svn commit: samba r2764 - in branches/SAMBA_4_0/source/build/pidl: .

2004-09-30 Thread tpot
Author: tpot
Date: 2004-10-01 05:28:20 + (Fri, 01 Oct 2004)
New Revision: 2764

WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_4_0/source/build/pidl&rev=2764&nolog=1

Log:
Use hand-written function for all occurrences of IDL strings, not just
those with a single pointer.

Modified:
   branches/SAMBA_4_0/source/build/pidl/swig.pm


Changeset:
Modified: branches/SAMBA_4_0/source/build/pidl/swig.pm
===
--- branches/SAMBA_4_0/source/build/pidl/swig.pm2004-10-01 05:19:51 UTC (rev 
2763)
+++ branches/SAMBA_4_0/source/build/pidl/swig.pm2004-10-01 05:28:20 UTC (rev 
2764)
@@ -91,7 +91,7 @@
 
 # Special cases
 
-if ($e->{TYPE} eq "string" && $e->{POINTERS} == 1) {
+if ($e->{TYPE} eq "string") {
$result .= "\ts->$prefix$e->{NAME} = string_ptr_from_python(mem_ctx, $obj, 
\"$e->{NAME}\");\n";
return $result;
 }
@@ -187,7 +187,7 @@
 
 # Special cases
 
-if ($e->{TYPE} eq "string" && $e->{POINTERS} == 1) {
+if ($e->{TYPE} eq "string") {
$result .= "\tPyDict_SetItemString(obj, \"$e->{NAME}\", 
string_ptr_to_python(mem_ctx, s->$prefix$e->{NAME}));\n";
return $result;
 }



svn commit: lorikeet r82 - in trunk/samba4-ad-thesis: .

2004-09-30 Thread abartlet
Author: abartlet
Date: 2004-10-01 05:23:53 + (Fri, 01 Oct 2004)
New Revision: 82

WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=lorikeet&path=/trunk/samba4-ad-thesis&rev=82&nolog=1

Log:
Add yet more information on NTLMSSP


Modified:
   trunk/samba4-ad-thesis/chapters.lyx


Changeset:
Modified: trunk/samba4-ad-thesis/chapters.lyx
===
--- trunk/samba4-ad-thesis/chapters.lyx 2004-09-27 23:14:25 UTC (rev 81)
+++ trunk/samba4-ad-thesis/chapters.lyx 2004-10-01 05:23:53 UTC (rev 82)
@@ -858,9 +858,12 @@
  this third party, preferably by some cryptographic proof.
  Often this is by yet another shared-secret authentication scheme.
  
+\layout Chapter
+
+NTLM
 \layout Section
 
-NTLM
+NTLM Challenge Response
 \layout Standard
 
 The NTLM authentication scheme is a challenge-response authentication scheme,
@@ -1053,17 +1056,25 @@
 \layout Subsubsection*
 
 LM session key construction
+\layout Standard
+
+The LM session key is constructed from the first 8 bytes of the LM hash,
+ padded to 16 bytes with zeros.
+ Given what we understand about the LM hash, it is equivilant to the password
+ for passwords of 7 characters or less!
+\layout LyX-Code
+
+LM_key = concat(head(ascii(password), 8), zeros[8]);
 \layout Subsubsection*
 
 NT session key construction
 \layout Standard
 
-The NT session key is a fixed derivative of the password - it contains none
- of the per-session information that the otherwise weaker LM key does:
+The NT session key is also fixed derivative of the password:
 \layout LyX-Code
 
 NT_key = md4(md4(unicode(password));
-\layout Subsection
+\layout Section
 
 NLTMSSP
 \layout Standard
@@ -1085,7 +1096,7 @@
  to understand them.
  At each end of the connection, these blobs of data are passed down to the
  security libraries for processing.
-\layout Subsubsection*
+\layout Subsection
 
 NTLMSSP Packets
 \layout Standard
@@ -1114,7 +1125,7 @@
 \layout Standard
 
 The format of these packets, and the meaning of most of the options carried
- in them is now reasonably well understood, and partially documented in
+ in them is now reasonably well understood, and partially documented by
  
 \begin_inset LatexCommand \citet{opengroupntlm}
 
@@ -1122,8 +1133,91 @@
 
 .
  
