aboutsummaryrefslogtreecommitdiffstats
path: root/package/network/services/samba36/patches/029-CVE-2017-15275.patch
diff options
context:
space:
mode:
authorHauke Mehrtens <hauke@hauke-m.de>2018-04-01 15:48:47 +0200
committerHauke Mehrtens <hauke@hauke-m.de>2018-04-03 23:26:45 +0200
commit9aaa23ec8baa50b63d33466f3f353e43c473952a (patch)
tree4c25fb285469828b15d8f07a117ee5578da9a7e4 /package/network/services/samba36/patches/029-CVE-2017-15275.patch
parentd6d3db05436952f68f47d35df58ad5050b1f2d66 (diff)
downloadupstream-9aaa23ec8baa50b63d33466f3f353e43c473952a.tar.gz
upstream-9aaa23ec8baa50b63d33466f3f353e43c473952a.tar.bz2
upstream-9aaa23ec8baa50b63d33466f3f353e43c473952a.zip
samba36: fix some security problems
This Adds fixes for the following security problems based on debians patches: CVE-2016-2125: Unconditional privilege delegation to Kerberos servers in trusted realms CVE-2017-12163: Server memory information leak over SMB1 CVE-2017-12150: SMB1/2/3 connections may not require signing where they should CVE-2018-1050: Denial of Service Attack on external print server. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Diffstat (limited to 'package/network/services/samba36/patches/029-CVE-2017-15275.patch')
-rw-r--r--package/network/services/samba36/patches/029-CVE-2017-15275.patch40
1 files changed, 0 insertions, 40 deletions
diff --git a/package/network/services/samba36/patches/029-CVE-2017-15275.patch b/package/network/services/samba36/patches/029-CVE-2017-15275.patch
deleted file mode 100644
index 055a15e87e..0000000000
--- a/package/network/services/samba36/patches/029-CVE-2017-15275.patch
+++ /dev/null
@@ -1,40 +0,0 @@
-From c1a22e59f87783d88dfbaeeb132b89be166b2754 Mon Sep 17 00:00:00 2001
-From: Jeremy Allison <jra@samba.org>
-Date: Wed, 20 Sep 2017 11:04:50 -0700
-Subject: [PATCH 2/2] s3: smbd: Chain code can return uninitialized memory when
- talloc buffer is grown.
-
-Ensure we zero out unused grown area.
-
-CVE-2017-15275
-
-BUG: https://bugzilla.samba.org/show_bug.cgi?id=13077
-
-Signed-off-by: Jeremy Allison <jra@samba.org>
----
- source3/smbd/srvstr.c | 14 ++++++++++++++
- 1 file changed, 14 insertions(+)
-
---- a/source3/smbd/srvstr.c
-+++ b/source3/smbd/srvstr.c
-@@ -70,6 +70,20 @@ ssize_t message_push_string(uint8 **outb
- DEBUG(0, ("srvstr_push failed\n"));
- return -1;
- }
-+
-+ /*
-+ * Ensure we clear out the extra data we have
-+ * grown the buffer by, but not written to.
-+ */
-+ if (buf_size + result < buf_size) {
-+ return -1;
-+ }
-+ if (grow_size < result) {
-+ return -1;
-+ }
-+
-+ memset(tmp + buf_size + result, '\0', grow_size - result);
-+
- set_message_bcc((char *)tmp, smb_buflen(tmp) + result);
-
- *outbuf = tmp;