#18257 closed enhancement (fixed)
samba-4.18.5
Reported by: | Bruce Dubbs | Owned by: | Douglas R. Reno |
---|---|---|---|
Priority: | elevated | Milestone: | 12.0 |
Component: | BOOK | Version: | git |
Severity: | normal | Keywords: | |
Cc: |
Description ¶
New point version.
Change History (11)
comment:1 by , 21 months ago
Summary: | samba-4.18,4 → samba-4.18.4 |
---|
comment:2 by , 21 months ago
comment:3 by , 21 months ago
Is the CPPFLAGS and LDFLAGS still needed? config.log contains:
Checking for libtirpc headers ['/usr/bin/pkg-config', '--cflags', '--libs', 'libtirpc'] out: -I/usr/include/tirpc -ltirpc
So they seem automatically picked.
comment:4 by , 21 months ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:5 by , 21 months ago
A new Samba is coming tomorrow with a variety of security fixes. Let's wait on that update until then.
comment:7 by , 21 months ago
Priority: | normal → elevated |
---|
comment:8 by , 21 months ago
============================== Release Notes for Samba 4.18.5 July 19, 2023 ============================== This is a security release in order to address the following defects: o CVE-2022-2127: When winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in winbind and possibly crash it. https://www.samba.org/samba/security/CVE-2022-2127.html o CVE-2023-3347: SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. https://www.samba.org/samba/security/CVE-2023-3347.html o CVE-2023-34966: An infinite loop bug in Samba's mdssvc RPC service for Spotlight can be triggered by an unauthenticated attacker by issuing a malformed RPC request. https://www.samba.org/samba/security/CVE-2023-34966.html o CVE-2023-34967: Missing type validation in Samba's mdssvc RPC service for Spotlight can be used by an unauthenticated attacker to trigger a process crash in a shared RPC mdssvc worker process. https://www.samba.org/samba/security/CVE-2023-34967.html o CVE-2023-34968: As part of the Spotlight protocol Samba discloses the server- side absolute path of shares and files and directories in search results. https://www.samba.org/samba/security/CVE-2023-34968.html Changes since 4.18.4 -------------------- o Ralph Boehme <slow@samba.org> * BUG 15072: CVE-2022-2127. * BUG 15340: CVE-2023-34966. * BUG 15341: CVE-2023-34967. * BUG 15388: CVE-2023-34968. * BUG 15397: CVE-2023-3347. o Volker Lendecke <vl@samba.org> * BUG 15072: CVE-2022-2127. o Stefan Metzmacher <metze@samba.org> * BUG 15418: Secure channel faulty since Windows 10/11 update 07/2023.
comment:10 by , 21 months ago
Resolution: | → fixed |
---|---|
Status: | assigned → closed |
Note:
See TracTickets
for help on using tickets.
Changes since 4.18.3
o Douglas Bagnall <douglas.bagnall@…>
o Samuel Cabrero <scabrero@…>
o Björn Jacke <bj@…>
o Volker Lendecke <vl@…>
o Stefan Metzmacher <metze@…>
o Noel Power <noel.power@…>
o Christof Schmitt <cs@…>
o Andreas Schneider <asn@…>
o Jones Syue <jonessyue@…>