mirror of
https://github.com/samba-team/samba.git
synced 2025-02-25 17:57:42 +03:00
WHATSNEW: Add release notes for Samba 4.14.14.
Signed-off-by: Jule Anger <janger@samba.org>
This commit is contained in:
parent
7720e0acfd
commit
0e6fc4fb33
74
WHATSNEW.txt
74
WHATSNEW.txt
@ -1,3 +1,74 @@
|
||||
===============================
|
||||
Release Notes for Samba 4.14.14
|
||||
July 27, 2022
|
||||
===============================
|
||||
|
||||
|
||||
This is a security release in order to address the following defects:
|
||||
|
||||
o CVE-2022-2031: Samba AD users can bypass certain restrictions associated with
|
||||
changing passwords.
|
||||
https://www.samba.org/samba/security/CVE-2022-2031.html
|
||||
|
||||
o CVE-2022-32744: Samba AD users can forge password change requests for any user.
|
||||
https://www.samba.org/samba/security/CVE-2022-32744.html
|
||||
|
||||
o CVE-2022-32745: Samba AD users can crash the server process with an LDAP add
|
||||
or modify request.
|
||||
https://www.samba.org/samba/security/CVE-2022-32745.html
|
||||
|
||||
o CVE-2022-32746: Samba AD users can induce a use-after-free in the server
|
||||
process with an LDAP add or modify request.
|
||||
https://www.samba.org/samba/security/CVE-2022-32746.html
|
||||
|
||||
o CVE-2022-32742: Server memory information leak via SMB1.
|
||||
https://www.samba.org/samba/security/CVE-2022-32742.html
|
||||
|
||||
Changes since 4.14.13
|
||||
---------------------
|
||||
|
||||
o Jeremy Allison <jra@samba.org>
|
||||
* BUG 15085: CVE-2022-32742.
|
||||
|
||||
o Andrew Bartlett <abartlet@samba.org>
|
||||
* BUG 15009: CVE-2022-32746.
|
||||
|
||||
o Andreas Schneider <asn@samba.org>
|
||||
* BUG 15047: CVE-2022-2031.
|
||||
|
||||
o Isaac Boukris <iboukris@gmail.com>
|
||||
* BUG 15047: CVE-2022-2031.
|
||||
|
||||
o Joseph Sutton <josephsutton@catalyst.net.nz>
|
||||
* BUG 15008: CVE-2022-32745.
|
||||
* BUG 15009: CVE-2022-32746.
|
||||
* BUG 15047: CVE-2022-2031.
|
||||
* BUG 15074: CVE-2022-32744.
|
||||
|
||||
|
||||
#######################################
|
||||
Reporting bugs & Development Discussion
|
||||
#######################################
|
||||
|
||||
Please discuss this release on the samba-technical mailing list or by
|
||||
joining the #samba-technical:matrix.org matrix room, or
|
||||
#samba-technical IRC channel on irc.libera.chat.
|
||||
|
||||
If you do report problems then please try to send high quality
|
||||
feedback. If you don't provide vital information to help us track down
|
||||
the problem then you will probably be ignored. All bug reports should
|
||||
be filed under the Samba 4.1 and newer product in the project's Bugzilla
|
||||
database (https://bugzilla.samba.org/).
|
||||
|
||||
|
||||
======================================================================
|
||||
== Our Code, Our Bugs, Our Responsibility.
|
||||
== The Samba Team
|
||||
======================================================================
|
||||
|
||||
|
||||
Release notes for older releases follow:
|
||||
----------------------------------------
|
||||
===============================
|
||||
Release Notes for Samba 4.14.13
|
||||
April 04, 2022
|
||||
@ -88,8 +159,7 @@ database (https://bugzilla.samba.org/).
|
||||
======================================================================
|
||||
|
||||
|
||||
Release notes for older releases follow:
|
||||
----------------------------------------
|
||||
----------------------------------------------------------------------
|
||||
===============================
|
||||
Release Notes for Samba 4.14.12
|
||||
January 31, 2022
|
||||
|
Loading…
x
Reference in New Issue
Block a user