fix CVE-2020-14318 CVE-2020-14323 CVE-2020-14383
This commit is contained in:
parent
af13f4dbbb
commit
ede435f434
91
0001-CVE-2020-14383.patch
Normal file
91
0001-CVE-2020-14383.patch
Normal file
@ -0,0 +1,91 @@
|
|||||||
|
From 2632e8ebae826a7305fe7d3948ee28b77d2ffbc0 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
|
||||||
|
Date: Fri, 21 Aug 2020 17:10:22 +1200
|
||||||
|
Subject: [PATCH] CVE-2020-14383: s4/dns: Ensure variable initialization with
|
||||||
|
NULL.
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: text/plain; charset=utf8
|
||||||
|
Content-Transfer-Encoding: 8bit
|
||||||
|
|
||||||
|
Based on patches from Francis Brosnan Blázquez <francis@aspl.es>
|
||||||
|
and Jeremy Allison <jra@samba.org>
|
||||||
|
|
||||||
|
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14472
|
||||||
|
BUG: https://bugzilla.samba.org/show_bug.cgi?id=12795
|
||||||
|
|
||||||
|
Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
|
||||||
|
Reviewed-by: Jeremy Allison <jra@samba.org>
|
||||||
|
(based on commit 7afe449e7201be92bed8e53cbb37b74af720ef4e)
|
||||||
|
---
|
||||||
|
.../rpc_server/dnsserver/dcerpc_dnsserver.c | 24 ++++++++++---------
|
||||||
|
1 file changed, 13 insertions(+), 11 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/source4/rpc_server/dnsserver/dcerpc_dnsserver.c b/source4/rpc_server/dnsserver/dcerpc_dnsserver.c
|
||||||
|
index b6389f2328a..ec610168266 100644
|
||||||
|
--- a/source4/rpc_server/dnsserver/dcerpc_dnsserver.c
|
||||||
|
+++ b/source4/rpc_server/dnsserver/dcerpc_dnsserver.c
|
||||||
|
@@ -1759,15 +1759,17 @@ static WERROR dnsserver_enumerate_records(struct dnsserver_state *dsstate,
|
||||||
|
TALLOC_CTX *tmp_ctx;
|
||||||
|
char *name;
|
||||||
|
const char * const attrs[] = { "name", "dnsRecord", NULL };
|
||||||
|
- struct ldb_result *res;
|
||||||
|
- struct DNS_RPC_RECORDS_ARRAY *recs;
|
||||||
|
+ struct ldb_result *res = NULL;
|
||||||
|
+ struct DNS_RPC_RECORDS_ARRAY *recs = NULL;
|
||||||
|
char **add_names = NULL;
|
||||||
|
- char *rname;
|
||||||
|
+ char *rname = NULL;
|
||||||
|
const char *preference_name = NULL;
|
||||||
|
int add_count = 0;
|
||||||
|
int i, ret, len;
|
||||||
|
WERROR status;
|
||||||
|
- struct dns_tree *tree, *base, *node;
|
||||||
|
+ struct dns_tree *tree = NULL;
|
||||||
|
+ struct dns_tree *base = NULL;
|
||||||
|
+ struct dns_tree *node = NULL;
|
||||||
|
|
||||||
|
tmp_ctx = talloc_new(mem_ctx);
|
||||||
|
W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
|
||||||
|
@@ -1850,9 +1852,9 @@ static WERROR dnsserver_enumerate_records(struct dnsserver_state *dsstate,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
- talloc_free(res);
|
||||||
|
- talloc_free(tree);
|
||||||
|
- talloc_free(name);
|
||||||
|
+ TALLOC_FREE(res);
|
||||||
|
+ TALLOC_FREE(tree);
|
||||||
|
+ TALLOC_FREE(name);
|
||||||
|
|
||||||
|
/* Add any additional records */
|
||||||
|
if (select_flag & DNS_RPC_VIEW_ADDITIONAL_DATA) {
|
||||||
|
@@ -1870,14 +1872,14 @@ static WERROR dnsserver_enumerate_records(struct dnsserver_state *dsstate,
|
||||||
|
LDB_SCOPE_ONELEVEL, attrs,
|
||||||
|
"(&(objectClass=dnsNode)(name=%s)(!(dNSTombstoned=TRUE)))",
|
||||||
|
encoded_name);
|
||||||
|
- talloc_free(name);
|
||||||
|
+ TALLOC_FREE(name);
|
||||||
|
if (ret != LDB_SUCCESS) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
if (res->count == 1) {
|
||||||
|
break;
|
||||||
|
} else {
|
||||||
|
- talloc_free(res);
|
||||||
|
+ TALLOC_FREE(res);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@@ -1892,8 +1894,8 @@ static WERROR dnsserver_enumerate_records(struct dnsserver_state *dsstate,
|
||||||
|
select_flag, rname,
|
||||||
|
res->msgs[0], 0, recs,
|
||||||
|
NULL, NULL);
|
||||||
|
- talloc_free(rname);
|
||||||
|
- talloc_free(res);
|
||||||
|
+ TALLOC_FREE(rname);
|
||||||
|
+ TALLOC_FREE(res);
|
||||||
|
if (!W_ERROR_IS_OK(status)) {
|
||||||
|
talloc_free(tmp_ctx);
|
||||||
|
return status;
|
||||||
|
--
|
||||||
|
2.29.2
|
||||||
59
0002-CVE-2020-14383.patch
Normal file
59
0002-CVE-2020-14383.patch
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
From 8e09649351e9e8143b4bd0b76bcbd2cfb4d2f281 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
|
||||||
|
Date: Fri, 21 Aug 2020 17:23:17 +1200
|
||||||
|
Subject: [PATCH] CVE-2020-14383: s4/dns: do not crash when additional data not
|
||||||
|
found
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: text/plain; charset=utf8
|
||||||
|
Content-Transfer-Encoding: 8bit
|
||||||
|
|
||||||
|
Found by Francis Brosnan Blázquez <francis@aspl.es>.
