diff options
author | Yi Zhao <yi.zhao@windriver.com> | 2021-11-16 17:50:53 +0800 |
---|---|---|
committer | Khem Raj <raj.khem@gmail.com> | 2021-11-16 08:26:26 -0800 |
commit | 28e7d47f661d1430f547807cd29d76bf5af4e151 (patch) | |
tree | 772782d8aa088afd930b8d0a9ee35f96ff64be0a /meta-python/recipes-devtools/python/python3-h5py | |
parent | dafc5b8da8cb70a5c9b1f0c31afe19da5e3c34eb (diff) | |
download | meta-openembedded-28e7d47f661d1430f547807cd29d76bf5af4e151.tar.gz |
samba: upgrade 4.14.8 -> 4.14.10
This is a security release in order to address the following defects:
CVE-2016-2124: SMB1 client connections can be downgraded to plaintext
authentication.
https://www.samba.org/samba/security/CVE-2016-2124.html
CVE-2020-25717: A user on the domain can become root on domain members.
https://www.samba.org/samba/security/CVE-2020-25717.html
CVE-2020-25718: Samba AD DC did not correctly sandbox Kerberos tickets
issued by an RODC.
https://www.samba.org/samba/security/CVE-2020-25718.html
CVE-2020-25719: Samba AD DC did not always rely on the SID and PAC in
Kerberos tickets.
https://www.samba.org/samba/security/CVE-2020-25719.html
CVE-2020-25721: Kerberos acceptors need easy access to stable AD
identifiers (eg objectSid).
https://www.samba.org/samba/security/CVE-2020-25721.html
CVE-2020-25722: Samba AD DC did not do suffienct access and conformance
checking of data stored.
https://www.samba.org/samba/security/CVE-2020-25722.html
CVE-2021-3738: Use after free in Samba AD DC RPC server.
https://www.samba.org/samba/security/CVE-2021-3738.html
CVE-2021-23192: Subsequent DCE/RPC fragment injection vulnerability.
https://www.samba.org/samba/security/CVE-2021-23192.html
See: https://www.samba.org/samba/history/samba-4.14.10.html
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-h5py')
0 files changed, 0 insertions, 0 deletions