"This are security releases in order to address the following defects: o CVE-2022-2031: Samba AD users can bypass certain restrictions associated with changing passwords. https://www.samba.org/samba/security/CVE-2022-2031.html o CVE-2022-32744: Samba AD users can forge password change requests for any user. https://www.samba.org/samba/security/CVE-2022-32744.html o CVE-2022-32745: Samba AD users can crash the server process with an LDAP add or modify request. https://www.samba.org/samba/security/CVE-2022-32745.html o CVE-2022-32746: Samba AD users can induce a use-after-free in the server process with an LDAP add or modify request. https://www.samba.org/samba/security/CVE-2022-32746.html o CVE-2022-32742: Server memory information leak via SMB1. https://www.samba.org/samba/security/CVE-2022-32742.html" Fixes in 4.14.14, 4.15.9, 4.16.4. Please bump.
All 3 releases have been bumped
Thanks! Please stable the relevant branches when ready.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=113dac10d0faa5b579d59cc8f9f17061b9208c6a commit 113dac10d0faa5b579d59cc8f9f17061b9208c6a Author: John Helmert III <ajak@gentoo.org> AuthorDate: 2022-11-18 20:24:11 +0000 Commit: John Helmert III <ajak@gentoo.org> CommitDate: 2022-11-18 20:24:18 +0000 net-fs/samba: drop 4.14.13, 4.14.14 Bug: https://bugs.gentoo.org/861512 Bug: https://bugs.gentoo.org/866225 Bug: https://bugs.gentoo.org/878273 Bug: https://bugs.gentoo.org/880437 Signed-off-by: John Helmert III <ajak@gentoo.org> net-fs/samba/Manifest | 2 - net-fs/samba/samba-4.14.13.ebuild | 342 -------------------------------------- net-fs/samba/samba-4.14.14.ebuild | 333 ------------------------------------- 3 files changed, 677 deletions(-)
4.14 is gone