The branch, v4-6-test has been updated via 96b8f72 VERSION: Bump version up to 4.6.5. via e3f2d7f Merge tag 'samba-4.6.4' into v4-6-test via b0b0bf1 VERSION: Disable GIT_SNAPSHOTS for the 4.6.4 release. via 85d8992 WHATSNEW: Add release notes for Samba 4.6.4. via 04a3ba4 CVE-2017-7494: rpc_server3: Refuse to open pipe names with / inside via 3bb4485 VERSION: Bump version up to 4.6.4... from 4de3ddc s3: smbd: Fix open_files.idl to correctly ignore share_mode_lease *lease in share_mode_entry.
https://git.samba.org/?p=samba.git;a=shortlog;h=v4-6-test - Log ----------------------------------------------------------------- commit 96b8f723b589bede9af90331a46fea28000f7265 Author: Karolin Seeger <ksee...@samba.org> Date: Tue May 30 11:59:40 2017 +0200 VERSION: Bump version up to 4.6.5. Signed-off-by: Karolin Seeger <ksee...@samba.org> commit e3f2d7ff44620a4f169c8006e09b62376348b6d4 Merge: 4de3ddc b0b0bf1 Author: Karolin Seeger <ksee...@samba.org> Date: Tue May 30 11:57:49 2017 +0200 Merge tag 'samba-4.6.4' into v4-6-test samba: tag release samba-4.6.4 ----------------------------------------------------------------------- Summary of changes: VERSION | 2 +- WHATSNEW.txt | 56 +++++++++++++++++++++++++++++++++++++++++-- source3/rpc_server/srv_pipe.c | 5 ++++ 3 files changed, 60 insertions(+), 3 deletions(-) Changeset truncated at 500 lines: diff --git a/VERSION b/VERSION index 2f581c4..4614794 100644 --- a/VERSION +++ b/VERSION @@ -25,7 +25,7 @@ ######################################################## SAMBA_VERSION_MAJOR=4 SAMBA_VERSION_MINOR=6 -SAMBA_VERSION_RELEASE=4 +SAMBA_VERSION_RELEASE=5 ######################################################## # If a official release has a serious bug # diff --git a/WHATSNEW.txt b/WHATSNEW.txt index 9a16862..fb533f3 100644 --- a/WHATSNEW.txt +++ b/WHATSNEW.txt @@ -1,4 +1,56 @@ ============================= + Release Notes for Samba 4.6.4 + May 24, 2017 + ============================= + + +This is a security release in order to address the following defect: + +o CVE-2017-7494 (Remote code execution from a writable share) + +======= +Details +======= + +o CVE-2017-7494: + All versions of Samba from 3.5.0 onwards are vulnerable to a remote + code execution vulnerability, allowing a malicious client to upload a + shared library to a writable share, and then cause the server to load + and execute it. + + +Changes since 4.6.3: +--------------------- + +o Volker Lendecke <v...@samba.org> + * BUG 12780: CVE-2017-7494: Avoid remote code execution from a writable + share. + + +####################################### +Reporting bugs & Development Discussion +####################################### + +Please discuss this release on the samba-technical mailing list or by +joining the #samba-technical IRC channel on irc.freenode.net. + +If you do report problems then please try to send high quality +feedback. If you don't provide vital information to help us track down +the problem then you will probably be ignored. All bug reports should +be filed under the "Samba 4.1 and newer" product in the project's Bugzilla +database (https://bugzilla.samba.org/). + + +====================================================================== +== Our Code, Our Bugs, Our Responsibility. +== The Samba Team +====================================================================== + + +Release notes for older releases follow: +---------------------------------------- + + ============================= Release Notes for Samba 4.6.3 April 25, 2017 ============================= @@ -104,8 +156,8 @@ database (https://bugzilla.samba.org/). ====================================================================== -Release notes for older releases follow: ----------------------------------------- +---------------------------------------------------------------------- + ============================= Release Notes for Samba 4.6.2 diff --git a/source3/rpc_server/srv_pipe.c b/source3/rpc_server/srv_pipe.c index 0633b5f..c3f0cd8 100644 --- a/source3/rpc_server/srv_pipe.c +++ b/source3/rpc_server/srv_pipe.c @@ -475,6 +475,11 @@ bool is_known_pipename(const char *pipename, struct ndr_syntax_id *syntax) { NTSTATUS status; + if (strchr(pipename, '/')) { + DEBUG(1, ("Refusing open on pipe %s\n", pipename)); + return false; + } + if (lp_disable_spoolss() && strequal(pipename, "spoolss")) { DEBUG(10, ("refusing spoolss access\n")); return false; -- Samba Shared Repository