1 <!--#include virtual="/samba/header.html" -->
2 <title>Samba - Security Updates and Information</title>
3 <!--#include virtual="header_history.html" -->
5 <h2>Samba Security Releases</h2>
7 <p>Security releases for Samba are listed below by their release
8 date. The previously affected versions of Samba are listed alongside
9 the appropriate security concern. For complete information, follow the
10 link to full release notes for each release.</p>
13 <table class="security_table">
14 <th colspan="6">Samba Security Releases</th>
16 <td><em>Date Issued</em></td>
17 <td><em>Download</em></td>
18 <td><em>Known Issue(s)</em></td>
19 <td><em>Affected Releases</em></td>
20 <td><em>CVE ID #</em></td>
21 <td><em>Details</em></td>
26 <td><a href="/samba/ftp/patches/security/samba-4.x.y-CVE-2017-11103.patch">
27 patch for Samba 4.x.y</a><br />
28 <td>Orpheus' Lyre mutual authentication validation bypass.
30 <td>All versions between Samba 4.0.0 and 4.6.6/4.5.12/4.4.15</td>
31 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103">CVE-2017-11103</a>
33 <td><a href="/samba/security/CVE-2017-11103.html">Announcement</a>
39 <td><a href="/samba/ftp/patches/security/samba-4.6.3-4.5.9-4.4.13-CVE-2017-7494.patch">
40 patch for Samba 4.6.3, 4.5.9, 4.4.13</a><br />
41 <td>Remote code execution from a writable share.
43 <td>All versions between Samba 3.5.0 and 4.6.4/4.5.10/4.4.14</td>
44 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494">CVE-2017-7494</a>
46 <td><a href="/samba/security/CVE-2017-7494.html">Announcement</a>
52 <td><a href="/samba/ftp/patches/security/samba-4.6.0-CVE-2017-2619.patch">
53 patch for Samba 4.6.0</a><br />
54 <a href="/samba/ftp/patches/security/samba-4.5.6-CVE-2017-2619.patch">
55 patch for Samba 4.5.6</a><br />
56 <a href="/samba/ftp/patches/security/samba-4.4.11-CVE-2017-2619.patch">
57 patch for Samba 4.4.11</a><br />
58 <td>Symlink race allows access outside share definition.
60 <td>All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12</td>
61 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619">CVE-2017-2619</a>
63 <td><a href="/samba/security/CVE-2017-2619.html">Announcement</a>
69 <td><a href="/samba/ftp/patches/security/samba-4.5.2-security-20016-12-19.patch">
70 patch for Samba 4.5.2</a><br />
71 <a href="/samba/ftp/patches/security/samba-4.4.7-security-20016-12-19.patch">
72 patch for Samba 4.4.7</a><br />
73 <a href="/samba/ftp/patches/security/samba-4.3.12-security-20016-12-19.patch">
74 patch for Samba 4.3.12</a><br />
75 <td>Numerous CVEs. Please see the announcements for details.
77 <td>please refer to the advisories</td>
78 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123">CVE-2016-2123</a>,
79 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125">CVE-2016-2125</a>,
80 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126">CVE-2016-2126</a>
82 <td><a href="/samba/security/CVE-2016-2123.html">Announcement</a>,
83 <a href="/samba/security/CVE-2016-2125.html">Announcement</a>,
84 <a href="/samba/security/CVE-2016-2126.html">Announcement</a>
90 <td><a href="/samba/ftp/patches/security/samba-4.4.4-CVE-2016-2119.patch">
91 patch for Samba 4.4.4</a><br />
92 <a href="/samba/ftp/patches/security/samba-4.3.10-CVE-2016-2119.patch">
93 patch for Samba 4.3.10</a><br />
94 <a href="/samba/ftp/patches/security/samba-4.2.13-CVE-2016-2119.patch">
95 patch for Samba 4.2.13</a><br />
96 <td>Client side SMB2/3 required signing can be downgraded.
98 <td>4.0.0 - 4.4.4</td>
99 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119">CVE-2016-2119</a>
101 <td><a href="/samba/security/CVE-2016-2119.html">Announcement</a>
107 <td><a href="/samba/ftp/patches/security/samba-4.4.0-security-2016-04-12-final.patch">
108 patch for Samba 4.4.0</a><br />
109 <a href="/samba/ftp/patches/security/samba-4.3.6-security-2016-04-12-final.patch">
110 patch for Samba 4.3.6</a><br />
111 <a href="/samba/ftp/patches/security/samba-4.2.9-security-2016-04-12-final.patch">
112 patch for Samba 4.2.9</a><br />
113 <a href="/samba/ftp/patches/security/samba-v4-0-security-2016-04-12-fileserver-only.patch.xz">
114 patch for Samba 4.0.26 (fileserver only! no client! no domain controller!)</a><br />
115 <a href="/samba/ftp/patches/security/samba-v3-6-security-2016-04-12.tar.xz">
116 patch for Samba 3.6.25 (only related CVEs)</a><br />
117 <td>Numerous CVEs. Please see the announcements for details.