+\layout Subsection
+
+NTLMSSP Options
+\layout Standard
+
+Within the NTLMSSP context, a different set of session keys, cyphers and
+ authentication inputs are used - depending on the negotiated options.
+ The fact that these are negotiated is promlementic, but the implementation
+ may define minimum required options.
+ What follows is a discussion of some of the options - but a more complete
+ treatment (of some of the options) is given by 
+\begin_inset LatexCommand \citet{davenportntlm}
+
+\end_inset 
+
+.
 \layout Subsubsection*
 
+LM Session Key
+\layout Standard
+
+The LM session key is created as specified by 
+\begin_inset LatexCommand \citet{opengroupntlm}
+
+\end_inset 
+
+ - it is based on the NTLM `LM Key', and includes part of the LM response
+ (and therefore the server-generated random challenge) in a DES based hash,
+ making it unique for each session.
+ It is negotiated by the specification of the 
+\family typewriter 
+NTLMSSP_NEGOTIATE_LM_KEY
+\family default 
+ in the negotiated options.
+\layout Standard
+
+This key is then 'weakened' to various strengths, to fix export requirements.
+ The irony is that the 128 bit negotiated key is far from this real strength,
+ due to there being at most 56 bits of key input!
+\layout Subsubsection*
+
+NT Sesssion Key (v1)
+\layout Standard
+
+When the LM_KEY option is not negotiated, and no other options are specified,
+ the session key is the NT Key from the NTLM level.
+ This is stronger in hash strength, with real 128 bit stength, but again,
+ the key is fixed until the user's password changes.
+ Unfortunetly other factors - the use the LM response function for the authentic
+ation step - means that the key can be discovered by breaking a 56 bit cypher.
+\layout Subsubsection*
+
+NTLM2 Session Response
+\layout Standard
+
+Another modification to the NTLMSSP login scheme, this option prevents a
+ server-initiated dictionary attack, by providing input from the client
+ and server in calculating the challenge input to the challenge-response
+ function.
+ This option also modifies the session key negotiation, to include mutually
+ agreed random data into the key.
+ This ensures that the session key again changes between sessions.
+\layout Subsubsection*
+
+Key Exchange
+\layout Standard
+
+In another modification to the session key negotiation, the specfication
+ of the 
+\family typewriter 
+NTLMSSP_NEGOTIATE_KEY_EXCHANGE
+\family default 
+ flag allows the client to specify a new session key, to be encrypted with
+ what otherwise would be the session key.
+ Presumably, the client would choose a random sequence of bytes, unrelated
+ to the password, but as will be noted in 
+\begin_inset LatexCommand \ref{

svn commit: samba r2763 - in branches/SAMBA_4_0/source/librpc/rpc: .

2004-09-30 Thread tridge
Author: tridge
Date: 2004-10-01 05:19:51 + (Fri, 01 Oct 2004)
New Revision: 2763

WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_4_0/source/librpc/rpc&rev=2763&nolog=1

Log:
use no-auth bind on ncacn_np unless we specify at least one of "sign", "seal" or 
"connect" 

