diff options
author | Yi Zhao <yi.zhao@windriver.com> | 2022-08-26 09:19:29 +0800 |
---|---|---|
committer | Khem Raj <raj.khem@gmail.com> | 2022-08-25 23:08:11 -0700 |
commit | 0afcb4be77acdb7af3624278ebd5869f0e88bdfe (patch) | |
tree | f2f1b00421cd41fbf56c790fea52ba18275e50e9 /meta-python/recipes-devtools/python/python3-grpcio/0001-setup.py-Do-not-mix-C-and-C-compiler-options.patch | |
parent | 1cd743f8d8053cc9d34cd1a0204d4d333722e0f5 (diff) | |
download | meta-openembedded-0afcb4be77acdb7af3624278ebd5869f0e88bdfe.tar.gz |
samba: upgrade 4.14.13 -> 4.14.14
This is a security release in order to address the following defects:
CVE-2022-2031: Samba AD users can bypass certain restrictions associated
with changing passwords.
https://www.samba.org/samba/security/CVE-2022-2031.html
CVE-2022-32744: Samba AD users can forge password change requests for
any user.
https://www.samba.org/samba/security/CVE-2022-32744.html
CVE-2022-32745: Samba AD users can crash the server process with an LDAP
add or modify request.
https://www.samba.org/samba/security/CVE-2022-32745.html
CVE-2022-32746: Samba AD users can induce a use-after-free in the server
process with an LDAP add or modify request.
https://www.samba.org/samba/security/CVE-2022-32746.html
CVE-2022-32742: Server memory information leak via SMB1.
https://www.samba.org/samba/security/CVE-2022-32742.html
Release Notes:
https://www.samba.org/samba/history/samba-4.14.14.html
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-grpcio/0001-setup.py-Do-not-mix-C-and-C-compiler-options.patch')
0 files changed, 0 insertions, 0 deletions