vulnerability

Amazon Linux AMI 2: CVE-2021-20254: Security patch for samba (ALAS-2021-1680)

Severity
5
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:N)
Published
May 5, 2021
Added
Jul 2, 2021
Modified
Sep 30, 2022

Description

A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.

Solutions

amazon-linux-ami-2-upgrade-ctdbamazon-linux-ami-2-upgrade-ctdb-testsamazon-linux-ami-2-upgrade-libsmbclientamazon-linux-ami-2-upgrade-libsmbclient-develamazon-linux-ami-2-upgrade-libwbclientamazon-linux-ami-2-upgrade-libwbclient-develamazon-linux-ami-2-upgrade-sambaamazon-linux-ami-2-upgrade-samba-clientamazon-linux-ami-2-upgrade-samba-client-libsamazon-linux-ami-2-upgrade-samba-commonamazon-linux-ami-2-upgrade-samba-common-libsamazon-linux-ami-2-upgrade-samba-common-toolsamazon-linux-ami-2-upgrade-samba-dcamazon-linux-ami-2-upgrade-samba-dc-libsamazon-linux-ami-2-upgrade-samba-debuginfoamazon-linux-ami-2-upgrade-samba-develamazon-linux-ami-2-upgrade-samba-krb5-printingamazon-linux-ami-2-upgrade-samba-libsamazon-linux-ami-2-upgrade-samba-pidlamazon-linux-ami-2-upgrade-samba-pythonamazon-linux-ami-2-upgrade-samba-python-testamazon-linux-ami-2-upgrade-samba-testamazon-linux-ami-2-upgrade-samba-test-libsamazon-linux-ami-2-upgrade-samba-vfs-glusterfsamazon-linux-ami-2-upgrade-samba-winbindamazon-linux-ami-2-upgrade-samba-winbind-clientsamazon-linux-ami-2-upgrade-samba-winbind-krb5-locatoramazon-linux-ami-2-upgrade-samba-winbind-modules
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.