As per samba upstream advisory: All versions of Samba prior to 4.13.17 are vulnerable to an out-of-bounds heap read write vulnerability that allows remote attackers to execute arbitrary code as root on affected Samba installations that use the VFS module vfs_fruit. The specific flaw exists within the parsing of EA metadata when opening files in smbd. Access as a user that has write access to a file's extended attributes is required to exploit this vulnerability. Note that this could be a guest or unauthenticated user if such users are allowed write access to file extended attributes. The problem in vfs_fruit exists in the default configuration of the fruit VFS module using fruit:metadata=netatalk or fruit:resource=file. If both options are set to different settings than the default values, the system is not affected by the security issue.
Created samba tracking bugs for this issue: Affects: fedora-all [bug 2048570]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:0329 https://access.redhat.com/errata/RHSA-2022:0329
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:0330 https://access.redhat.com/errata/RHSA-2022:0330
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:0332 https://access.redhat.com/errata/RHSA-2022:0332
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:0331 https://access.redhat.com/errata/RHSA-2022:0331
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:0328 https://access.redhat.com/errata/RHSA-2022:0328
Do we have an ETA for the fix in CentOS Stream8 and CentOS Stream9?
This issue has been addressed in the following products: Red Hat Gluster Storage 3.5 for RHEL 7 Via RHSA-2022:0457 https://access.redhat.com/errata/RHSA-2022:0457
This issue has been addressed in the following products: Red Hat Gluster Storage 3.5 for RHEL 8 Via RHSA-2022:0458 https://access.redhat.com/errata/RHSA-2022:0458
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-44142
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Advanced Update Support Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions Red Hat Enterprise Linux 7.7 Telco Extended Update Support Via RHSA-2022:0664 https://access.redhat.com/errata/RHSA-2022:0664
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Advanced Update Support Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions Red Hat Enterprise Linux 7.6 Telco Extended Update Support Via RHSA-2022:0663 https://access.redhat.com/errata/RHSA-2022:0663