From mboxrd@z Thu Jan 1 00:00:00 1970 From: Michael Tremer To: ipfire-scm@lists.ipfire.org Subject: [git.ipfire.org] IPFire 2.x development tree branch, next, updated. 05fb9ba088b37ac5d87bc6b2aed2b66e5be90d2c Date: Wed, 26 Jul 2023 13:16:57 +0000 Message-ID: <4R9vZ15nh7z2xb8@people01.haj.ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============5904936880208600303==" List-Id: --===============5904936880208600303== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "IPFire 2.x development tree". The branch, next has been updated via 05fb9ba088b37ac5d87bc6b2aed2b66e5be90d2c (commit) from 4742a8032fcdd9d892b899dbe7ed42ada67644ca (commit) Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below. - Log ----------------------------------------------------------------- commit 05fb9ba088b37ac5d87bc6b2aed2b66e5be90d2c Author: Adolf Belka Date: Tue Jul 25 16:37:17 2023 +0200 samba: Update to version 4.18.5 =20 - Update from version 4.18.4 to 4.18.5 - Update of rootfile not required - Changelog 4.18.5 This is a security release in order to address the following defect= s: o CVE-2022-2127: When winbind is used for NTLM authentication, a malici= ously crafted request can trigger an out-of-bounds read in w= inbind and possibly crash it. https://www.samba.org/samba/security/CVE-2022-2127.html o CVE-2023-3347: SMB2 packet signing is not enforced if an admin config= ured "server signing =3D required" or for SMB2 connections = to Domain Controllers where SMB2 packet signing is mandatory. https://www.samba.org/samba/security/CVE-2023-3347.html o CVE-2023-34966: An infinite loop bug in Samba's mdssvc RPC service for Spotlight can be triggered by an unauthenticated attac= ker by issuing a malformed RPC request. https://www.samba.org/samba/security/CVE-2023-34966.ht= ml o CVE-2023-34967: Missing type validation in Samba's mdssvc RPC service = for Spotlight can be used by an unauthenticated attacker to trigger a process crash in a shared RPC mdssvc worker = process. https://www.samba.org/samba/security/CVE-2023-34967.ht= ml o CVE-2023-34968: As part of the Spotlight protocol Samba discloses the = server- side absolute path of shares and files and directories= in search results. https://www.samba.org/samba/security/CVE-2023-34968.ht= ml o Ralph Boehme * BUG 15072: CVE-2022-2127. * BUG 15340: CVE-2023-34966. * BUG 15341: CVE-2023-34967. * BUG 15388: CVE-2023-34968. * BUG 15397: CVE-2023-3347. o Volker Lendecke * BUG 15072: CVE-2022-2127. o Stefan Metzmacher * BUG 15418: Secure channel faulty since Windows 10/11 update 07/2023. =20 Signed-off-by: Adolf Belka Signed-off-by: Michael Tremer ----------------------------------------------------------------------- Summary of changes: lfs/samba | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) Difference in files: diff --git a/lfs/samba b/lfs/samba index 9e104f64a..99f211a3c 100644 --- a/lfs/samba +++ b/lfs/samba @@ -24,7 +24,7 @@ =20 include Config =20 -VER =3D 4.18.4 +VER =3D 4.18.5 SUMMARY =3D A SMB/CIFS File, Print, and Authentication Server =20 THISAPP =3D samba-$(VER) @@ -33,7 +33,7 @@ DL_FROM =3D $(URL_IPFIRE) DIR_APP =3D $(DIR_SRC)/$(THISAPP) TARGET =3D $(DIR_INFO)/$(THISAPP) PROG =3D samba -PAK_VER =3D 94 +PAK_VER =3D 95 =20 DEPS =3D avahi cups perl-Parse-Yapp perl-JSON =20 @@ -47,7 +47,7 @@ objects =3D $(DL_FILE) =20 $(DL_FILE) =3D $(DL_FROM)/$(DL_FILE) =20 -$(DL_FILE)_BLAKE2 =3D 1f1aab7eb933111b9b1c72af8c3dd379fe34014085129e9d5cc400= b4e434742e1c08ad4fdf2a98291d6063ce9b2ddc811e9ab5dbb133a85e97f2158f83dd7c96 +$(DL_FILE)_BLAKE2 =3D 24c625372c6e4f7f4393777991221f7a7ad25513717436491ea323= 8c8d588e738eb1a64791606f691b3608362b3f3741f390f08975b2b0578c497984a4d44392 =20 install : $(TARGET) =20 hooks/post-receive -- IPFire 2.x development tree --===============5904936880208600303==--