Modified:
   branches/SAMBA_4_0/source/librpc/rpc/dcerpc_util.c


Changeset:
Modified: branches/SAMBA_4_0/source/librpc/rpc/dcerpc_util.c
===
--- branches/SAMBA_4_0/source/librpc/rpc/dcerpc_util.c  2004-10-01 03:28:39 UTC (rev 
2762)
+++ branches/SAMBA_4_0/source/librpc/rpc/dcerpc_util.c  2004-10-01 05:19:51 UTC (rev 
2763)
@@ -496,7 +496,8 @@
if (username && username[0] && (binding->flags & DCERPC_SCHANNEL_ANY)) {
status = dcerpc_bind_auth_schannel(*p, pipe_uuid, pipe_version, 
   domain, username, password);
-   } else if (username && username[0]) {
+   } else if (username && username[0] &&
+  (binding->flags & (DCERPC_CONNECT|DCERPC_SIGN|DCERPC_SEAL))) {
status = dcerpc_bind_auth_ntlm(*p, pipe_uuid, pipe_version, domain, 
username, password);
} else {
status = dcerpc_bind_auth_none(*p, pipe_uuid, pipe_version);



svn commit: samba r2762 - in branches/SAMBA_3_0/source: nsswitch utils

2004-09-30 Thread abartlet
Author: abartlet
Date: 2004-10-01 03:28:39 + (Fri, 01 Oct 2004)
New Revision: 2762

WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_3_0/source&rev=2762&nolog=1

Log:
Remove silly conversion to and from UTF8 on the winbind pipe.  Fix the
naming of the require_membership_of parameter in pam_winbind and fix
the error code for 'you didn't specify a domain' in ntlm_auth.

Andrew Bartlett

Modified:
   branches/SAMBA_3_0/source/nsswitch/pam_winbind.c
   branches/SAMBA_3_0/source/nsswitch/wbinfo.c
   branches/SAMBA_3_0/source/nsswitch/winbindd_nss.h
   branches/SAMBA_3_0/source/nsswitch/winbindd_pam.c
   branches/SAMBA_3_0/source/utils/ntlm_auth.c


Changeset:
Sorry, the patch is too large (368 lines) to include; please use WebSVN to see it!
WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_3_0/source&rev=2762&nolog=1


svn commit: samba r2761 - in branches/SAMBA_3_0/source/rpc_server: .

2004-09-30 Thread abartlet
Author: abartlet
Date: 2004-10-01 03:14:57 + (Fri, 01 Oct 2004)
New Revision: 2761

WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_3_0/source/rpc_server&rev=2761&nolog=1

Log:
Print the decrypted, not encrypted key.

Andrew Bartlett

Modified:
   branches/SAMBA_3_0/source/rpc_server/srv_netlog_nt.c


Changeset:
Modified: branches/SAMBA_3_0/source/rpc_server/srv_netlog_nt.c
===
--- branches/SAMBA_3_0/source/rpc_server/srv_netlog_nt.c2004-10-01 02:59:43 
UTC (rev 2760)
+++ branches/SAMBA_3_0/source/rpc_server/srv_netlog_nt.c2004-10-01 03:14:57 
UTC (rev 2761)
@@ -486,8 +486,8 @@
cred_hash3( pwd, q_u->pwd, p->dc.sess_key, 0);
 
DEBUG(100,("Server password set : new given value was :\n"));
-   for(i = 0; i < 16; i++)
-   DEBUG(100,("%02X ", q_u->pwd[i]));
+   for(i = 0; i < sizeof(pwd); i++)
+   DEBUG(100,("%02X ", pwd[i]));
DEBUG(100,("\n"));
 
old_pw = pdb_get_nt_passwd(sampass);



svn commit: samba r2760 - branches/SAMBA_3_0/source/nsswitch trunk/source/nsswitch

2004-09-30 Thread tpot
Author: tpot
Date: 2004-10-01 02:59:43 + (Fri, 01 Oct 2004)
New Revision: 2760

WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/&rev=2760&nolog=1

Log:
Another patch from The Written Word.  Don't declare function prototypes
inside a function.  Bugzilla #1762.

