The J Linux distribution



samba 4.21.2 (x64) release history
DateVersionDescriptionSignature
2024-12-04 11:59:094.21.2
new major
IPKm++6e+wLB+YZzoO/AQ+g3uZWTyy7NIkG9nLw48NrdiIt5SM/wFg2QnZo8Xlp7RMNnUv3/TkE5 h7Og1jVvToCf5I9DgcbpjAOYyfh1FzQwuxbwbQqhPWAEF7qX0jk0rNX8SvYsQ+P4fvu5M9w6RMUh uRtikUXYV0msvn5ylwO/1dKPV8V9W/OEDElUo5DqL76UyZdaQia+L1am8ZCbh1G8MQo44BsZWGhg SFqxIICi5Zn56mb0BrAV6CaUvm2YKAKwNrIVsoxHstRJFnM7BShelM8A5e9I5E1ZXkYsrCKebPTO w6R+yt8WuqkHMC2H4D5/O29N89XcDLnWmaNGDA==
2023-10-31 12:28:384.19.2
CVE-2023-3961:  Unsanitized pipe names allow SMB clients to connect as root to
                  existing unix domain sockets on the file system.
                  https://www.samba.org/samba/security/CVE-2023-3961.html
CVE-2023-4091:  SMB client can truncate files to 0 bytes by opening files with
                  OVERWRITE disposition when using the acl_xattr Samba VFS
                  module with the smb.conf setting
                  "acl_xattr:ignore system acls = yes"
                  https://www.samba.org/samba/security/CVE-2023-4091.html
CVE-2023-4154:  An RODC and a user with the GET_CHANGES right can view all
                  attributes, including secrets and passwords.  Additionally,
                  the access check fails open on error conditions.
                  https://www.samba.org/samba/security/CVE-2023-4154.html
CVE-2023-42669: Calls to the rpcecho server on the AD DC can request that the
                  server block for a user-defined amount of time, denying
                  service.
                  https://www.samba.org/samba/security/CVE-2023-42669.html
CVE-2023-42670: Samba can be made to start multiple incompatible RPC
                  listeners, disrupting service on the AD DC.
                  https://www.samba.org/samba/security/CVE-2023-42670.html
NV/0KYw1LEjVTZ03ehmreKtyLzaGiiT/WMi72YB8NXq2q5dNL+nrKi3uueFUOdGXFw0E/CJDEww5 t/CD5Fb3NRiBVEFsG6NZShSL2JkYkfIXRpHfog1S/xBRemgAt48vfX9METmsCSyL8dH51ZBFagOZ tmhmZZy29CHVfq/ktNZ6jn+RCJC6un2AzP28MCypRlDASv8y1jAe0YT/BGZZPHWJrhXe9I1XpVCR DwdGkIRGU2/vfPrYJ88XbjEvWOvXFx5Xmde3hLt4vNCOVniuBOj9UFXr0XazwUC8KfcJ/XPiiA3E LfNvVRw73XWR+uKtyE20p11Sh6nCUrnMEHLk6A==
2023-04-11 09:42:254.18.1
Security fixes
h0Cpd43Q2EU1PaRzwf2Eg2MCmNpfde/LVh/G0+guxXQFahz8aXKTMnoQqHOZ7ThV4ykiTDN6WRXO Rmw8PJeT49utuoYBHbfRQRFqufzpHCt4/G0TCgHU+Z3VRrVs3C5diTHw1t5RJ3CQQwgz6bknQamy z4IB1qoGMBBU8cImei21VVR8QfVVownp6iRLP6inXYZi/vZihdE9dDAYXkl/na34lFy/YGCp0Ejf TXH6SndlRyZDoFQmMkoh0NwZbCu6hSyXbqK/AwQhauuWz9dhpwHLe7vS54lBoqd+dCa6B3G+XDhf Hni3nCfmwn5niFLAcVZKYW8u5znL5ymipPbj1w==
2020-09-24 19:42:584.11.13
security fix
mwIsfrNRn1OYJTiaTInp+GdSG2+jvStjUNq1CgfqelV4f3U4qfw1nvboS0TIGqUQvY3aYexgsoJJ iSNVeoHQTvETdryxcHZK+dc6F4+5YPkFUUKCf+0O19/DvP40rxtDPfStP+x+eUDLVonOHXfhR4ZR tvtntRXQCsk15zUIwct9FG9eHB6VMCY9QgCsUgw+Mg5ZQ/cjCv6FVK6BwNEG6HXMCCJDO2uBgso7 uHJrY25YdxTMgwJK7CaY4LPT5jLf3x8ocRsv96AgWjxXJ9L2lQ7wyhp1pa2i6TDONz+CRLhelp40 gjWLWO5xdQotmoS314LZAz7g9fEVa6vLcCSqFg==
2019-11-20 21:02:484.11.0
new major version
2015-03-30 21:30:383.6.25
Security updates