vulnerability

Rocky Linux: CVE-2021-23192: samba (RLSA-2021-5082)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Mar 2, 2022
Added
Mar 12, 2024
Modified
Aug 13, 2025

Description

A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

Solutions

rocky-upgrade-ctdbrocky-upgrade-ctdb-debuginforocky-upgrade-libsmbclientrocky-upgrade-libsmbclient-debuginforocky-upgrade-libsmbclient-develrocky-upgrade-libwbclientrocky-upgrade-libwbclient-debuginforocky-upgrade-libwbclient-develrocky-upgrade-python3-sambarocky-upgrade-python3-samba-debuginforocky-upgrade-python3-samba-testrocky-upgrade-sambarocky-upgrade-samba-clientrocky-upgrade-samba-client-debuginforocky-upgrade-samba-client-libsrocky-upgrade-samba-client-libs-debuginforocky-upgrade-samba-common-libsrocky-upgrade-samba-common-libs-debuginforocky-upgrade-samba-common-toolsrocky-upgrade-samba-common-tools-debuginforocky-upgrade-samba-debuginforocky-upgrade-samba-debugsourcerocky-upgrade-samba-develrocky-upgrade-samba-krb5-printingrocky-upgrade-samba-krb5-printing-debuginforocky-upgrade-samba-libsrocky-upgrade-samba-libs-debuginforocky-upgrade-samba-testrocky-upgrade-samba-test-debuginforocky-upgrade-samba-test-libsrocky-upgrade-samba-test-libs-debuginforocky-upgrade-samba-vfs-iouringrocky-upgrade-samba-vfs-iouring-debuginforocky-upgrade-samba-winbindrocky-upgrade-samba-winbind-clientsrocky-upgrade-samba-winbind-clients-debuginforocky-upgrade-samba-winbind-debuginforocky-upgrade-samba-winbind-krb5-locatorrocky-upgrade-samba-winbind-krb5-locator-debuginforocky-upgrade-samba-winbind-modulesrocky-upgrade-samba-winbind-modules-debuginforocky-upgrade-samba-winexerocky-upgrade-samba-winexe-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.