The branch, v4-5-test has been updated via 7922d48 VERSION: Bump version up to 4.5.11. via 15db83f Merge tag 'samba-4.5.10' into v4-5-test via 558f8e6 VERSION: Disable GIT_SNAPSHOTS for the 4.5.10 release. via c46ed35 WHATSNEW: Add release notes for Samba 4.5.10. via 5f224a3 CVE-2017-7494: rpc_server3: Refuse to open pipe names with / inside via 79dc791 VERSION: Bump version up to 4.5.10... from d6568b8 s3: smbd: Fix open_files.idl to correctly ignore share_mode_lease *lease in share_mode_entry.
https://git.samba.org/?p=samba.git;a=shortlog;h=v4-5-test - Log ----------------------------------------------------------------- commit 7922d481a199598424c8ab3a6d12b8f080a3d62e Author: Karolin Seeger <ksee...@samba.org> Date: Wed May 24 10:06:16 2017 +0200 VERSION: Bump version up to 4.5.11. Signed-off-by: Karolin Seeger <ksee...@samba.org> commit 15db83ffed2d7b14b7a8dff9011b940221d1ce9c Merge: d6568b8 558f8e6 Author: Karolin Seeger <ksee...@samba.org> Date: Wed May 24 10:05:58 2017 +0200 Merge tag 'samba-4.5.10' into v4-5-test samba: tag release samba-4.5.10 ----------------------------------------------------------------------- Summary of changes: VERSION | 2 +- WHATSNEW.txt | 56 +++++++++++++++++++++++++++++++++++++++++-- source3/rpc_server/srv_pipe.c | 5 ++++ 3 files changed, 60 insertions(+), 3 deletions(-) Changeset truncated at 500 lines: diff --git a/VERSION b/VERSION index a53c3a1..a81580c 100644 --- a/VERSION +++ b/VERSION @@ -25,7 +25,7 @@ ######################################################## SAMBA_VERSION_MAJOR=4 SAMBA_VERSION_MINOR=5 -SAMBA_VERSION_RELEASE=10 +SAMBA_VERSION_RELEASE=11 ######################################################## # If a official release has a serious bug # diff --git a/WHATSNEW.txt b/WHATSNEW.txt index 7c57603..fcc30ad 100644 --- a/WHATSNEW.txt +++ b/WHATSNEW.txt @@ -1,3 +1,55 @@ + ============================== + Release Notes for Samba 4.5.10 + May 24, 2017 + ============================== + + +This is a security release in order to address the following defect: + +o CVE-2017-7494 (Remote code execution from a writable share) + +======= +Details +======= + +o CVE-2017-7494: + All versions of Samba from 3.5.0 onwards are vulnerable to a remote + code execution vulnerability, allowing a malicious client to upload a + shared library to a writable share, and then cause the server to load + and execute it. + + +Changes since 4.5.9: +-------------------- + +o Volker Lendecke <v...@samba.org> + * BUG 12780: CVE-2017-7494: Avoid remote code execution from a writable + share. + + +####################################### +Reporting bugs & Development Discussion +####################################### + +Please discuss this release on the samba-technical mailing list or by +joining the #samba-technical IRC channel on irc.freenode.net. + +If you do report problems then please try to send high quality +feedback. If you don't provide vital information to help us track down +the problem then you will probably be ignored. All bug reports should +be filed under the Samba 4.1 and newer product in the project's Bugzilla +database (https://bugzilla.samba.org/). + + +====================================================================== +== Our Code, Our Bugs, Our Responsibility. +== The Samba Team +====================================================================== + + +Release notes for older releases follow: +---------------------------------------- + ============================= Release Notes for Samba 4.5.9 May 18, 2017 @@ -84,8 +136,8 @@ database (https://bugzilla.samba.org/). ====================================================================== -Release notes for older releases follow: ----------------------------------------- +---------------------------------------------------------------------- + ============================= Release Notes for Samba 4.5.8 diff --git a/source3/rpc_server/srv_pipe.c b/source3/rpc_server/srv_pipe.c index bcd7e5d..40d60a7 100644 --- a/source3/rpc_server/srv_pipe.c +++ b/source3/rpc_server/srv_pipe.c @@ -476,6 +476,11 @@ bool is_known_pipename(const char *pipename, struct ndr_syntax_id *syntax) { NTSTATUS status; + if (strchr(pipename, '/')) { + DEBUG(1, ("Refusing open on pipe %s\n", pipename)); + return false; + } + if (lp_disable_spoolss() && strequal(pipename, "spoolss")) { DEBUG(10, ("refusing spoolss access\n")); return false; -- Samba Shared Repository