|
||||||
|
|
||||||
|
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14472
|
||||||
|
BUG: https://bugzilla.samba.org/show_bug.cgi?id=12795
|
||||||
|
|
||||||
|
Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
|
||||||
|
Reviewed-by: Jeremy Allison <jra@samba.org>
|
||||||
|
|
||||||
|
Autobuild-User(master): Douglas Bagnall <dbagnall@samba.org>
|
||||||
|
Autobuild-Date(master): Mon Aug 24 00:21:41 UTC 2020 on sn-devel-184
|
||||||
|
|
||||||
|
(based on commit df98e7db04c901259dd089e20cd557bdbdeaf379)
|
||||||
|
---
|
||||||
|
source4/rpc_server/dnsserver/dcerpc_dnsserver.c | 7 ++++---
|
||||||
|
1 file changed, 4 insertions(+), 3 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/source4/rpc_server/dnsserver/dcerpc_dnsserver.c b/source4/rpc_server/dnsserver/dcerpc_dnsserver.c
|
||||||
|
index ec610168266..88efc01f154 100644
|
||||||
|
--- a/source4/rpc_server/dnsserver/dcerpc_dnsserver.c
|
||||||
|
+++ b/source4/rpc_server/dnsserver/dcerpc_dnsserver.c
|
||||||
|
@@ -1859,8 +1859,8 @@ static WERROR dnsserver_enumerate_records(struct dnsserver_state *dsstate,
|
||||||
|
/* Add any additional records */
|
||||||
|
if (select_flag & DNS_RPC_VIEW_ADDITIONAL_DATA) {
|
||||||
|
for (i=0; i<add_count; i++) {
|
||||||
|
- struct dnsserver_zone *z2;
|
||||||
|
-
|
||||||
|
+ struct dnsserver_zone *z2 = NULL;
|
||||||
|
+ struct ldb_message *msg = NULL;
|
||||||
|
/* Search all the available zones for additional name */
|
||||||
|
for (z2 = dsstate->zones; z2; z2 = z2->next) {
|
||||||
|
char *encoded_name;
|
||||||
|
@@ -1877,6 +1877,7 @@ static WERROR dnsserver_enumerate_records(struct dnsserver_state *dsstate,
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
if (res->count == 1) {
|
||||||
|
+ msg = res->msgs[0];
|
||||||
|
break;
|
||||||
|
} else {
|
||||||
|
TALLOC_FREE(res);
|
||||||
|
@@ -1892,7 +1893,7 @@ static WERROR dnsserver_enumerate_records(struct dnsserver_state *dsstate,
|
||||||
|
}
|
||||||
|
status = dns_fill_records_array(tmp_ctx, NULL, DNS_TYPE_A,
|
||||||
|
select_flag, rname,
|
||||||
|
- res->msgs[0], 0, recs,
|
||||||
|
+ msg, 0, recs,
|
||||||
|
NULL, NULL);
|
||||||
|
TALLOC_FREE(rname);
|
||||||
|
TALLOC_FREE(res);
|
||||||
|
--
|
||||||
|
2.29.2
|
||||||
159
CVE-2020-14318.patch
Normal file
159
CVE-2020-14318.patch
Normal file
@ -0,0 +1,159 @@
|
|||||||
|
From 5dd4c789c13035b805fdd2c3a9c38721657b05b3 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Jeremy Allison <jra@samba.org>
|
||||||
|
Date: Tue, 7 Jul 2020 18:25:23 -0700
|
||||||
|
Subject: [PATCH] s3: smbd: Ensure change notifies can't get set unless the
|
||||||
|
directory handle is open for SEC_DIR_LIST.
