summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-h5py
diff options
context:
space:
mode:
authorYi Zhao <yi.zhao@windriver.com>2021-11-16 17:50:53 +0800
committerKhem Raj <raj.khem@gmail.com>2021-11-16 08:26:26 -0800
commit28e7d47f661d1430f547807cd29d76bf5af4e151 (patch)
tree772782d8aa088afd930b8d0a9ee35f96ff64be0a /meta-python/recipes-devtools/python/python3-h5py
parentdafc5b8da8cb70a5c9b1f0c31afe19da5e3c34eb (diff)
downloadmeta-openembedded-28e7d47f661d1430f547807cd29d76bf5af4e151.tar.gz
samba: upgrade 4.14.8 -> 4.14.10
This is a security release in order to address the following defects: CVE-2016-2124: SMB1 client connections can be downgraded to plaintext authentication. https://www.samba.org/samba/security/CVE-2016-2124.html CVE-2020-25717: A user on the domain can become root on domain members. https://www.samba.org/samba/security/CVE-2020-25717.html CVE-2020-25718: Samba AD DC did not correctly sandbox Kerberos tickets issued by an RODC. https://www.samba.org/samba/security/CVE-2020-25718.html CVE-2020-25719: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets. https://www.samba.org/samba/security/CVE-2020-25719.html CVE-2020-25721: Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). https://www.samba.org/samba/security/CVE-2020-25721.html CVE-2020-25722: Samba AD DC did not do suffienct access and conformance checking of data stored. https://www.samba.org/samba/security/CVE-2020-25722.html CVE-2021-3738: Use after free in Samba AD DC RPC server. https://www.samba.org/samba/security/CVE-2021-3738.html CVE-2021-23192: Subsequent DCE/RPC fragment injection vulnerability. https://www.samba.org/samba/security/CVE-2021-23192.html See: https://www.samba.org/samba/history/samba-4.14.10.html Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-h5py')
0 files changed, 0 insertions, 0 deletions