Modified:
   branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c
   trunk/source/nsswitch/winbind_nss_aix.c


Changeset:
Modified: branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c
===
--- branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c2004-10-01 02:57:10 
UTC (rev 2759)
+++ branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c2004-10-01 02:59:43 
UTC (rev 2760)
@@ -159,12 +159,13 @@
return id;
 }
 
+static struct passwd *wb_aix_getpwuid(uid_t uid);
+
 static char *decode_user(const char *name)
 {
struct passwd *pwd;
unsigned id;
char *ret;
-   static struct passwd *wb_aix_getpwuid(uid_t uid);
 
sscanf(name+1, "%u", &id);
pwd = wb_aix_getpwuid(id);

Modified: trunk/source/nsswitch/winbind_nss_aix.c
===
--- trunk/source/nsswitch/winbind_nss_aix.c 2004-10-01 02:57:10 UTC (rev 2759)
+++ trunk/source/nsswitch/winbind_nss_aix.c 2004-10-01 02:59:43 UTC (rev 2760)
@@ -159,12 +159,13 @@
return id;
 }
 
+static struct passwd *wb_aix_getpwuid(uid_t uid);
+
 static char *decode_user(const char *name)
 {
struct passwd *pwd;
unsigned id;
char *ret;
-   static struct passwd *wb_aix_getpwuid(uid_t uid);
 
sscanf(name+1, "%u", &id);
pwd = wb_aix_getpwuid(id);



svn commit: samba r2759 - branches/SAMBA_3_0/source branches/SAMBA_3_0/source/nsswitch trunk/source trunk/source/nsswitch

2004-09-30 Thread tpot
Author: tpot
Date: 2004-10-01 02:57:10 + (Fri, 01 Oct 2004)
New Revision: 2759

WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/&rev=2759&nolog=1

Log:
Fix for winbindd on AIX 5.1.  Apparently it doesn't have as many methods
in struct secmethod_table as AIX 5.2.  Patch from The Written Word.

Modified:
   branches/SAMBA_3_0/source/configure.in
   branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c
   trunk/source/configure.in
   trunk/source/nsswitch/winbind_nss_aix.c


Changeset:
Modified: branches/SAMBA_3_0/source/configure.in
===
--- branches/SAMBA_3_0/source/configure.in  2004-09-30 16:08:09 UTC (rev 2758)
+++ branches/SAMBA_3_0/source/configure.in  2004-10-01 02:57:10 UTC (rev 2759)
@@ -4291,6 +4291,14 @@
AC_DEFINE(HAVE_PASSWD_PW_AGE, 1, [Defined if struct passwd has pw_age 
field]),,
[#include ])
 
+# AIX 4.3.x and 5.1 do not have as many members in
+# struct secmethod_table as AIX 5.2
+AC_CHECK_MEMBERS([struct secmethod_table.method_attrlist], , ,
+   [#include ])
+AC_CHECK_MEMBERS([struct secmethod_table.method_version], , ,
+   [#include ])
+
+
 #
 # Check to see if we should use the included popt 
 

Modified: branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c
===
--- branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c2004-09-30 16:08:09 
UTC (rev 2758)
+++ branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c2004-10-01 02:57:10 
UTC (rev 2759)
@@ -741,6 +741,7 @@
return;
 }
 
+#ifdef HAVE_STRUCT_SECMETHOD_TABLE_METHOD_ATTRLIST
 /* 
return a list of additional attributes supported by the backend 
 */
@@ -764,6 +765,7 @@
 
return ret;
 }
+#endif
 
 
 /*
@@ -977,7 +979,9 @@
 {
ZERO_STRUCTP(methods);
 
+#ifdef HAVE_STRUCT_SECMETHOD_TABLE_METHOD_VERSION
methods->method_version = SECMETHOD_VERSION_520;
+#endif
 
methods->method_getgrgid   = wb_aix_getgrgid;
methods->method_getgrnam   = wb_aix_getgrnam;
@@ -997,7 +1001,9 @@
methods->method_passwdrestrictions = wb_aix_passwdrestrictions;
methods->method_getgracct  = wb_aix_getgracct;
methods->method_getgrusers = wb_aix_getgrusers;
+#ifdef HAVE_STRUCT_SECMETHOD_TABLE_METHOD_ATTRLIST
methods->method_attrlist   = wb_aix_attrlist;
+#endif
 
