diff options
author | Yi Zhao <yi.zhao@windriver.com> | 2022-08-26 09:19:29 +0800 |
---|---|---|
committer | Armin Kuster <akuster808@gmail.com> | 2022-09-15 08:33:59 -0400 |
commit | b19f3f8c40de3206566cdf092dcd8f329781ef7d (patch) | |
tree | 21f17b57f70606f543311a125c7fb969ac17387a /meta-xfce/recipes-xfce | |
parent | 02f2e6d762b660e12fd64dd1d638d7d43b2d5eb3 (diff) | |
download | meta-openembedded-contrib-b19f3f8c40de3206566cdf092dcd8f329781ef7d.tar.gz |
samba: upgrade 4.14.13 -> 4.14.14
This is a security release in order to address the following defects:
CVE-2022-2031: Samba AD users can bypass certain restrictions associated
with changing passwords.
https://www.samba.org/samba/security/CVE-2022-2031.html
CVE-2022-32744: Samba AD users can forge password change requests for
any user.
https://www.samba.org/samba/security/CVE-2022-32744.html
CVE-2022-32745: Samba AD users can crash the server process with an LDAP
add or modify request.
https://www.samba.org/samba/security/CVE-2022-32745.html
CVE-2022-32746: Samba AD users can induce a use-after-free in the server
process with an LDAP add or modify request.
https://www.samba.org/samba/security/CVE-2022-32746.html
CVE-2022-32742: Server memory information leak via SMB1.
https://www.samba.org/samba/security/CVE-2022-32742.html
Release Notes:
https://www.samba.org/samba/history/samba-4.14.14.html
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit 0afcb4be77acdb7af3624278ebd5869f0e88bdfe)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-xfce/recipes-xfce')
0 files changed, 0 insertions, 0 deletions