diff options
author | Hauke Mehrtens <hauke@hauke-m.de> | 2018-04-01 15:48:47 +0200 |
---|---|---|
committer | Hauke Mehrtens <hauke@hauke-m.de> | 2018-04-03 23:26:45 +0200 |
commit | 9aaa23ec8baa50b63d33466f3f353e43c473952a (patch) | |
tree | 4c25fb285469828b15d8f07a117ee5578da9a7e4 /package/network/services/samba36/patches/030-CVE-2017-15275-v3.6.patch | |
parent | d6d3db05436952f68f47d35df58ad5050b1f2d66 (diff) | |
download | upstream-9aaa23ec8baa50b63d33466f3f353e43c473952a.tar.gz upstream-9aaa23ec8baa50b63d33466f3f353e43c473952a.tar.bz2 upstream-9aaa23ec8baa50b63d33466f3f353e43c473952a.zip |
samba36: fix some security problems
This Adds fixes for the following security problems based on debians patches:
CVE-2016-2125: Unconditional privilege delegation to Kerberos servers in trusted realms
CVE-2017-12163: Server memory information leak over SMB1
CVE-2017-12150: SMB1/2/3 connections may not require signing where they should
CVE-2018-1050: Denial of Service Attack on external print server.
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Diffstat (limited to 'package/network/services/samba36/patches/030-CVE-2017-15275-v3.6.patch')
-rw-r--r-- | package/network/services/samba36/patches/030-CVE-2017-15275-v3.6.patch | 40 |
1 files changed, 40 insertions, 0 deletions
diff --git a/package/network/services/samba36/patches/030-CVE-2017-15275-v3.6.patch b/package/network/services/samba36/patches/030-CVE-2017-15275-v3.6.patch new file mode 100644 index 0000000000..055a15e87e --- /dev/null +++ b/package/network/services/samba36/patches/030-CVE-2017-15275-v3.6.patch @@ -0,0 +1,40 @@ +From c1a22e59f87783d88dfbaeeb132b89be166b2754 Mon Sep 17 00:00:00 2001 +From: Jeremy Allison <jra@samba.org> +Date: Wed, 20 Sep 2017 11:04:50 -0700 +Subject: [PATCH 2/2] s3: smbd: Chain code can return uninitialized memory when + talloc buffer is grown. + +Ensure we zero out unused grown area. + +CVE-2017-15275 + +BUG: https://bugzilla.samba.org/show_bug.cgi?id=13077 + +Signed-off-by: Jeremy Allison <jra@samba.org> +--- + source3/smbd/srvstr.c | 14 ++++++++++++++ + 1 file changed, 14 insertions(+) + +--- a/source3/smbd/srvstr.c ++++ b/source3/smbd/srvstr.c +@@ -70,6 +70,20 @@ ssize_t message_push_string(uint8 **outb + DEBUG(0, ("srvstr_push failed\n")); + return -1; + } ++ ++ /* ++ * Ensure we clear out the extra data we have ++ * grown the buffer by, but not written to. ++ */ ++ if (buf_size + result < buf_size) { ++ return -1; ++ } ++ if (grow_size < result) { ++ return -1; ++ } ++ ++ memset(tmp + buf_size + result, '\0', grow_size - result); ++ + set_message_bcc((char *)tmp, smb_buflen(tmp) + result); + + *outbuf = tmp; |