Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2021-20208

Published: 19 April 2021

A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credentials of the host. The highest threat from this vulnerability is to data confidentiality and integrity.

Notes

AuthorNote
mdeslaur
per Red Hat bug, 6.13 was missing two important fixes, and
6.14 is required.
per Debian, causes a regression, see:
https://bugs.debian.org/989080
https://www.spinics.net/lists/linux-cifs/msg21976.html

Priority

Low

Cvss 3 Severity Score

6.1

Score breakdown

Status

Package Release Status
cifs-utils
Launchpad, Ubuntu, Debian
bionic
Released (2:6.8-1ubuntu1.2)
focal
Released (2:6.9-1ubuntu0.2)
groovy Ignored
(end of life)
hirsute Ignored
(end of life)
impish Not vulnerable
(2:6.11-3.1)
jammy Not vulnerable
(2:6.14-1build1)
kinetic Not vulnerable
(2:6.14-1build1)
lunar Not vulnerable
(2:6.14-1build1)
mantic Not vulnerable
(2:6.14-1build1)
trusty Needed

upstream
Released (6.14,2:6.11-3.1)
xenial Needed

Patches:
upstream: https://git.samba.org/cifs-utils.git/?p=cifs-utils.git;a=commit;h=e461afd8cfa6d0781ae0c5c10e89b6ef1ca6da32
upstream: https://git.samba.org/cifs-utils.git/?p=cifs-utils.git;a=commit;h=7f9711dd902a239c499682015d708f73ec884af2

Severity score breakdown

Parameter Value
Base score 6.1
Attack vector Local
Attack complexity High
Privileges required Low
User interaction Required
Scope Changed
Confidentiality Low
Integrity impact High
Availability impact None
Vector CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N