#18257 closed enhancement (fixed)
samba-4.18.5
| Reported by: | Bruce Dubbs | Owned by: | Douglas R. Reno |
|---|---|---|---|
| Priority: | elevated | Milestone: | 12.0 |
| Component: | BOOK | Version: | git |
| Severity: | normal | Keywords: | |
| Cc: |
Description
New point version.
Change History (11)
comment:1 by , 3 years ago
| Summary: | samba-4.18,4 → samba-4.18.4 |
|---|
comment:2 by , 3 years ago
comment:3 by , 3 years ago
Is the CPPFLAGS and LDFLAGS still needed? config.log contains:
Checking for libtirpc headers ['/usr/bin/pkg-config', '--cflags', '--libs', 'libtirpc'] out: -I/usr/include/tirpc -ltirpc
So they seem automatically picked.
comment:4 by , 3 years ago
| Owner: | changed from to |
|---|---|
| Status: | new → assigned |
comment:5 by , 3 years ago
A new Samba is coming tomorrow with a variety of security fixes. Let's wait on that update until then.
comment:7 by , 3 years ago
| Priority: | normal → elevated |
|---|
comment:8 by , 3 years ago
==============================
Release Notes for Samba 4.18.5
July 19, 2023
==============================
This is a security release in order to address the following defects:
o CVE-2022-2127: When winbind is used for NTLM authentication, a maliciously
crafted request can trigger an out-of-bounds read in winbind
and possibly crash it.
https://www.samba.org/samba/security/CVE-2022-2127.html
o CVE-2023-3347: SMB2 packet signing is not enforced if an admin configured
"server signing = required" or for SMB2 connections to Domain
Controllers where SMB2 packet signing is mandatory.
https://www.samba.org/samba/security/CVE-2023-3347.html
o CVE-2023-34966: An infinite loop bug in Samba's mdssvc RPC service for
Spotlight can be triggered by an unauthenticated attacker by
issuing a malformed RPC request.
https://www.samba.org/samba/security/CVE-2023-34966.html
o CVE-2023-34967: Missing type validation in Samba's mdssvc RPC service for
Spotlight can be used by an unauthenticated attacker to
trigger a process crash in a shared RPC mdssvc worker process.
https://www.samba.org/samba/security/CVE-2023-34967.html
o CVE-2023-34968: As part of the Spotlight protocol Samba discloses the server-
side absolute path of shares and files and directories in
search results.
https://www.samba.org/samba/security/CVE-2023-34968.html
Changes since 4.18.4
--------------------
o Ralph Boehme <slow@samba.org>
* BUG 15072: CVE-2022-2127.
* BUG 15340: CVE-2023-34966.
* BUG 15341: CVE-2023-34967.
* BUG 15388: CVE-2023-34968.
* BUG 15397: CVE-2023-3347.
o Volker Lendecke <vl@samba.org>
* BUG 15072: CVE-2022-2127.
o Stefan Metzmacher <metze@samba.org>
* BUG 15418: Secure channel faulty since Windows 10/11 update 07/2023.
comment:10 by , 3 years ago
| Resolution: | → fixed |
|---|---|
| Status: | assigned → closed |
Note:
See TracTickets
for help on using tickets.

Changes since 4.18.3
o Douglas Bagnall <douglas.bagnall@…>
o Samuel Cabrero <scabrero@…>
o Björn Jacke <bj@…>
o Volker Lendecke <vl@…>
o Stefan Metzmacher <metze@…>
o Noel Power <noel.power@…>
o Christof Schmitt <cs@…>
o Andreas Schneider <asn@…>
o Jones Syue <jonessyue@…>