aboutsummaryrefslogtreecommitdiffstats
path: root/meta-networking/recipes-devtools
diff options
context:
space:
mode:
authorYi Zhao <yi.zhao@windriver.com>2022-08-26 09:19:29 +0800
committerArmin Kuster <akuster808@gmail.com>2022-09-15 08:33:59 -0400
commitb19f3f8c40de3206566cdf092dcd8f329781ef7d (patch)
tree21f17b57f70606f543311a125c7fb969ac17387a /meta-networking/recipes-devtools
parent02f2e6d762b660e12fd64dd1d638d7d43b2d5eb3 (diff)
downloadmeta-openembedded-contrib-b19f3f8c40de3206566cdf092dcd8f329781ef7d.tar.gz
samba: upgrade 4.14.13 -> 4.14.14
This is a security release in order to address the following defects: CVE-2022-2031: Samba AD users can bypass certain restrictions associated with changing passwords. https://www.samba.org/samba/security/CVE-2022-2031.html CVE-2022-32744: Samba AD users can forge password change requests for any user. https://www.samba.org/samba/security/CVE-2022-32744.html CVE-2022-32745: Samba AD users can crash the server process with an LDAP add or modify request. https://www.samba.org/samba/security/CVE-2022-32745.html CVE-2022-32746: Samba AD users can induce a use-after-free in the server process with an LDAP add or modify request. https://www.samba.org/samba/security/CVE-2022-32746.html CVE-2022-32742: Server memory information leak via SMB1. https://www.samba.org/samba/security/CVE-2022-32742.html Release Notes: https://www.samba.org/samba/history/samba-4.14.14.html Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit 0afcb4be77acdb7af3624278ebd5869f0e88bdfe) Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-networking/recipes-devtools')
0 files changed, 0 insertions, 0 deletions