Displaying 20 results from an estimated 3000 matches similar to: "[Announce] Samba 4.17.4, 4.16.8 and 4.15.13 Security Releases are available for Download"
2023 Jan 26
1
samba 4.13.17 ubuntu 20.04
We have the same issue with Samba 4.13.17.
For Ubuntu 20.04 with Samba 4.13.17 there seems to be only a workaround to solve the login problem:
Modifying the Local Security Policy -> Local Policies -> Security Options -> Network security:
"Configure encryption types allowed for Kerberos" Check only DES_CBC_CRC, DES_CBC_MD5 and RC4_HMAC_MD5.
?
This worked for us to login again.
?
2023 Jan 26
1
samba 4.13.17 ubuntu 20.04
Hey Andre,?
Sure, we already on the latest Patch Level on Ubuntu with 2:4.13.17~dfsg-0ubuntu1.20.04.4 Installer, but the issue still exist.?
The only way to resolve the issue and to make a login possible again, was the workaround in my previous mail.?
The Windows clients are Windows 10 22H2 with all updates installed.
We also doesn't have any special settings in smb.conf.
If you have any
2023 Feb 16
1
[Announce] Samba 4.16.9 Available for Download
Release Announcements
---------------------
This is the latest stable release of the Samba 4.16 release series.
Changes since 4.16.8
--------------------
o? Jeremy Allison <jra at samba.org>
?? * BUG 14808: smbc_getxattr() return value is incorrect.
?? * BUG 15172: Compound SMB2 FLUSH+CLOSE requests from MacOSX are not
handled
???? correctly.
?? * BUG 15210: synthetic_pathref
2023 Feb 16
1
[Announce] Samba 4.16.9 Available for Download
Release Announcements
---------------------
This is the latest stable release of the Samba 4.16 release series.
Changes since 4.16.8
--------------------
o? Jeremy Allison <jra at samba.org>
?? * BUG 14808: smbc_getxattr() return value is incorrect.
?? * BUG 15172: Compound SMB2 FLUSH+CLOSE requests from MacOSX are not
handled
???? correctly.
?? * BUG 15210: synthetic_pathref
2023 Aug 24
1
NTLMSSP Sign/Seal - using NTLM1
So, curiously, it *appears* the following may have sped up the mount:
-
Manually modified the smb.conf file, where the following changes were
made: Added:
-
client NTLMv2 auth = yes
-
client min protocol = SMB2_02
-
From a Linux client, performed a cifs mount, forcing the following
parameters (ntlmssp,vers=3.0)
Unfortunately, connections from a
2023 Jan 26
0
[Announce] Samba 4.17.5 Available for Download
Release Announcements
---------------------
This is the latest stable release of the Samba 4.17 release series.
Changes since 4.17.4
--------------------
o? Jeremy Allison <jra at samba.org>
?? * BUG 14808: smbc_getxattr() return value is incorrect.
?? * BUG 15172: Compound SMB2 FLUSH+CLOSE requests from MacOSX are not
handled
???? correctly.
?? * BUG 15210: synthetic_pathref
2023 Jan 26
0
[Announce] Samba 4.17.5 Available for Download
Release Announcements
---------------------
This is the latest stable release of the Samba 4.17 release series.
Changes since 4.17.4
--------------------
o? Jeremy Allison <jra at samba.org>
?? * BUG 14808: smbc_getxattr() return value is incorrect.
?? * BUG 15172: Compound SMB2 FLUSH+CLOSE requests from MacOSX are not
handled
???? correctly.
?? * BUG 15210: synthetic_pathref
2023 Mar 21
2
Bug#1033297: xen: CVE-2022-42331 CVE-2022-42332 CVE-2022-42333 CVE-2022-42334
Source: xen
Version: 4.17.0+46-gaaf74a532c-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
Hi,
The following vulnerabilities were published for xen.
CVE-2022-42331[0]:
| x86: speculative vulnerability in 32bit SYSCALL path Due to an
| oversight in the very original Spectre/Meltdown security work
| (XSA-254),
2023 Jul 19
1
[Announce] Samba 4.18.5, 4.17.10., 4.16.11 Security Releases are available for Download
Release Announcements
---------------------
This are security releases in order to address the following defects:
o CVE-2022-2127:? When winbind is used for NTLM authentication, a
maliciously
????????????????? crafted request can trigger an out-of-bounds read in
winbind
????????????????? and possibly crash it.
https://www.samba.org/samba/security/CVE-2022-2127.html
o CVE-2023-3347:? SMB2
2023 Jul 19
1
[Announce] Samba 4.18.5, 4.17.10., 4.16.11 Security Releases are available for Download
Release Announcements
---------------------
This are security releases in order to address the following defects:
o CVE-2022-2127:? When winbind is used for NTLM authentication, a
maliciously
????????????????? crafted request can trigger an out-of-bounds read in
winbind
????????????????? and possibly crash it.
https://www.samba.org/samba/security/CVE-2022-2127.html
o CVE-2023-3347:? SMB2
2022 Jan 31
1
[Announce] Samba 4.15.5, 4.14.12, 4.13.17 Security Releases are available for Download
Release Announcements
---------------------
These are security releases in order to address the following defects:
o CVE-2021-44141: UNIX extensions in SMB1 disclose whether the outside
target
????????????????? of a symlink exists.
https://www.samba.org/samba/security/CVE-2021-44141.html
o CVE-2021-44142: Out-of-Bound Read/Write on Samba vfs_fruit module.