119 <td>please refer to the advisories</td>
120 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370">CVE-2015-5370</a>,
121 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110">CVE-2016-2110</a>,
122 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111">CVE-2016-2111</a>,
123 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112">CVE-2016-2112</a>,
124 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113">CVE-2016-2113</a>,
125 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114">CVE-2016-2114</a>,
126 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115">CVE-2016-2115</a>,
127 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118">CVE-2016-2118</a>
129 <td><a href="/samba/security/CVE-2015-5370.html">Announcement</a>
130 <a href="/samba/security/CVE-2016-2110.html">Announcement</a>
131 <a href="/samba/security/CVE-2016-2111.html">Announcement</a>
132 <a href="/samba/security/CVE-2016-2112.html">Announcement</a>
133 <a href="/samba/security/CVE-2016-2113.html">Announcement</a>
134 <a href="/samba/security/CVE-2016-2114.html">Announcement</a>
135 <a href="/samba/security/CVE-2016-2115.html">Announcement</a>
136 <a href="/samba/security/CVE-2016-2118.html">Announcement</a>
142 <td><a href="/samba/ftp/patches/security/samba-4.3.5-security-2016-03-08.patch">
143 patch for Samba 4.3.5</a><br />
144 <a href="/samba/ftp/patches/security/samba-4.2.8-security-2016-03-08.patch">
145 patch for Samba 4.2.8</a><br />
146 <a href="/samba/ftp/patches/security/samba-4.1.22-security-2016-03-08.patch">
147 patch for Samba 4.1.22</a><br />
148 <td>Incorrect ACL get/set allowed on symlink path, Out-of-bounds read in internal DNS server.
150 <td>please refer to the advisories</td>
151 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560">CVE-2015-7560</a>,
152 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771">CVE-2016-0771</a>,
154 <td><a href="/samba/security/CVE-2015-7560.html">Announcement</a>
155 <a href="/samba/security/CVE-2016-0771.html">Announcement</a>
161 <td><a href="/samba/ftp/patches/security/samba-4.3.2-security-2015-12-16.patch">
162 patch for Samba 4.3.2</a><br />
163 <a href="/samba/ftp/patches/security/samba-4.2.6-security-2015-12-16.patch">
164 patch for Samba 4.2.6</a><br />
165 <a href="/samba/ftp/patches/security/samba-4.1.21-security-2015-12-16.patch">
166 patch for Samba 4.1.21</a><br />
167 <a href="/samba/ftp/patches/security/samba-3.6.25-security-2015-12-16.patch">
168 patch for Samba 3.6.25</a><br />
169 <td>Numerous CVEs. Please see the announcements for details.
171 <td>3.0.0 to 4.3.2</td>
172 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223">CVE-2015-3223</a>,
173 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252">CVE-2015-5252</a>,
174 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296">CVE-2015-5296</a>,
175 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299">CVE-2015-5299</a>,
176 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330">CVE-2015-5330</a>,
177 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540">CVE-2015-7540</a>,
178 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467">CVE-2015-8467</a>
180 <td><a href="/samba/security/CVE-2015-3223.html">Announcement</a>
181 <a href="/samba/security/CVE-2015-5252.html">Announcement</a>
182 <a href="/samba/security/CVE-2015-5296.html">Announcement</a>
183 <a href="/samba/security/CVE-2015-5299.html">Announcement</a>
184 <a href="/samba/security/CVE-2015-5330.html">Announcement</a>
185 <a href="/samba/security/CVE-2015-7540.html">Announcement</a>
186 <a href="/samba/security/CVE-2015-8467.html">Announcement</a>
192 <td><a href="/samba/ftp/patches/security/samba-4.1.16-CVE-2015-0240.patch">
193 patch for Samba 4.1.16</a><br />
194 <a href="/samba/ftp/patches/security/samba-4.0.24-CVE-2015-0240.patch">
195 patch for Samba 4.0.24</a><br />
196 <a href="/samba/ftp/patches/security/samba-3.6.24-CVE-2015-0240.patch">
197 patch for Samba 3.6.24</a><br />
198 <a href="/samba/ftp/patches/security/samba-3.5.22-CVE-2015-0240.patch">
199 patch for Samba 3.5.22</a><br />
200 <td>Unexpected code execution in smbd.
202 <td>3.5.0 - 4.2.0rc4</td>
203 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240">CVE-2015-0240</a>
205 <td><a href="/samba/security/CVE-2015-0240.html">Announcement</a>
211 <td><a href="/samba/ftp/patches/security/samba-4.1.15-CVE-2014-8143.patch">
212 patch for Samba 4.1.15</a><br />
213 <a href="/samba/ftp/patches/security/samba-4.0.23-CVE-2014-8143.patch">
214 patch for Samba 4.0.23</a><br />
215 <td>Elevation of privilege to Active Directory Domain Controller.
217 <td>4.0.0 - 4.1.15</td>
218 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143">CVE-2014-8143</a>
220 <td><a href="/samba/security/CVE-2014-8143.html">Announcement</a>
226 <td><a href="/samba/ftp/patches/security/samba-4.1.10-CVE-2014-3560.patch">
227 patch for Samba 4.1.10</a><br />
228 <a href="/samba/ftp/patches/security/samba-4.0.20-CVE-2014-3560.patch">
229 patch for Samba 4.0.20</a><br />
230 <td>Remote code execution in nmbd.
