summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-grpcio/0001-setup.py-Do-not-mix-C-and-C-compiler-options.patch
diff options
context:
space:
mode:
authorYi Zhao <yi.zhao@windriver.com>2022-08-26 09:19:29 +0800
committerKhem Raj <raj.khem@gmail.com>2022-08-25 23:08:11 -0700
commit0afcb4be77acdb7af3624278ebd5869f0e88bdfe (patch)
treef2f1b00421cd41fbf56c790fea52ba18275e50e9 /meta-python/recipes-devtools/python/python3-grpcio/0001-setup.py-Do-not-mix-C-and-C-compiler-options.patch
parent1cd743f8d8053cc9d34cd1a0204d4d333722e0f5 (diff)
downloadmeta-openembedded-0afcb4be77acdb7af3624278ebd5869f0e88bdfe.tar.gz
samba: upgrade 4.14.13 -> 4.14.14
This is a security release in order to address the following defects: CVE-2022-2031: Samba AD users can bypass certain restrictions associated with changing passwords. https://www.samba.org/samba/security/CVE-2022-2031.html CVE-2022-32744: Samba AD users can forge password change requests for any user. https://www.samba.org/samba/security/CVE-2022-32744.html CVE-2022-32745: Samba AD users can crash the server process with an LDAP add or modify request. https://www.samba.org/samba/security/CVE-2022-32745.html CVE-2022-32746: Samba AD users can induce a use-after-free in the server process with an LDAP add or modify request. https://www.samba.org/samba/security/CVE-2022-32746.html CVE-2022-32742: Server memory information leak via SMB1. https://www.samba.org/samba/security/CVE-2022-32742.html Release Notes: https://www.samba.org/samba/history/samba-4.14.14.html Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-grpcio/0001-setup.py-Do-not-mix-C-and-C-compiler-options.patch')
0 files changed, 0 insertions, 0 deletions