2022 Jan 31
1
[Announce] Samba 4.15.5, 4.14.12, 4.13.17 Security Releases are available for Download
Release Announcements
---------------------
These are security releases in order to address the following defects:
o CVE-2021-44141: UNIX extensions in SMB1 disclose whether the outside
target
????????????????? of a symlink exists.
https://www.samba.org/samba/security/CVE-2021-44141.html
o CVE-2021-44142: Out-of-Bound Read/Write on Samba vfs_fruit module.
2001 May 03
3
Index vectors get overwriten ?!
Hello,
For some analysis of a mesh structure I need to prepare several vectors
of indexes of different length. This is done by the following code
sequence (including diagnostic output):
#--------------------------------------------------
MT_ind <- which(V1.frame[,2] %in% mm[,1])
print("M_ind")
str(M_ind)
Q1_ind <- which(V1.frame[,2] %in% mq1)
print("Q1_ind")
2022 Jul 06
1
CVE-2022-30550: Privilege escalation possible in dovecot when similar master and non-master passdbs are used
Affected product: Dovecot IMAP Server
Internal reference: DOV-5320
Vulnerability type: Improper Access Control (CWE-284)
Vulnerable version: 2.2
Vulnerable component: submission
Report confidence: Confirmed
Solution status: Fixed in main
Researcher credits: Julian Brook (julezman)
Vendor notification: 2022-05-06
CVE reference: CVE-2022-30550
CVSS: 6.8
2022 Jul 06
1
CVE-2022-30550: Privilege escalation possible in dovecot when similar master and non-master passdbs are used
Affected product: Dovecot IMAP Server
Internal reference: DOV-5320
Vulnerability type: Improper Access Control (CWE-284)
Vulnerable version: 2.2
Vulnerable component: submission
Report confidence: Confirmed
Solution status: Fixed in main
Researcher credits: Julian Brook (julezman)
Vendor notification: 2022-05-06
CVE reference: CVE-2022-30550
CVSS: 6.8
2006 Jan 26
0
Samba 3.0.21a and AIX 5.3 - Cannot see server on network
I compiled the 3.0.21a samba software with the
following configure options:
configure --prefix=/opt/samba --exec-prefix=/opt/samba
--with-krb=/usr/krb5 --with-smbwrapper --with-syslog
--with-mandir=/usr/man --with-winbind
Everything compiled fine; however, I am unable to see
the server on the microsoft network.
My smb.conf file looks like the this:
[global]
workgroup = CAREMARKRX
2008 Mar 26
2
pseudo R square and/or C statistic in R logistic regression
Dear all,
I am now doing the logistic regression using R. (glm, family=binomial). Besides the standardize summary statistics generated from R, I am also interested in some more informations concerning the model fitting / prediction etc; Particularly I am interested in "pseudo R squar" and "C statistic". I searched the R- help and could only get very limited information. (Post
2008 Dec 30
7
Please confirm my bugs
These are several bugs with downloads I reported, please confirm them:
http://bugs.winehq.org/show_bug.cgi?id=14113
http://bugs.winehq.org/show_bug.cgi?id=15886
http://bugs.winehq.org/show_bug.cgi?id=13316
http://bugs.winehq.org/show_bug.cgi?id=13316
http://bugs.winehq.org/show_bug.cgi?id=15237
http://bugs.winehq.org/show_bug.cgi?id=16380
http://bugs.winehq.org/show_bug.cgi?id=16122
2013 Jul 16
2
Problem following an R bug fix to integrate()
I have been told by the CRAN administrators that the following code generated
an error on 64-bit Fedora Linux (gcc, clang) and on Solaris machines (sparc,
x86), but runs well on all other systems):
> fn <- function(x, y) ifelse(x^2 + y^2 <= 1, 1 - x^2 - y^2, 0)
> tol <- 1.5e-8
> fy <- function(x) integrate(function(y) fn(x, y), 0, 1,
2009 May 08
2
Configuring SIP Trunk
Hi All,
I have searched the various post and not able to find the solution.
I am using Asterisk 1.4.21.2 for outgoing calls. Earlier i used ZAP trunk and it works fine. Now i need to move to SIP trunk and configured the same.
When i try from softphone i got error as "Call rejected" and in the asterisk i got error as