232 <td>4.0.0 - 4.1.10</td>
233 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560">CVE-2014-3560</a>
235 <td><a href="/samba/security/CVE-2014-3560.html">Announcement</a>
241 <td><a href="/samba/ftp/patches/security/samba-4.1.8-CVE-2014-0244-CVE-2014-3493.patch">
242 patch for Samba 4.1.8</a><br />
243 <a href="/samba/ftp/patches/security/samba-4.0.18-CVE-2014-0244-CVE-2014-3493.patch">
244 patch for Samba 4.0.18</a><br />
245 <a href="/samba/ftp/patches/security/samba-3.6.23-CVE-2014-0244-CVE-2014-3493.patch">
246 patch for Samba 3.6.23</a><br />
247 <td>Denial of service - CPU loop, Denial of service - Server crash/memory corruption.
249 <td>please refer to the advisories</td>
250 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244">CVE-2014-0244</a>,
251 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493">CVE-2014-3493</a>
253 <td><a href="/samba/security/CVE-2014-0244.html">Announcement</a>
254 <a href="/samba/security/CVE-2014-3493.html">Announcement</a>
259 <td>03 June 2014</td>
260 <td><a href="/samba/ftp/patches/security/samba-4.0.17-CVE-2014-0178-CVE-2014-0239.patch">
261 patch for Samba 4.0.17</a><br />
262 <a href="/samba/ftp/patches/security/samba-4.1.7-CVE-2014-0178-CVE-2014-0239.patch">
263 patch for Samba 4.1.7</a><br />
264 <a href="/samba/ftp/patches/security/samba-3.6.23-CVE-2014-0178.patch">
265 patch for Samba 3.6.23 (CVE-2014-0178 only)</a><br />
266 <td>Uninitialized memory exposure, Potential DOS in Samba internal DNS server.
268 <td>please refer to the advisories</td>
269 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178">CVE-2014-0178</a>,
270 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239">CVE-2014-0239</a>
272 <td><a href="/samba/security/CVE-2014-0178.html">Announcement</a>
273 <a href="/samba/security/CVE-2014-0239.html">Announcement</a>
279 <td><a href="/samba/ftp/patches/security/samba-4.1.5-CVE-2013-4496-CVE-2013-6442.patch">
280 patch for Samba 4.1.5</a><br />
281 <a href="/samba/ftp/patches/security/samba-4.0.15-CVE-2013-4496-CVE-2013-6442.patch">
282 patch for Samba 4.0.15</a><br />
283 <a href="/samba/ftp/patches/security/samba-3.6.22-CVE-2013-4496.patch">
284 patch for Samba 3.6.22</a><br />
285 <td>Password lockout not enforced for SAMR password changes, smbcacls can remove a file
286 or directory ACL by mistake.
288 <td>please refer to the advisories</td>
289 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496">CVE-2013-4496</a>,
290 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442">CVE-2013-6442</a>
292 <td><a href="/samba/security/CVE-2013-4496.html">Announcement</a>
293 <a href="/samba/security/CVE-2013-6442.html">Announcement</a>
299 <td><a href="/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch">
300 patch for Samba 4.1.2</a><br />
301 <a href="/samba/ftp/patches/security/samba-4.0.12-CVE-2013-4408-CVE-2012-6150.patch">
302 patch for Samba 4.0.12</a><br />
303 <a href="/samba/ftp/patches/security/samba-3.6.21-CVE-2013-4408-CVE-2012-6150.patch">
304 patch for Samba 3.6.21</a><br />
305 <a href="/samba/ftp/patches/security/samba-3.5.22-CVE-2013-4408.patch">
306 patch for Samba 3.5.22</a><br />
307 <a href="/samba/ftp/patches/security/samba-3.4.17-CVE-2013-4408.patch">
308 patch for Samba 3.4.17</a>
309 <td>DCE-RPC fragment length field is incorrectly checked, pam_winbind
310 login without require_membership_of restrictions.</td>
311 <td>please refer to the advisories</td>
312 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408">CVE-2013-4408</a>,
313 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150">CVE-2012-6150</a>
315 <td><a href="/samba/security/CVE-2013-4408.html">Announcement</a>
316 <a href="/samba/security/CVE-2012-6150.html">Announcement</a>
322 <td><a href="/samba/ftp/patches/security/samba-4.1.0-CVE-2013-4475-CVE-2013-4476.patch">
323 patch for Samba 4.1.0</a><br />
324 <a href="/samba/ftp/patches/security/samba-4.0.10-CVE-2013-4475-CVE-2013-4476.patch">
325 patch for Samba 4.0.10</a><br />
326 <a href="/samba/ftp/patches/security/samba-3.6.19-CVE-2013-4475.patch">
327 patch for Samba 3.6.19</a><br />
328 <td>ACLs are not checked on opening an alternate data stream on a file
329 or directory, Private key in key.pem world readable.</td>
330 <td>3.2.0 - 4.1.0, 4.0.0 - 4.0.10, 4.1.0</td>
331 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475">CVE-2013-4475</a>,
332 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476">CVE-2013-4476</a>
334 <td><a href="/samba/security/CVE-2013-4475.html">Announcement</a>
335 <a href="/samba/security/CVE-2013-4476.html">Announcement</a>