 #if LOG_UNIMPLEMENTED_CALLS
methods->method_delgroup  = method_delgroup;

Modified: trunk/source/configure.in
===
--- trunk/source/configure.in   2004-09-30 16:08:09 UTC (rev 2758)
+++ trunk/source/configure.in   2004-10-01 02:57:10 UTC (rev 2759)
@@ -4297,6 +4297,14 @@
AC_DEFINE(HAVE_PASSWD_PW_AGE, 1, [Defined if struct passwd has pw_age 
field]),,
[#include ])
 
+# AIX 4.3.x and 5.1 do not have as many members in
+# struct secmethod_table as AIX 5.2
+AC_CHECK_MEMBERS([struct secmethod_table.method_attrlist], , ,
+   [#include ])
+AC_CHECK_MEMBERS([struct secmethod_table.method_version], , ,
+   [#include ])
+
+
 #
 # Check to see if we should use the included popt 
 

Modified: trunk/source/nsswitch/winbind_nss_aix.c
===
--- trunk/source/nsswitch/winbind_nss_aix.c 2004-09-30 16:08:09 UTC (rev 2758)
+++ trunk/source/nsswitch/winbind_nss_aix.c 2004-10-01 02:57:10 UTC (rev 2759)
@@ -741,6 +741,7 @@
return;
 }
 
+#ifdef HAVE_STRUCT_SECMETHOD_TABLE_METHOD_ATTRLIST
 /* 
return a list of additional attributes supported by the backend 
 */
@@ -764,6 +765,7 @@
 
return ret;
 }
+#endif
 
 
 /*
@@ -977,7 +979,9 @@
 {
ZERO_STRUCTP(methods);
 
+#ifdef HAVE_STRUCT_SECMETHOD_TABLE_METHOD_VERSION
methods->method_version = SECMETHOD_VERSION_520;
+#endif
 
methods->method_getgrgid   = wb_aix_getgrgid;
methods->method_getgrnam   = wb_aix_getgrnam;
@@ -997,7 +1001,9 @@
methods->method_passwdrestrictions = wb_aix_passwdrestrictions;
methods->method_getgracct  = wb_aix_getgracct;
methods->method_getgrusers = wb_aix_getgrusers;
+#ifdef HAVE_STRUCT_SECMETHOD_TABLE_METHOD_ATTRLIST
methods->method_attrlist   = wb_aix_attrlist;
+#endif
 
 #if LOG_UNIMPLEMENTED_CALLS
methods->method_delgroup  = method_delgroup;



svn commit: samba-web r365 - in trunk/history: .

2004-09-30 Thread deryck
Author: deryck
Date: 2004-09-30 21:19:31 + (Thu, 30 Sep 2004)
New Revision: 365

WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=samba-web&path=/trunk/history&rev=365&nolog=1

Log:

Add today's security release to security page.

--deryck

Modified:
   trunk/history/security.html


Changeset:
Modified: trunk/history/security.html
===
--- trunk/history/security.html 2004-09-30 14:46:26 UTC (rev 364)
+++ trunk/history/security.html 2004-09-30 21:19:31 UTC (rev 365)
@@ -21,6 +21,16 @@
Complete Release Notes
   
   
+
+30 September 2004
+Samba 2.2.12 and/or  patch for 
<=Samba 3.0.5
+Potential arbitrary file access
+Samba 2.2.x <=2.2.11 and Samba 3.0.x <=3.0.5
+http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815";>CAN-2004-0815
+Release Notes
+
+
+  
   
 13 Sept 2004
 3.0.5 
patch



svn commit: samba r2758 - in branches/SAMBA_4_0/source/ldap_server: . devdocs

2004-09-30 Thread idra
Author: idra
Date: 2004-09-30 16:08:09 + (Thu, 30 Sep 2004)
New Revision: 2758

WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_4_0/source/ldap_server&rev=2758&nolog=1

Log:
keep docos handy while developing it
Added:
   branches/SAMBA_4_0/source/ldap_server/devdocs/
   branches/SAMBA_4_0/source/ldap_server/devdocs/rfc2252.txt
   branches/SAMBA_4_0/source/ldap_server/devdocs/rfc2253.txt
   branches/SAMBA_4_0/source/ldap_server/devdocs/rfc2254.txt
   branches/SAMBA_4_0/source/ldap_server/devdocs/rfc2255.txt
   branches/SAMBA_4_0/source/ldap_server/devdocs/rfc2256.txt
   branches/SAMBA_4_0/source/ldap_server/devdocs/rfc2307.txt


Changeset:
Sorry, the patch is too large (5709 lines) to include; please use WebSVN to see it!
WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_4_0/source/ldap_server&rev=2758&nolog=1


svn commit: samba-web r364 - in trunk: . history

2004-09-30 Thread deryck
Author: deryck
Date: 2004-09-30 14:46:26 + (Thu, 30 Sep 2004)
New Revision: 364

WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=samba-web&path=/trunk&rev=364&nolog=1

Log:

Update 2.2.12 info in history and stable release sections.

--deryck

Modified:
   trunk/header2.html
   trunk/history/header_history.html


Changeset:
Modified: trunk/header2.html
===
--- trunk/header2.html  2004-09-30 13:43:33 UTC (rev 363)
+++ trunk/header2.html  2004-09-30 14:46:26 UTC (rev 364)
@@ -141,10 +141,10 @@
 
 
 
-Samba 2.2.11
+Samba 2.2.12
 (gzipped)
-Release Notes
-Signature
+Release Notes
+Signature
 

 Release History

Modified: trunk/history/header_history.html
===
--- trunk/history/header_history.html   2004-09-30 13:43:33 UTC (rev 363)
+++ trunk/history/header_history.html   2004-09-30 14:46:26 UTC (rev 364)
@@ -93,6 +93,8 @@
 samba-3.0.2.html
 samba-3.0.1.html
 samba-3.0.0.html
+samba-2.2.12.html
+samba-2.2.11.html
 samba-2.2.10.html
 samba-2.2.9.html
 samba-2.2.8a.html



svn commit: samba-web r363 - in trunk: . news/releases

2004-09-30 Thread deryck
Author: deryck
Date: 2004-09-30 13:43:33 + (Thu, 30 Sep 2004)
New Revision: 363

WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=samba-web&path=/trunk&rev=363&nolog=1

Log:

Add security announcement to news, and fix html and typos
on the main samba.org page.

--deryck

Added:
   trunk/news/releases/security_2.2.12.html
Modified:
   trunk/index.html


Changeset:
Modified: trunk/index.html
===
--- trunk/index.html2004-09-30 13:08:21 UTC (rev 362)
+++ trunk/index.html2004-09-30 13:43:33 UTC (rev 363)
@@ -12,15 +12,15 @@
 30 September 2004
 Security Notice -- CVE CAN-2004-0815
 
-A security vulnerability has been located in Samba 2.2.x <= 2.2.11
-   and Samba 3.0.x <= 3.0.5.  A remote attacker may be able to gain access
-   to files which exist outside of the share's defined path. Such files 
-   must still be readable by the account used for the connection.
+A security vulnerability has been located in Samba 2.2.x <= 2.2.11
+and Samba 3.0.x <= 3.0.5.  A remote attacker may be able to gain 
+access to files which exist outside of the share's defined path. Such 
+files must still be readable by the account used for the connection.
 
 Samba 2.2.12 (signature)
has been released to address this issue in the 2.2.x release series.  A 
patch
-   for Samba 3.0.5 and earlieri (signature)
+   for Samba 3.0.5 and earlier (signature)
is available as well.
 
