-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2023-76c06c8576 2023-07-22 01:21:09.480892 --------------------------------------------------------------------------------
Name : samba Product : Fedora 38 Version : 4.18.5 Release : 0.fc38 URL : https://www.samba.org Summary : Server and Client software to interoperate with Windows machines Description : Samba is the standard Windows interoperability suite of programs for Linux and Unix.
-------------------------------------------------------------------------------- Update Information:
Update to version 4.18.5, Security fixes for CVE-2022-2127, CVE-2023-3347, CVE-2023-34966, CVE-2023-34967 and CVE-2023-34968 -------------------------------------------------------------------------------- ChangeLog:
* Thu Jul 20 2023 Guenther Deschner gdeschner@redhat.com - 4.18.5-0 - resolves: #2224040 - Update to version 4.18.5 - resolves: #2222791, #2224254 - Security fix for CVE-2022-2127 - resolves: #2222792, #2224255 - Security fix for CVE-2023-3347 - resolves: #2222793, #2224253 - Security fix for CVE-2023-34966 - resolves: #2222794, #2224252 - Security fix for CVE-2023-34967 - resolves: #2222795, #2224250 - Security fix for CVE-2023-34968 -------------------------------------------------------------------------------- References:
[ 1 ] Bug #2222791 - CVE-2022-2127 samba: out-of-bounds read in winbind AUTH_CRAP https://bugzilla.redhat.com/show_bug.cgi?id=2222791 [ 2 ] Bug #2222792 - CVE-2023-3347 samba: SMB2 packet signing is not enforced when "server signing = required" is set https://bugzilla.redhat.com/show_bug.cgi?id=2222792 [ 3 ] Bug #2222793 - CVE-2023-34966 samba: infinite loop in mdssvc RPC service for spotlight https://bugzilla.redhat.com/show_bug.cgi?id=2222793 [ 4 ] Bug #2222794 - CVE-2023-34967 samba: type confusion in mdssvc RPC service for spotlight https://bugzilla.redhat.com/show_bug.cgi?id=2222794 [ 5 ] Bug #2222795 - CVE-2023-34968 samba: spotlight server-side share path disclosure https://bugzilla.redhat.com/show_bug.cgi?id=2222795 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2023-76c06c8576' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------