341 <td><a href="/samba/ftp/patches/security/samba-4.0.7-CVE-2013-4124.patch">
342 patch for Samba 4.0.7</a><br />
343 <a href="/samba/ftp/patches/security/samba-3.6.16-CVE-2013-4124.patch">
344 patch for Samba 3.6.16</a><br />
345 <a href="/samba/ftp/patches/security/samba-3.5.21-CVE-2013-4124.patch">
346 patch for Samba 3.5.21</a><br />
347 <td>Denial of service - CPU loop and memory allocation.</td>
350 href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124">CVE-2013-4124</a>
352 <td><a href="/samba/security/CVE-2013-4124.html">Announcement</a>
358 <td><a href="/samba/ftp/patches/security/samba-3.6-CVE-2013-0454.patch">
359 patch for Samba 3.6.5</a>
360 <td>A writable configured share might get read only</td>
361 <td>3.6.0 - 3.6.5 (inclusive)</td>
362 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454">CVE-2013-0454</a>
364 <td><a href="/samba/security/CVE-2013-0454.html">Announcement</a>
370 <td><a href="/samba/ftp/patches/security/samba-4.0.3-CVE-2013-1863.patch">
371 patch for Samba 4.0.3</a>
372 <td>World-writeable files may be created in additional shares on a Samba
374 <td>4.0.0rc6-4.0.3</td>
375 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1863">CVE-2013-1863</a>
377 <td><a href="/samba/security/CVE-2013-1863.html">Announcement</a>
383 <td><a href="/samba/ftp/patches/security/samba-4.0.1-CVE-2013-0213-CVE-2013-0214.patch">
384 patch for Samba 4.0.1</a><br />
385 <a href="/samba/ftp/patches/security/samba-3.6.11-CVE-2013-0213-CVE-2013-0214.patch">
386 patch for Samba 3.6.11</a><br />
387 <a href="/samba/ftp/patches/security/samba-3.5.20-CVE-2013-0213-CVE-2013-0214.patch">
388 patch for Samba 3.5.20</a><br />
389 <td>Clickjacking issue and potential XSRF in SWAT.</td>
391 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213">CVE-2013-0213</a>,
392 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214">CVE-2013-0214</a>
394 <td><a href="/samba/security/CVE-2013-0213.html">Announcement</a>
395 <a href="/samba/security/CVE-2013-0214.html">Announcement</a>
401 <td><a href="/samba/ftp/patches/security/samba-4.0.0-CVE-2013-0172.patch">
402 patch for Samba 4.0.0</a>
403 <td>Samba 4.0 as an AD DC may provide authenticated users with write
404 access to LDAP directory objects.</td>
406 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0172">CVE-2013-0172</a></td>
407 <td><a href="/samba/security/CVE-2013-0172.html">Announcement</a></td>
412 <td><a href="/samba/ftp/patches/security/samba-3.4.16-CVE-2012-2111.patch">
413 patch for Samba 3.4.16</a><br />
414 <a href="/samba/ftp/patches/security/samba-3.5.14-CVE-2012-2111.patch">
415 patch for Samba 3.5.14</a><br />
416 <a href="/samba/ftp/patches/security/samba-3.6.4-CVE-2012-2111.patch">
417 patch for Samba 3.6.4</a><br />
418 <td>Incorrect permission checks when granting/removing privileges can
419 compromise file server security.</td>
421 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111">CVE-2012-2111</a></td>
422 <td><a href="/samba/security/CVE-2012-2111.html">Announcement</a></td>
427 <td><a href="/samba/ftp/patches/security/samba-3.0.37-CVE-2012-1182.patch">
428 patch for Samba 3.0.37</a><br />
429 <a href="/samba/ftp/patches/security/samba-3.2.15-CVE-2012-1182.patch">
430 patch for Samba 3.2.15</a><br />
431 <a href="/samba/ftp/patches/security/samba-3.3.16-CVE-2012-1182.patch">
432 patch for Samba 3.3.16</a><br />
433 <a href="/samba/ftp/patches/security/samba-3.4.15-CVE-2012-1182.patch">
434 patch for Samba 3.4.15</a><br />
435 <a href="/samba/ftp/patches/security/samba-3.5.13-CVE-2012-1182.patch">
436 patch for Samba 3.5.13</a><br />
437 <a href="/samba/ftp/patches/security/samba-3.6.3-CVE-2012-1182.patch">
438 patch for Samba 3.6.3</a><br />
439 <td>"root" credential remote code execution</td>
440 <td>all current releases</td>
441 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182">CVE-2012-1182</a></td>
442 <td><a href="/samba/security/CVE-2012-1182.html">Announcement</a></td>
447 <td><a href="/samba/ftp/patches/security/samba-3.0-CVE-2012-0870.patch">
448 patch for Samba 3.0</a><br />
449 <a href="/samba/ftp/patches/security/samba-3.2-CVE-2012-0870.patch">
450 patch for Samba 3.2</a><br />
451 <a href="/samba/ftp/patches/security/samba-3.3-CVE-2012-0870.patch">
452 patch for Samba 3.3</a><br />
453 <td>Remote code execution vulnerability in smbd</td>
455 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870">CVE-2012-0870</a></td>
456 <td><a href="/samba/security/CVE-2012-0870.html">Announcement</a></td>
461 <td><a href="/samba/ftp/patches/security/samba-3.6.2-CVE-2012-0817.patch">
462 patch for Samba 3.6.2</a>
463 <td>Memory leak/Denial of service</td>
