Security vulnerability: Samba remote code execution in "fruit" vfs module CVE-2021-44142
This document (000020570) is provided subject to the disclaimer at the end of this document.
The fruit module, which is used by Samba for Apple related extended attribute storage, can be exploited by remote attackers with access to the samba server to execute code as the samba server (basically as root).
The fruit vfs module is not configured by default, to determine if it is used, please check for a line starting with "vfs objects=" with "fruit" listed in /etc/samba/smb.conf.
Packages containing a fix for this security issue will be available. Please use
zypper patch --cve=CVE-2021-44142
to apply the fixed packages.
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:000020570
- Creation Date: 31-Jan-2022
- Modified Date:31-Jan-2022
- SUSE Enterprise Storage
- SUSE Linux Enterprise Desktop
- SUSE Linux Enterprise Point of Service
- SUSE Linux Enterprise Real Time
- SUSE Linux Enterprise Server
- SUSE Linux Enterprise Server for SAP Applications
- SUSE Manager Server
- SUSE Linux Enterprise Micro
- SUSE Manager Proxy
- SUSE Linux Enterprise HPC
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com