|
||||||
|
|
||||||
|
Remove knownfail entry.
|
||||||
|
|
||||||
|
CVE-2020-14318
|
||||||
|
|
||||||
|
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14434
|
||||||
|
|
||||||
|
Signed-off-by: Jeremy Allison <jra@samba.org>
|
||||||
|
---
|
||||||
|
source3/smbd/notify.c | 8 ++++++++
|
||||||
|
|
||||||
|
1 files changed, 8 insertions(+)
|
||||||
|
delete mode 100644 selftest/knownfail.d/smb2_notify_handle_permissions
|
||||||
|
|
||||||
|
diff --git a/source3/smbd/notify.c b/source3/smbd/notify.c
|
||||||
|
index eb6317b7e8a..5f18b5cf794 100644
|
||||||
|
--- a/source3/smbd/notify.c
|
||||||
|
+++ b/source3/smbd/notify.c
|
||||||
|
@@ -289,6 +289,14 @@ NTSTATUS change_notify_create(struct files_struct *fsp,
|
||||||
|
char fullpath[len+1];
|
||||||
|
NTSTATUS status = NT_STATUS_NOT_IMPLEMENTED;
|
||||||
|
|
||||||
|
+ /*
|
||||||
|
+ * Setting a changenotify needs READ/LIST access
|
||||||
|
+ * on the directory handle.
|
||||||
|
+ */
|
||||||
|
+ if (!(fsp->access_mask & SEC_DIR_LIST)) {
|
||||||
|
+ return NT_STATUS_ACCESS_DENIED;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
if (fsp->notify != NULL) {
|
||||||
|
DEBUG(1, ("change_notify_create: fsp->notify != NULL, "
|
||||||
|
"fname = %s\n", fsp->fsp_name->base_name));
|
||||||
|
--
|
||||||
|
2.29.2
|
||||||
|
|
||||||
|
|
||||||
|
From 22528b76ed6eb6251fdf01875aaa955480e7663d Mon Sep 17 00:00:00 2001
|
||||||
|
From: Jeremy Allison <jra@samba.org>
|
||||||
|
Date: Fri, 10 Jul 2020 15:09:33 -0700
|
||||||
|
Subject: [PATCH] s4: torture: Add smb2.notify.handle-permissions test.
|
||||||
|
|
||||||
|
Add knownfail entry.
|
||||||
|
|
||||||
|
CVE-2020-14318
|
||||||
|
|
||||||
|
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14434
|
||||||
|
|
||||||
|
Signed-off-by: Jeremy Allison <jra@samba.org>
|
||||||
|
---
|
||||||
|
source4/torture/smb2/notify.c | 80 +++++++++++++++++++
|
||||||
|
1 files changed, 80 insertions(+)
|
||||||
|
create mode 100644 selftest/knownfail.d/smb2_notify_handle_permissions
|
||||||
|
|
||||||
|
diff --git a/source4/torture/smb2/notify.c b/source4/torture/smb2/notify.c
|
||||||
|
index b65c116b75e..6081d394c6e 100644
|
||||||
|
--- a/source4/torture/smb2/notify.c
|
||||||
|
+++ b/source4/torture/smb2/notify.c
|
||||||
|
@@ -2649,6 +2649,83 @@ done:
|
||||||
|
return ok;
|
||||||
|
}
|
||||||
|
|
||||||
|
+/*
|
||||||
|
+ Test asking for a change notify on a handle without permissions.