465 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0817">CVE-2012-0817</a></td>
466 <td><a href="/samba/security/CVE-2012-0817.html">Announcement</a></td>
471 <td><a href="/samba/ftp/patches/security/samba-3.3.15-CVE-2011-2522.patch">
472 patch for Samba 3.3.15</a><br />
473 <a href="/samba/ftp/patches/security/samba-3.4.13-CVE-2011-2522.patch">
474 patch for Samba 3.4.13</a><br />
475 <a href="/samba/ftp/patches/security/samba-3.5.9-CVE-2011-2522.patch">
476 patch for Samba 3.5.9</a><br />
477 <td>Cross-Site Request Forgery in SWAT</td>
478 <td>all current releases</td>
479 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522">CVE-2011-2522</a></td>
480 <td><a href="/samba/security/CVE-2011-2522.html">Announcement</a></td>
485 <td><a href="/samba/ftp/patches/security/samba-3.3.15-CVE-2011-2694.patch">
486 patch for Samba 3.3.15</a><br />
487 <a href="/samba/ftp/patches/security/samba-3.4.13-CVE-2011-2694.patch">
488 patch for Samba 3.4.13</a><br />
489 <a href="/samba/ftp/patches/security/samba-3.5.9-CVE-2011-2694.patch">
490 patch for Samba 3.5.9</a><br />
491 <td>Cross-Site Scripting vulnerability in SWAT</td>
492 <td>all current releases</td>
493 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694">CVE-2011-2694</a></td>
494 <td><a href="/samba/security/CVE-2011-2694.html">Announcement</a></td>
499 <td><a href="/samba/ftp/patches/security/samba-3.3.14-CVE-2011-0719.patch">
500 patch for Samba 3.3.14</a><br />
501 <a href="/samba/ftp/patches/security/samba-3.4.11-CVE-2011-0719.patch">
502 patch for Samba 3.4.11</a><br />
503 <a href="/samba/ftp/patches/security/samba-3.5.6-CVE-2011-0719.patch">
504 patch for Samba 3.5.6</a><br />
505 <td>Denial of service - memory corruption</td>
506 <td>all current releases</td>
507 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719">CVE-2011-0719</a></td>
508 <td><a href="/samba/security/CVE-2011-0719.html">Announcement</a></td>
513 <td><a href="/samba/ftp/patches/security/samba-3.3.13-CVE-2010-3069.patch">
514 patch for Samba 3.3.13</a><br />
515 <a href="/samba/ftp/patches/security/samba-3.4.8-CVE-2010-3069.patch">
516 patch for Samba 3.4.8</a><br />
517 <a href="/samba/ftp/patches/security/samba-3.5.4-CVE-2010-3069.patch">
518 patch for Samba 3.5.4</a><br />
519 <td>Buffer Overrun Vulnerability</td>
520 <td>all current releases</td>
521 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069">CVE-2010-3069</a></td>
522 <td><a href="/samba/security/CVE-2010-3069.html">Announcement</a></td>
527 <td><a href="/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patch">
528 patch for Samba 3.3.12 and 3.2.15</a><br />
529 <a href="/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patch">
530 patch for Samba 3.0.37</a><br />
531 <td>Memory Corruption Vulnerability</td>
532 <td>3.0.x, 3.2.x, 3.3.0-3.3.12</td>
533 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-CVE-2010-2063">CVE-2010-2063</a></td>
534 <td><a href="/samba/security/CVE-2010-2063.html">Announcement</a></td>
539 <td><a href="/samba/ftp/patches/security/samba-3.5.0-CVE-2010-0728.patch">
540 patch for Samba 3.5.0</a><br />
541 <a href="/samba/ftp/patches/security/samba-3.4.6-CVE-2010-0728.patch">
542 patch for Samba 3.4.6</a><br />
543 <a href="/samba/ftp/patches/security/samba-3.3.11-CVE-2010-0728.patch">
544 patch for Samba 3.3.11</a><br />
545 <td>Permission ignored</td>
546 <td>3.3.11, 3.4.6, 3.5.0</td>
547 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0728">CVE-2010-0728</a></td>
548 <td><a href="/samba/security/CVE-2010-0728.html">Announcement</a></td>
553 <td>not available</td>
554 <td>Change parameter "wide links" to default to "no"</td>
556 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926">CVE-2010-0926</a></td>
557 <td><a href="/samba/security/CVE-2010-0926.html">Announcement</a></td>
562 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2948-1.patch">
563 patch 1 for Samba 3.4.1</a>
564 <a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2948-2.patch">
565 patch 2 for Samba 3.4.1</a>
566 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2948-1.patch">
567 patch 1 for Samba 3.3.7</a>
568 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2948-2.patch">
569 patch 2 for Samba 3.3.7</a>
570 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2948-1.patch">
571 patch 1 for Samba 3.2.14</a>
572 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2948-2.patch">
573 patch 2 for Samba 3.2.14</a>
574 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2948-1.patch">
575 patch 1 for Samba 3.0.36</a>
576 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2948-2.patch">
577 patch 2 for Samba 3.0.36</a>
