First published: Wed Apr 14 2021(Updated: )
A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/samba | <4.14.4 | 4.14.4 |
redhat/samba | <4.13.8 | 4.13.8 |
redhat/samba | <4.12.15 | 4.12.15 |
Samba | >=3.6.0<4.12.15 | |
Samba | >=4.13.0<4.13.8 | |
Samba | >=4.14.0<4.14.4 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20254 is a vulnerability found in Samba that allows the smbd file server to read data beyond the end of the array in the case of a negative cache entry.
The severity of CVE-2021-20254 is medium, with a CVSS score of 6.8.
Samba versions 3.6.0 to 4.12.15, 4.13.0 to 4.13.8, and 4.14.0 to 4.14.4 are affected by CVE-2021-20254.
To fix CVE-2021-20254, update Samba to version 4.14.4, 4.13.8, or 4.12.15, depending on the version you are using.
The CWE ID for CVE-2021-20254 is 125.