A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.
References
Link | Resource |
---|---|
https://security.netapp.com/advisory/ntap-20210430-0001/ | Third Party Advisory |
https://www.samba.org/samba/security/CVE-2021-20254.html | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1949442 | Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EP2VJ73OVBPVSOSTVOMGIEQA3MWF6F7/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZAF6L2M6CNAJ2YYYGXPWETTW5YLCWTVT/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202105-22 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2021-05-05 07:15
Updated : 2021-06-24 11:30
NVD link : CVE-2021-20254
Mitre link : CVE-2021-20254
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
redhat
- enterprise_linux
debian
- debian_linux
fedoraproject
- fedora
samba
- samba