priority
Status
Package | Release | Status |
---|---|---|
cifs-utils Launchpad, Ubuntu, Debian |
bionic |
Released
(2:6.8-1ubuntu1.2)
|
focal |
Released
(2:6.9-1ubuntu0.2)
|
|
groovy |
Ignored
(end of life)
|
|
hirsute |
Ignored
(end of life)
|
|
impish |
Not vulnerable
(2:6.11-3.1)
|
|
jammy |
Not vulnerable
(2:6.14-1build1)
|
|
kinetic |
Not vulnerable
(2:6.14-1build1)
|
|
lunar |
Not vulnerable
(2:6.14-1build1)
|
|
mantic |
Not vulnerable
(2:6.14-1build1)
|
|
trusty |
Needed
|
|
upstream |
Released
(6.14,2:6.11-3.1)
|
|
xenial |
Needed
|
|
Patches: upstream: https://git.samba.org/cifs-utils.git/?p=cifs-utils.git;a=commit;h=e461afd8cfa6d0781ae0c5c10e89b6ef1ca6da32 upstream: https://git.samba.org/cifs-utils.git/?p=cifs-utils.git;a=commit;h=7f9711dd902a239c499682015d708f73ec884af2 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 |
Attack vector | Local |
Attack complexity | High |
Privileges required | Low |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N |