Search for packages
purl | pkg:alpm/archlinux/samba@4.16.4-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
This package is not known to be affected by vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-7vgs-22mz-aaas | A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover. |
CVE-2022-32744
|
VCID-juxe-59cy-aaaj | A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other's tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tickets to other services. |
CVE-2022-2031
|
VCID-raxb-8b7v-aaaq | A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault. |
CVE-2022-32745
|
VCID-us5m-s1rt-aaad | A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAccountControl. |
CVE-2022-32746
|
VCID-vdnn-s8fy-aaag | A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer). |
CVE-2022-32742
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:45:10.413500+00:00 | Arch Linux Importer | Fixing | VCID-juxe-59cy-aaaj | https://security.archlinux.org/AVG-2782 | 36.0.0 |
2025-03-28T07:45:10.384274+00:00 | Arch Linux Importer | Fixing | VCID-vdnn-s8fy-aaag | https://security.archlinux.org/AVG-2782 | 36.0.0 |
2025-03-28T07:45:10.356794+00:00 | Arch Linux Importer | Fixing | VCID-7vgs-22mz-aaas | https://security.archlinux.org/AVG-2782 | 36.0.0 |
2025-03-28T07:45:10.329225+00:00 | Arch Linux Importer | Fixing | VCID-raxb-8b7v-aaaq | https://security.archlinux.org/AVG-2782 | 36.0.0 |
2025-03-28T07:45:10.310572+00:00 | Arch Linux Importer | Fixing | VCID-us5m-s1rt-aaad | https://security.archlinux.org/AVG-2782 | 36.0.0 |
2024-09-18T02:00:06.782711+00:00 | Arch Linux Importer | Fixing | VCID-juxe-59cy-aaaj | https://security.archlinux.org/AVG-2782 | 34.0.1 |
2024-09-18T02:00:06.765004+00:00 | Arch Linux Importer | Fixing | VCID-vdnn-s8fy-aaag | https://security.archlinux.org/AVG-2782 | 34.0.1 |
2024-09-18T02:00:06.746936+00:00 | Arch Linux Importer | Fixing | VCID-7vgs-22mz-aaas | https://security.archlinux.org/AVG-2782 | 34.0.1 |
2024-09-18T02:00:06.723184+00:00 | Arch Linux Importer | Fixing | VCID-raxb-8b7v-aaaq | https://security.archlinux.org/AVG-2782 | 34.0.1 |
2024-09-18T02:00:06.701911+00:00 | Arch Linux Importer | Fixing | VCID-us5m-s1rt-aaad | https://security.archlinux.org/AVG-2782 | 34.0.1 |
2024-01-03T22:26:21.618690+00:00 | Arch Linux Importer | Fixing | VCID-juxe-59cy-aaaj | https://security.archlinux.org/AVG-2782 | 34.0.0rc1 |
2024-01-03T22:26:21.594630+00:00 | Arch Linux Importer | Fixing | VCID-vdnn-s8fy-aaag | https://security.archlinux.org/AVG-2782 | 34.0.0rc1 |
2024-01-03T22:26:21.572881+00:00 | Arch Linux Importer | Fixing | VCID-7vgs-22mz-aaas | https://security.archlinux.org/AVG-2782 | 34.0.0rc1 |
2024-01-03T22:26:21.549051+00:00 | Arch Linux Importer | Fixing | VCID-raxb-8b7v-aaaq | https://security.archlinux.org/AVG-2782 | 34.0.0rc1 |
2024-01-03T22:26:21.526959+00:00 | Arch Linux Importer | Fixing | VCID-us5m-s1rt-aaad | https://security.archlinux.org/AVG-2782 | 34.0.0rc1 |