A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credentials of the host. The highest threat from this vulnerability is to data confidentiality and integrity.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cifs-utils | Samba | 4.0 (including) | 6.13 (excluding) |
Cifs-utils | Ubuntu | bionic | * |
Cifs-utils | Ubuntu | esm-infra-legacy/trusty | * |
Cifs-utils | Ubuntu | esm-infra/xenial | * |
Cifs-utils | Ubuntu | focal | * |
Cifs-utils | Ubuntu | groovy | * |
Cifs-utils | Ubuntu | hirsute | * |
Cifs-utils | Ubuntu | precise/esm | * |
Cifs-utils | Ubuntu | trusty | * |
Cifs-utils | Ubuntu | trusty/esm | * |
Cifs-utils | Ubuntu | upstream | * |
Cifs-utils | Ubuntu | xenial | * |