 

Added: trunk/news/releases/security_2.2.12.html
===
--- trunk/news/releases/security_2.2.12.html2004-09-30 13:08:21 UTC (rev 362)
+++ trunk/news/releases/security_2.2.12.html2004-09-30 13:43:33 UTC (rev 363)
@@ -0,0 +1,13 @@
+Security Notice -- CVE CAN-2004-0815 
+
+
+A security vulnerability has been located in Samba 2.2.x <= 2.2.11 and 
Samba 3.0.x <= 3.0.5. A remote attacker may be able to gain access to files which 
exist outside of the share's defined path. Such files must still be readable by the 
account used for the connection.
+
+Samba 2.2.12 (signature)
+   has been released to address this issue in the 2.2.x release series.  A 
+   patch
+   for Samba 3.0.5 and earlier (signature)
+   is available as well.   
+
+
+   


Property changes on: trunk/news/releases/security_2.2.12.html
___
Name: svn:executable
   + *



svn commit: samba r2757 - in branches/SAMBA_4_0/source/ldap_server: .

2004-09-30 Thread metze
Author: metze
Date: 2004-09-30 13:29:27 + (Thu, 30 Sep 2004)
New Revision: 2757

WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_4_0/source/ldap_server&rev=2757&nolog=1

Log:
some minor fixes

metze

Modified:
   branches/SAMBA_4_0/source/ldap_server/ldap_simple_ldb.c


Changeset:
Modified: branches/SAMBA_4_0/source/ldap_server/ldap_simple_ldb.c
===
--- branches/SAMBA_4_0/source/ldap_server/ldap_simple_ldb.c 2004-09-30 01:04:58 
UTC (rev 2756)
+++ branches/SAMBA_4_0/source/ldap_server/ldap_simple_ldb.c 2004-09-30 13:29:27 
UTC (rev 2757)
@@ -40,7 +40,7 @@
  */
 static char *sldb_fix_dn(const char *dn)
 {
-   char *new_dn, *n, *current;
+   char *new_dn;
int i, j, k;
 
/* alloc enough room to host the whole dn as multibyte string */
@@ -333,8 +333,6 @@
ldb_set_alloc(ldb, talloc_ldb_alloc, samdb);
ldb_ret = ldb_delete(ldb, dn);
 
-   errstr = ldb_errstring(ldb);
-
del_reply = ldapsrv_init_reply(call, LDAP_TAG_DelResponse);
ALLOC_CHECK(del_reply);
 



svn commit: samba-web r362 - in trunk: .

2004-09-30 Thread jerry
Author: jerry
Date: 2004-09-30 13:08:21 + (Thu, 30 Sep 2004)
New Revision: 362

WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=samba-web&path=/trunk&rev=362&nolog=1

Log:
fixing typo
Modified:
   trunk/index.html


Changeset:
Modified: trunk/index.html
===
--- trunk/index.html2004-09-30 13:04:52 UTC (rev 361)
+++ trunk/index.html2004-09-30 13:08:21 UTC (rev 362)
@@ -38,7 +38,7 @@
no guarantees. But the 3.1 tree will also has some new experimental
features that may entice you to take a look (we hope).
 
-(...more release 
notes.
+(...more release 
notes).
 
 The Samba 3.1.0
source code can be downloaded now.  The GnuPG 



svn commit: samba-web r361 - in trunk: . history

2004-09-30 Thread jerry
Author: jerry
Date: 2004-09-30 13:04:52 + (Thu, 30 Sep 2004)
New Revision: 361

WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=samba-web&path=/trunk&rev=361&nolog=1

Log:
release announcements
Added:
   trunk/history/samba-2.2.12.html
Modified:
   trunk/index.html


Changeset:
Sorry, the patch is too large (490 lines) to include; please use WebSVN to see it!
WebSVN: 
http://websvn.samba.org/websvn/changeset.php?rep=samba-web&path=/trunk&rev=361&nolog=1