Adolf Belka 05fb9ba088 samba: Update to version 4.18.5
- Update from version 4.18.4 to 4.18.5
- Update of rootfile not required
- Changelog
    4.18.5
      This is a security release in order to address the following defects:
	o CVE-2022-2127:  When winbind is used for NTLM authentication, a maliciously
	                  crafted request can trigger an out-of-bounds read in winbind
	                  and possibly crash it.
	                  https://www.samba.org/samba/security/CVE-2022-2127.html
	o CVE-2023-3347:  SMB2 packet signing is not enforced if an admin configured
	                  "server signing = required" or for SMB2 connections to Domain
	                  Controllers where SMB2 packet signing is mandatory.
	                  https://www.samba.org/samba/security/CVE-2023-3347.html
	o CVE-2023-34966: An infinite loop bug in Samba's mdssvc RPC service for
	                  Spotlight can be triggered by an unauthenticated attacker by
	                  issuing a malformed RPC request.
	                  https://www.samba.org/samba/security/CVE-2023-34966.html
	o CVE-2023-34967: Missing type validation in Samba's mdssvc RPC service for
	                  Spotlight can be used by an unauthenticated attacker to
	                  trigger a process crash in a shared RPC mdssvc worker process.
	                  https://www.samba.org/samba/security/CVE-2023-34967.html
	o CVE-2023-34968: As part of the Spotlight protocol Samba discloses the server-
	                  side absolute path of shares and files and directories in
	                  search results.
	                  https://www.samba.org/samba/security/CVE-2023-34968.html
	o  Ralph Boehme <slow@samba.org>
	   * BUG 15072: CVE-2022-2127.
	   * BUG 15340: CVE-2023-34966.
	   * BUG 15341: CVE-2023-34967.
	   * BUG 15388: CVE-2023-34968.
	   * BUG 15397: CVE-2023-3347.
	o  Volker Lendecke <vl@samba.org>
	   * BUG 15072: CVE-2022-2127.
	o  Stefan Metzmacher <metze@samba.org>
	   * BUG 15418: Secure channel faulty since Windows 10/11 update 07/2023.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-07-26 13:15:52 +00:00
2023-06-25 21:08:22 +00:00
2023-06-25 20:37:48 +00:00
2023-07-26 13:15:52 +00:00
2022-04-08 00:32:40 +02:00
2021-03-10 14:42:37 +00:00
2022-03-21 13:47:58 +00:00

IPFire 2.x - The Open Source Firewall

What is IPFire?

IPFire is a hardened, versatile, state-of-the-art Open Source firewall based on Linux. Its ease of use, high performance in any scenario and extensibility make it usable for everyone. For a full list of features have a look here.

This repository contains the source code of IPFire 2.x which is used to build the whole distribution from scratch, since IPFire is not based on any other distribution.

Where can I get IPFire?

Just head over to https://www.ipfire.org/download

How do I use this software?

We have a long and detailed wiki located here which should answers most of your questions.

But I have some questions left. Where can I get support?

You can ask your question at our community located here. A complete list of our support channels can be found here.

How can I contribute?

We have another document for this. Please look here.

Description
No description provided
Readme 101 MiB
Languages
Perl 70.4%
Shell 23%
C 4%
Python 0.6%
Makefile 0.5%
Other 1.4%