578 <td>Information disclosure by setuid mount.cifs</td>
579 <td>all releases</td>
580 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906">CVE-2009-2948</a></td>
581 <td><a href="/samba/security/CVE-2009-2948.html">Announcement</a></td>
586 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2906.patch">
587 patch for Samba 3.4.1</a><br />
588 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2906.patch">
589 patch for Samba 3.3.7</a><br />
590 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2906.patch">
591 patch for Samba 3.2.14</a><br />
592 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2906.patch">
593 patch for Samba 3.0.36</a><br />
594 <td>Remote DoS against smbd on authenticated connections</td>
595 <td>all releases</td>
596 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906">CVE-2009-2906</a></td>
597 <td><a href="/samba/security/CVE-2009-2906.html">Announcement</a></td>
603 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2813.patch">
604 patch for Samba 3.4.1</a><br />
605 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2813.patch">
606 patch for Samba 3.3.7</a><br />
607 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2813.patch">
608 patch for Samba 3.2.14</a><br />
609 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2813.patch">
610 patch for Samba 3.0.36</a><br />
611 <td>Misconfigured /etc/passwd file may share folders unexpectedly</td>
613 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813">CVE-2009-2813</a></td>
614 <td><a href="/samba/security/CVE-2009-2813.html">Announcement</a></td>
620 <td><a href="/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patch">
621 patch for Samba 3.3.5</a><br />
622 <a href="/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patch">
623 patch for Samba 3.2.12</a><br />
624 <a href="/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patch">
625 patch for Samba 3.0.34</a><br />
626 <td>Uninitialized read of a data value</td>
627 <td>Samba 3.0.31 - 3.3.5</td>
628 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888">CVE-2009-1888</a></td>
629 <td><a href="/samba/security/CVE-2009-1888.html">Announcement</a></td>
635 <td><a href="/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1886.patch">
636 patch for Samba 3.2.12</a>
637 <td>Formatstring vulnerability in smbclient</td>
638 <td>Samba 3.2.0 - 3.2.12</td>
639 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886">CVE-2009-1886</a></td>
640 <td><a href="/samba/security/CVE-2009-1886.html">Announcement</a></td>
646 <td><a href="/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch">
647 patch for Samba 3.2.6</a>
648 <td>Potential access to "/" in setups with registry shares enabled</td>
649 <td>Samba 3.2.0 - 3.2.6</td>
650 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0022">CVE-2009-0022</a></td>
651 <td><a href="/samba/security/CVE-2009-0022.html">Announcement</a></td>
655 <td><a href="/samba/ftp/patches/security/samba-3.0.32-CVE-2008-4314.patch">
656 patch for Samba 3.0.32</a>
657 <a href="/samba/ftp/patches/security/samba-3.2.4-CVE-2008-4314.patch">
658 patch for Samba 3.2.4</a></td>
659 <td>Potential leak of arbitrary memory contents</td>
660 <td>Samba 3.0.29 - 3.2.4</td>
661 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314">CVE-2008-4314</a></td>
662 <td><a href="/samba/security/CVE-2008-4314.html">Announcement</a></td>
667 <td><a href="/samba/ftp/patches/security/samba-3.2.2-CVE-2008-3789-1.patch">
668 patch 1 for Samba 3.2.2</a>
669 <a href="/samba/ftp/patches/security/samba-3.2.2-CVE-2008-3789-2.patch">
670 patch 2 for Samba 3.2.2</a></td>
671 <td>Wrong permissions of group_mapping.ldb</td>
672 <td>Samba 3.2.0 - 3.2.2</td>
673 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3789">CVE-2008-3789</a></td>
674 <td><a href="/samba/security/CVE-2008-3789.html">Announcement</a></td>
679 <td><a href="/samba/ftp/patches/security/samba-3.0.29-CVE-2008-1105.patch">patch for Samba 3.0.29</a></td>
680 <td>Boundary failure when parsing SMB responses</td>
681 <td>Samba 3.0.0 - 3.0.29</td>
682 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105">CVE-2008-1105</a></td>
683 <td><a href="/samba/security/CVE-2008-1105.html">Announcement</a></td>
688 <td><a href="/samba/ftp/patches/security/samba-3.0.27a-CVE-2007-6015.patch">patch for Samba 3.0.27a</a></td>
689 <td>Remote Code Execution in Samba's nmbd (send_mailslot())</td>
690 <td>Samba 3.0.0 - 3.0.27a</td>
691 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015">CVE-2007-6015</a></td>
692 <td><a href="/samba/security/CVE-2007-6015.html">Announcement</a></td>
