Mageia 2022-0054: samba security update
Summary
For CVE-2021-20316 and CVE-2021-44141, there is only a workaround and
mitigation:
All versions of Samba prior to 4.15.5 are vulnerable to a malicious
client using a server symlink to determine if a file or directory
exists in an area of the server file system not exported under the
share definition. SMB1 with unix extensions has to be enabled in order
for this attack to succeed.
Clients that have write access to the exported part of the file system
under a share via SMB1 unix extensions or via NFS can create symlinks
that point to arbitrary files or directories on the server filesystem.
Clients can then use SMB1 unix extension information queries to
determine if the target of the symlink exists or not by examining
error codes returned from the smbd server. There is no ability to
access these files or directories, only to determine if they exist or
not.
If SMB1 is turned off and only SMB2 is used, or unix extensions are
not enabled then there is no way to discover if a symlink points...
References
- https://bugs.mageia.org/show_bug.cgi?id=29974
- https://www.samba.org/samba/security/CVE-2021-44141.html
- https://www.samba.org/samba/security/CVE-2021-44142.html
- https://www.samba.org/samba/security/CVE-2022-0336.html
- https://www.samba.org/samba/history/samba-4.14.12.html
- https://ubuntu.com/security/notices/USN-5260-1
- https://www.samba.org/samba/security/CVE-2021-20316.html
- https://lists.suse.com/pipermail/sle-security-updates/2022-February/010164.html
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72ZRNFZ3DE3TJA7HFCVV476YJN6I4B5M/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20316
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336
Resolution
MGASA-2022-0054 - Updated samba packages fix security vulnerability
SRPMS
- 8/core/samba-4.14.12-1.mga8