diff options
author | Yi Zhao <yi.zhao@windriver.com> | 2023-10-12 19:56:11 +0800 |
---|---|---|
committer | Khem Raj <raj.khem@gmail.com> | 2023-10-12 08:06:57 -0700 |
commit | f674a9d4f9feb3afecdc81f4bced5469edc3bc71 (patch) | |
tree | 402c8dcaeef5a4fdf856f0e45c6f9840b1733373 /meta-python/recipes-devtools/python/python3-pexpect/0001-FSM.py-change-shebang-from-python-to-python3.patch | |
parent | 8bab5168788de6ba7c17630ddd1f191e19602472 (diff) | |
download | meta-openembedded-f674a9d4f9feb3afecdc81f4bced5469edc3bc71.tar.gz |
samba: upgrade 4.18.6 -> 4.18.8
This is a security release in order to address the following defects:
CVE-2023-3961: Unsanitized pipe names allow SMB clients to connect as root to
existing unix domain sockets on the file system.
https://www.samba.org/samba/security/CVE-2023-3961.html
CVE-2023-4091: SMB client can truncate files to 0 bytes by opening files with
OVERWRITE disposition when using the acl_xattr Samba VFS
module with the smb.conf setting
"acl_xattr:ignore system acls = yes"
https://www.samba.org/samba/security/CVE-2023-4091.html
CVE-2023-4154: An RODC and a user with the GET_CHANGES right can view all
attributes, including secrets and passwords. Additionally,
the access check fails open on error conditions.
https://www.samba.org/samba/security/CVE-2023-4154.html
CVE-2023-42669: Calls to the rpcecho server on the AD DC can request that the
server block for a user-defined amount of time, denying
service.
https://www.samba.org/samba/security/CVE-2023-42669.html
CVE-2023-42670: Samba can be made to start multiple incompatible RPC
listeners, disrupting service on the AD DC.
https://www.samba.org/samba/security/CVE-2023-42670.html
Release Notes:
https://www.samba.org/samba/history/samba-4.18.8.html
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-pexpect/0001-FSM.py-change-shebang-from-python-to-python3.patch')
0 files changed, 0 insertions, 0 deletions