697 <td><a href="/samba/ftp/patches/security/samba-3.0.26a-CVE-2007-5398.patch">patch for Samba 3.0.26a</a></td>
698 <td>Remote Code Execution in Samba's nmbd</td>
699 <td>Samba 3.0.0 - 3.0.26a</td>
700 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398">CVE-2007-5398</a></td>
701 <td><a href="/samba/security/CVE-2007-5398.html">Announcement</a></td>
706 <td><a href="/samba/ftp/patches/security/samba-3.0.26a-CVE-2007-4572.patch">patch for Samba 3.0.26a</a></td>
707 <td>GETDC mailslot processing buffer overrun in nmbd</td>
708 <td>Samba 3.0.0 - 3.0.26a</td>
709 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572">CVE-2007-4572</a></td>
710 <td><a href="/samba/security/CVE-2007-4572.html">Announcement</a></td>
715 <td><a href="/samba/ftp/patches/security/samba-3.0.25-CVE-2007-4138.patch">patch for Samba 3.0.25</a></td>
716 <td>Incorrect primary group assignment for users using the rfc2307 or sfu nss info plugin.</td>
717 <td>Samba 3.0.25 - 3.0.25c</td>
718 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4138">CVE-2007-4138</a></td>
719 <td><a href="/samba/security/CVE-2007-4138.html">Announcement</a></td>
724 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2447_v2.patch">patch for Samba 3.0.24</a></td>
725 <td>Remote Command Injection Vulnerability (Updated June 5 to include missing "c" character from INCLUDE list).</td>
726 <td>Samba 3.0.0 - 3.0.25rc3</td>
727 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447">CVE-2007-2447</a></td>
728 <td><a href="/samba/security/CVE-2007-2447.html">Announcement</a></td>
733 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2446_v2.patch">patch for Samba 3.0.24</a></td>
734 <td>Multiple Heap Overflows Allow Remote Code Execution (Updated May 25 to fix regression in Samba domain controller logon code).</td>
735 <td>Samba 3.0.0 - 3.0.25rc3</td>
736 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446">CVE-2007-2446</a></td>
737 <td><a href="/samba/security/CVE-2007-2446.html">Announcement</a></td>
742 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2444_v2.patch">patch for Samba 3.0.24</a></td>
743 <td>Local SID/Name translation bug can result in user privilege elevation (Updated May 25 to fix regression in the "force group" parameter).</td>
744 <td>Samba 3.0.23d - 3.0.25pre2</td>
745 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444">CVE-2007-2444</a></td>
746 <td><a href="/samba/security/CVE-2007-2444.html">Announcement</a></td>
751 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0452.patch">patch for Samba 3.0.23d</a></td>
752 <td>Potential Denial of Service bug in smbd</td>
753 <td>Samba 3.0.6 - 3.0.23d</td>
754 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452">CVE-2007-0452</a></td>
755 <td><a href="/samba/security/CVE-2007-0452.html">Announcement</a></td>
760 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0453.patch">patch for Samba 3.0.23d</a></td>
761 <td>Buffer overrun in NSS host lookup Winbind library on Solaris</td>
762 <td>Samba 3.0.21 - 3.0.23d</td>
763 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453">CVE-2007-0453</a></td>
764 <td><a href="/samba/security/CVE-2007-0453.html">Announcement</a></td>
769 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0454.patch">patch for Samba 3.0.23d</a></td>
770 <td>Format string bug in afsacl.so VFS plugin</td>
771 <td>Samba 3.0.6 - 3.0.23d</td>
772 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454">CVE-2007-0454</a></td>
773 <td><a href="/samba/security/CVE-2007-0454.html">Announcement</a></td>
777 <td>10 July 2006</td>
778 <td><a href="/samba/ftp/patches/security/samba-3.0-CVE-2006-3403.patch">patch for Samba 3.0.1 - 3.0.22</a></td>
779 <td>Memory exhaustion DoS against smbd</td>
780 <td>Samba 3.0.1 - 3.0.22</td>
781 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403">CVE-2006-3403</a></td>
782 <td><a href="/samba/security/CVE-2006-3403.html">Announcement</a></td>
787 <td>30 March 2006</td>
788 <td><a href="/samba/ftp/patches/security/samba-3.0.21-CVE-2006-1059.patch">patch for Samba 3.0.21[a-c]</a></td>
789 <td>Exposure of machine account credentials in winbind log files</td>
790 <td>Samba 3.0.21 - 3.0.21c</td>
791 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1059">CVE-2006-1059</a></td>
792 <td><a href="/samba/security/CVE-2006-1059.html">Announcement</a></td>
796 <td>16 December 2004</td>
797 <td><a href="/samba/ftp/patches/security/samba-3.0.9-CVE-2004-1154.patch">patch for Samba 3.0.9</a></td>
798 <td>Integer Overflow in security descriptor parsing</td>
799 <td>Samba 2.x, 3.0.x <= 3.0.9</td>
800 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1154">CVE-2004-1154</a></td>
