A flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of the share.
References
Link | Resource |
---|---|
https://www.samba.org/samba/security/CVE-2021-20316.html | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2009673 | Issue Tracking Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2021-20316 | Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2021-20316 | Mitigation Third Party Advisory |
https://bugzilla.samba.org/show_bug.cgi?id=14842 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2022-08-23 09:15
Updated : 2022-08-26 11:05
NVD link : CVE-2021-20316
Mitre link : CVE-2021-20316
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
redhat
- enterprise_linux_aus
- enterprise_linux
- virtualization_host
- enterprise_linux_tus
- enterprise_linux_eus
samba
- samba
debian
- debian_linux