As per upstream advisory: An attacker can downgrade a negotiated SMB1 client connection and its capabitilities. Kerberos authentication is only possible with the SMB2/3 protocol or SMB1 using the NT1 dialect and the extended security (spnego) capability. Without mandatory SMB signing the protocol can be downgraded to an older insecure dialect like CORE, COREPLUS/CORE+, LANMAN1 or LANMAN2. Even if SMB signing is required it's still possible to downgrade to the NT1 dialect if extended security (spnego) is not negotiated. The attacker is able to get the plaintext password sent over the wire even if Kerberos authentication was required.
Created samba tracking bugs for this issue: Affects: fedora-all [bug 2021711]
This issue has been addressed in the following products: Red Hat Gluster Storage 3.5 for RHEL 7 Via RHSA-2021:4844 https://access.redhat.com/errata/RHSA-2021:4844
This issue has been addressed in the following products: Red Hat Gluster Storage 3.5 for RHEL 8 Via RHSA-2021:4843 https://access.redhat.com/errata/RHSA-2021:4843
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2016-2124
Upstream advisory: https://www.samba.org/samba/security/CVE-2016-2124.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:5082 https://access.redhat.com/errata/RHSA-2021:5082
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:5192 https://access.redhat.com/errata/RHSA-2021:5192
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:0008 https://access.redhat.com/errata/RHSA-2022:0008
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:0074 https://access.redhat.com/errata/RHSA-2022:0074