801 <td><a href="/samba/security/CVE-2004-1154.html">Announcement</a></td>
806 <td>15 November 2004</td>
807 <td><a href="/samba/ftp/patches/security/samba-3.0.7-CVE-2004-0882.patch">patch for <=Samba 3.0.7</a></td>
808 <td>Buffer Overrun in smbd</td>
809 <td>Samba 3.0.x <= 3.0.7</td>
810 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0882">CVE-2004-0882</a></td>
811 <td><a href="/samba/security/CVE-2004-0882.html">Announcement</a></td>
815 <td>8 November 2004</td>
816 <td><a href="/samba/ftp/patches/security/samba-3.0.7-CVE-2004-0930.patch">patch for <=Samba 3.0.7</a></td>
818 <td>Samba 3.0.x <= 3.0.7</td>
819 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0930">CVE-2004-0930</a></td>
820 <td><a href="/samba/security/CVE-2004-0930.html">Announcement</a></td>
824 <td>30 September 2004</td>
825 <td><a href="/samba/ftp/stable/samba-2.2.12.tar.gz">Samba 2.2.12</a> and/or <a href="/samba/ftp/patches/security/samba-3.0.2a-reduce_name.patch">patch for <=Samba 3.0.2a</a></td>
826 <td>Potential arbitrary file access</td>
827 <td>Samba 2.2.x <=2.2.11 and Samba 3.0.x <=3.0.2a</td>
828 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0815">CVE-2004-0815</a></td>
829 <td><a href="/samba/security/CVE-2004-0815.html">Announcement</a></td>
834 <td>13 Sept 2004</td>
835 <td><a href="/samba/ftp/patches/security/samba-3.0.5-DoS.patch">3.0.5 patch</a></td>
836 <td>Two DoS bugs; one affecting smbd, the other nmbd.</td>
837 <td>3.0.x <= 3.0.6</td>
838 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0807">CVE-2004-0807</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0808">CVE-2004-0808</a></td>
839 <td><a href="/samba/security/CVE-2004-0807_CVE-2004-0808.html">Announcement</a></td>
844 <td><a href="/samba/ftp/stable/samba-3.0.5.tar.gz">3.0.5</a></td>
845 <td>Two potential buffer overruns</td>
847 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0600">CVE-2004-0600</a>,
848 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686">CVE-2004-0686</a>
850 <td><a href="/samba/security/CVE-2004-0600.html">CVE-2004-0600 Announcement</a>
851 <a href="/samba/security/CVE-2004-0686.html">CVE-2004-0686 Announcement</a></td>
856 <td><a href="/samba/ftp/stable/samba-2.2.10.tar.gz">2.2.10</a></td>
857 <td>Buffer overrun in hash mangling method</td>
858 <td>all 2.2 releases</td>
859 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686">CVE-2004-0686</a>
861 <td><a href="/samba/history/samba-2.2.10.html">release notes</a></td>
866 <td><a href="/samba/ftp/old-versions/samba-3.0.2a.tar.gz">3.0.2a</a></td>
867 <td align="left">Password initialization bug that could grant
868 an attacker unauthorized
869 access to a user account created by the mksmbpasswd.sh shell script.</td>
872 href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0082">CVE-2004-0082</a></td>
873 <td><a href="/samba/security/CVE-2004-0082.html">Announcement</a></td>
878 <td><a href="/samba/ftp/old-versions/samba-2.2.8a.tar.gz">2.2.8a</a></td>
879 <td>Buffer overrun condition in the SMB/CIFS packet fragment
880 re-assembly code.</td>
881 <td>all 2.0 releases and <= 2.2.8</td>
882 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0196">CVE-2003-0196</a>,
883 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0201">CVE-2003-0201</a></td>
884 <td><a href="/samba/history/samba-2.2.8a.html">release notes</a></td>
889 <td><a href="/samba/ftp/old-versions/samba-2.2.7a.tar.gz">2.2.7a</a></td>
890 <td>Bug in the length checking for encrypted password change
891 requests from clients.</td>
892 <td>2.2.2 - 2.2.6</td>
893 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0085">CVE-2003-0085</a></td>
894 <td><a href="/samba/history/samba-2.2.7a.html">release notes</a></td>
899 <td><a href="/samba/ftp/old-versions/samba-2.2.0a.tar.gz">2.2.0a</a></td>
900 <td>Bug in expansion of certain smb.conf variables such as
901 %m that could grant an attacker the capability to overwrite arbitrary
902 files on the server. Bug that causes smbd not to honor the hosts allow
903 and deny smb.conf directives.</td>
906 <td><a href="/samba/history/samba-2.2.0a.html">release notes</a></td>
911 <td><a href="/samba/ftp/old-versions/samba-2.0.10.tar.gz">2.0.10</a></td>
912 <td>Bug in the handling of temporary files that allows local
913 users to destroy data on local devices.</td>
916 <td><a href="/samba/history/samba-2.0.10.html">release notes</a></td>
921 <p><em>If you suspect you have discovered a serious security hole in a
922 Samba release, please send an email to <a
923 href="mailto:security@samba.org">security@samba.org</a>.</em></p>
925 <!--#include virtual="footer_history.html" -->