Fedora Linux 8783 Published by

A samba security update has been released for Fedora 35.



SECURITY: Fedora 35 Update: samba-4.15.9-0.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-1479911a38
2022-08-14 03:00:28.871061
--------------------------------------------------------------------------------

Name : samba
Product : Fedora 35
Version : 4.15.9
Release : 0.fc35
URL :   https://www.samba.org
Summary : Server and Client software to interoperate with Windows machines
Description :
Samba is the standard Windows interoperability suite of programs for Linux and
Unix.

--------------------------------------------------------------------------------
Update Information:

Update to version 4.15.9 to address security fixes for CVE-2022-32742,
CVE-2022-32744, CVE-2022-32745, CVE-2022-32746
--------------------------------------------------------------------------------
ChangeLog:

* Wed Jul 27 2022 Guenther Deschner - 4.15.9-0
- resolves: #2108196, #2111729 - Security fixes for CVE-2022-32742
- resolves: #2108205, #2111731 - Security fixes for CVE-2022-32744
- resolves: #2108211, #2111732 - Security fixes for CVE-2022-32745
- resolves: #2108215, #2111734 - Security fixes for CVE-2022-32746
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2108196 - CVE-2022-32742 samba: server memory information leak via SMB1
  https://bugzilla.redhat.com/show_bug.cgi?id=2108196
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-1479911a38' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________