6.1 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N
4.9 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:P/A:N
cifs-utils is vulnerable to privilege escalation. The vulnerability exists due to a flaw that allows an attacker to use the Kerberos credentials of the host when mounting a krb5 CIFS file system from within a container.
bugzilla.redhat.com/show_bug.cgi?id=1921116
bugzilla.samba.org/show_bug.cgi?id=14651
lists.fedoraproject.org/archives/list/[email protected]/message/2W4HSDIWXXNQBUW5ZS37RQMLJ7THK5AS/
lists.fedoraproject.org/archives/list/[email protected]/message/66WJ3SVBHCSNQZAWSGLB6FBOCFU45FFG/
lists.fedoraproject.org/archives/list/[email protected]/message/Z4BZSJXROEFHYATAAHHRR6P3HUSMPQB3/
security-tracker.debian.org/tracker/CVE-2021-20208
6.1 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N
4.9 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:P/A:N