Subscribe to this APAR
By subscribing, you receive periodic emails alerting you to the status of the APAR, along with a link to the fix after it becomes available. You can track this item individually or track all items by product.
APAR (Authorized Program Analysis Report)
Abstract
OSP-OTHER UPDATE SAMBA SUPPORT FOR IBM I PASE TO 3.6.25N
Error Description
The Samba project has added bug and security fixes into the
Samba source that need to be included in the IBM i PASE package.
Problem Summary
The Samba project has added bug and security fixes into the
Samba source that need to be included in the IBM i PASE package.
Problem Conclusion
The IBM i PASE package has been refreshed with the Samba 3.6.25
source modifications to address CVE-2021-43566 and
CVE-2021-44141. The behavior of this package has been changed
to disable unix extensions by default in accordance with the
mitigation recommended by the Samba maintainers.
If the same region of the file system is also exported allowing
write access via NFS, NFS clients can create symlinks that allow
SMB1 with unix extensions clients to discover the existence of
the NFS created symlink targets. It is recommend to only export
areas of the file system by either SMB or NFS, not both.
Temporary Fix
Comments
Circumvention
PTFs Available
R730 SI78679 2132
R740 SI78680 2125
Affected Modules
Affected Publications
Summary Information
Status............................ CLOSED PERHIPER............................. Yes
Component......................... 5770SS100
Failing Module.................... RCHMGR
Reported Release.................. R730
Duplicate Of......................
IBM i Support
IBM disclaims all warranties, whether express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. By furnishing this document, IBM grants no licenses to any related patents or copyrights. Copyright © 1996,1997,1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021, 2022 IBM Corporation. Any trademarks and product or brand names referenced in this document are the property of their respective owners. Consult the Terms of use link for trademark information
Document Information
Modified date:
24 May 2022