Name | CVE-2021-44141 |
Description | All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1004692 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
samba (PTS) | bullseye (security), bullseye | 2:4.13.13+dfsg-1~deb11u6 | vulnerable |
| bookworm, bookworm (security) | 2:4.17.12+dfsg-0+deb12u1 | fixed |
| trixie | 2:4.21.2+dfsg-3 | fixed |
| sid | 2:4.21.2+dfsg-4 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
samba | source | experimental | 2:4.16.0+dfsg-1 | | | |
samba | source | (unstable) | 2:4.16.0+dfsg-2 | | | 1004692 |
Notes
[bullseye] - samba <ignored> (Minor issue; no backport to older versions, mitigations exists)
[buster] - samba <ignored> (Minor issue; no backport to older versions, mitigations exists)
https://www.samba.org/samba/security/CVE-2021-44141.html
https://bugzilla.samba.org/show_bug.cgi?id=14911