| Date | Version | Description | Signature |
|---|
| 2025-11-07 13:54:07 | 4.23.3 | bugfixes
SMB3 UNIX Extensions enabled by default | a0mms/bGnA22E/yf2G2bpWyJSzpGIAxJMQ9H+AfMFkjlQ+n6ZUIqH2vLCi90ERjRijM8xPWKnRFy
oHTl5yHU80T1KcP4cw8xgLlsg1E/F+UnQsybF/zV+8mm0FvT5k6BqC0IZaYpUuIZXFrrW/9WYx3h
xjmoQjd2kcs+qP1NON2cEjYDlswpXfOfhkweaTzqWzIlKTJtxIP//PXi2/8Ad20+SFvsUYXJjzyT
MtAAe+df2G/heAItTSokhSLuHhk059uLS4mdJhNgxFrJDt0gXx7IvbgJIbpCKi5uJajneL9dbJ5D
Q0aQPZFgWYtb8Ks3T8s/oLQsgg7UrYdVQW+wVQ== |
| 2025-11-07 13:47:21 | 4.23.2 | bugfixes
SMB3 UNIX Extensions enabled by default | A8bI3ojiuBbsT+dYRArRm7tp0KDC+LscO2do/86zp8ZlJQNr5BFo+E4+Ky+JmqyeaMAQoE6kbnhn
MSRo2+RJQ62VtUu3oax9g+L6TZJ05rZrP2+IKU6JSZN1JvcLOXQl5xZ8PESpQ56PhMRcxLQ9xg27
pDmuDRxN/K5N8csBRpevlWhgXQPpk8uR4R59/41FC88uGPsN7Rl8f5YXFdtHoznlOJC1QxY3na70
BsRcvQTYX+DzS34i7HOPM4+vJdKIo1JXp4Cuvuhex4sLkwSDhW9zzvzDSliQ4XtjgqINWe8tx766
BxJKO07WUnXWk7MnPgN6SChVf22SwROWEHQypA== |
| 2024-12-04 11:59:09 | 4.21.2 | new major | IPKm++6e+wLB+YZzoO/AQ+g3uZWTyy7NIkG9nLw48NrdiIt5SM/wFg2QnZo8Xlp7RMNnUv3/TkE5
h7Og1jVvToCf5I9DgcbpjAOYyfh1FzQwuxbwbQqhPWAEF7qX0jk0rNX8SvYsQ+P4fvu5M9w6RMUh
uRtikUXYV0msvn5ylwO/1dKPV8V9W/OEDElUo5DqL76UyZdaQia+L1am8ZCbh1G8MQo44BsZWGhg
SFqxIICi5Zn56mb0BrAV6CaUvm2YKAKwNrIVsoxHstRJFnM7BShelM8A5e9I5E1ZXkYsrCKebPTO
w6R+yt8WuqkHMC2H4D5/O29N89XcDLnWmaNGDA== |
| 2023-10-31 12:28:38 | 4.19.2 | CVE-2023-3961: Unsanitized pipe names allow SMB clients to connect as root to
existing unix domain sockets on the file system.
https://www.samba.org/samba/security/CVE-2023-3961.html
CVE-2023-4091: SMB client can truncate files to 0 bytes by opening files with
OVERWRITE disposition when using the acl_xattr Samba VFS
module with the smb.conf setting
"acl_xattr:ignore system acls = yes"
https://www.samba.org/samba/security/CVE-2023-4091.html
CVE-2023-4154: An RODC and a user with the GET_CHANGES right can view all
attributes, including secrets and passwords. Additionally,
the access check fails open on error conditions.
https://www.samba.org/samba/security/CVE-2023-4154.html
CVE-2023-42669: Calls to the rpcecho server on the AD DC can request that the
server block for a user-defined amount of time, denying
service.
https://www.samba.org/samba/security/CVE-2023-42669.html
CVE-2023-42670: Samba can be made to start multiple incompatible RPC
listeners, disrupting service on the AD DC.
https://www.samba.org/samba/security/CVE-2023-42670.html
| NV/0KYw1LEjVTZ03ehmreKtyLzaGiiT/WMi72YB8NXq2q5dNL+nrKi3uueFUOdGXFw0E/CJDEww5
t/CD5Fb3NRiBVEFsG6NZShSL2JkYkfIXRpHfog1S/xBRemgAt48vfX9METmsCSyL8dH51ZBFagOZ
tmhmZZy29CHVfq/ktNZ6jn+RCJC6un2AzP28MCypRlDASv8y1jAe0YT/BGZZPHWJrhXe9I1XpVCR
DwdGkIRGU2/vfPrYJ88XbjEvWOvXFx5Xmde3hLt4vNCOVniuBOj9UFXr0XazwUC8KfcJ/XPiiA3E
LfNvVRw73XWR+uKtyE20p11Sh6nCUrnMEHLk6A== |
| 2023-04-11 09:42:25 | 4.18.1 | Security fixes | h0Cpd43Q2EU1PaRzwf2Eg2MCmNpfde/LVh/G0+guxXQFahz8aXKTMnoQqHOZ7ThV4ykiTDN6WRXO
Rmw8PJeT49utuoYBHbfRQRFqufzpHCt4/G0TCgHU+Z3VRrVs3C5diTHw1t5RJ3CQQwgz6bknQamy
z4IB1qoGMBBU8cImei21VVR8QfVVownp6iRLP6inXYZi/vZihdE9dDAYXkl/na34lFy/YGCp0Ejf
TXH6SndlRyZDoFQmMkoh0NwZbCu6hSyXbqK/AwQhauuWz9dhpwHLe7vS54lBoqd+dCa6B3G+XDhf
Hni3nCfmwn5niFLAcVZKYW8u5znL5ymipPbj1w== |
| 2020-09-24 19:42:58 | 4.11.13 | security fix | mwIsfrNRn1OYJTiaTInp+GdSG2+jvStjUNq1CgfqelV4f3U4qfw1nvboS0TIGqUQvY3aYexgsoJJ
iSNVeoHQTvETdryxcHZK+dc6F4+5YPkFUUKCf+0O19/DvP40rxtDPfStP+x+eUDLVonOHXfhR4ZR
tvtntRXQCsk15zUIwct9FG9eHB6VMCY9QgCsUgw+Mg5ZQ/cjCv6FVK6BwNEG6HXMCCJDO2uBgso7
uHJrY25YdxTMgwJK7CaY4LPT5jLf3x8ocRsv96AgWjxXJ9L2lQ7wyhp1pa2i6TDONz+CRLhelp40
gjWLWO5xdQotmoS314LZAz7g9fEVa6vLcCSqFg== |
| 2019-11-20 21:02:48 | 4.11.0 | new major version | |
| 2015-03-30 21:30:38 | 3.6.25 | Security updates | |