|
||||||
|
+*/
|
||||||
|
+
|
||||||
|
+#define BASEDIR_HPERM BASEDIR "_HPERM"
|
||||||
|
+
|
||||||
|
+static bool torture_smb2_notify_handle_permissions(
|
||||||
|
+ struct torture_context *torture,
|
||||||
|
+ struct smb2_tree *tree)
|
||||||
|
+{
|
||||||
|
+ bool ret = true;
|
||||||
|
+ NTSTATUS status;
|
||||||
|
+ union smb_notify notify;
|
||||||
|
+ union smb_open io;
|
||||||
|
+ struct smb2_handle h1 = {{0}};
|
||||||
|
+ struct smb2_request *req;
|
||||||
|
+
|
||||||
|
+ smb2_deltree(tree, BASEDIR_HPERM);
|
||||||
|
+ smb2_util_rmdir(tree, BASEDIR_HPERM);
|
||||||
|
+
|
||||||
|
+ torture_comment(torture,
|
||||||
|
+ "TESTING CHANGE NOTIFY "
|
||||||
|
+ "ON A HANDLE WITHOUT PERMISSIONS\n");
|
||||||
|
+
|
||||||
|
+ /*
|
||||||
|
+ get a handle on the directory
|
||||||
|
+ */
|
||||||
|
+ ZERO_STRUCT(io.smb2);
|
||||||
|
+ io.generic.level = RAW_OPEN_SMB2;
|
||||||
|
+ io.smb2.in.create_flags = 0;
|
||||||
|
+ io.smb2.in.desired_access = SEC_FILE_READ_ATTRIBUTE;
|
||||||
|
+ io.smb2.in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
|
||||||
|
+ io.smb2.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
|
||||||
|
+ io.smb2.in.share_access = NTCREATEX_SHARE_ACCESS_READ |
|
||||||
|
+ NTCREATEX_SHARE_ACCESS_WRITE;
|
||||||
|
+ io.smb2.in.alloc_size = 0;
|
||||||
|
+ io.smb2.in.create_disposition = NTCREATEX_DISP_CREATE;
|
||||||
|
+ io.smb2.in.impersonation_level = SMB2_IMPERSONATION_ANONYMOUS;
|
||||||
|
+ io.smb2.in.security_flags = 0;
|
||||||
|
+ io.smb2.in.fname = BASEDIR_HPERM;
|
||||||
|
+
|
||||||
|
+ status = smb2_create(tree, torture, &io.smb2);
|
||||||
|
+ CHECK_STATUS(status, NT_STATUS_OK);
|
||||||
|
+ h1 = io.smb2.out.file.handle;
|
||||||
|
+
|
||||||
|
+ /* ask for a change notify,
|
||||||
|
+ on file or directory name changes */
|
||||||
|
+ ZERO_STRUCT(notify.smb2);
|
||||||
|
+ notify.smb2.level = RAW_NOTIFY_SMB2;
|
||||||
|
+ notify.smb2.in.buffer_size = 1000;
|
||||||
|
+ notify.smb2.in.completion_filter = FILE_NOTIFY_CHANGE_NAME;
|
||||||
|
+ notify.smb2.in.file.handle = h1;
|
||||||
|
+ notify.smb2.in.recursive = true;
|
||||||
|
+
|
||||||
|
+ req = smb2_notify_send(tree, ¬ify.smb2);
|
||||||
|
+ torture_assert_goto(torture,
|
||||||
|
+ req != NULL,
|
||||||
|
+ ret,
|
||||||
|
+ done,
|
||||||
|
+ "smb2_notify_send failed\n");
|
||||||
|
+
|
||||||
|
+ /*
|
||||||
|
+ * Cancel it, we don't really want to wait.
|
||||||
|
+ */
|
||||||
|
+ smb2_cancel(req);
|
||||||
|
+ status = smb2_notify_recv(req, torture, ¬ify.smb2);
|
||||||
|
+ /* Handle h1 doesn't have permissions for ChangeNotify. */
|
||||||
|
+ CHECK_STATUS(status, NT_STATUS_ACCESS_DENIED);
|
||||||
|
+
|
||||||
|
+done:
|
||||||
|
+ if (!smb2_util_handle_empty(h1)) {
|
||||||
|
+ smb2_util_close(tree, h1);
|
||||||
|
+ }
|
||||||
|
+ smb2_deltree(tree, BASEDIR_HPERM);
|
||||||
|
+ return ret;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
/*
|
||||||
|
basic testing of SMB2 change notify
|
||||||
|
*/
|
||||||
|
@@ -2682,6 +2759,9 @@ struct torture_suite *torture_smb2_notify_init(TALLOC_CTX *ctx)
|
||||||
|
torture_smb2_notify_rmdir3);
|
||||||
|
torture_suite_add_2smb2_test(suite, "rmdir4",
|
||||||
|
torture_smb2_notify_rmdir4);
|
||||||
|
+ torture_suite_add_1smb2_test(suite,
|
||||||
|
+ "handle-permissions",
|
||||||
|
+ torture_smb2_notify_handle_permissions);
|
||||||
|
|
||||||
|
suite->description = talloc_strdup(suite, "SMB2-NOTIFY tests");
|
||||||
|
|
||||||
|
--
|
||||||
|
2.29.2
|
||||||
97
CVE-2020-14323.patch
Normal file
97
CVE-2020-14323.patch
Normal file
@ -0,0 +1,97 @@
|
|||||||
|
From 595dd9fc4162dd70ad937db8669a0fddbbba9584 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Volker Lendecke <vl@samba.org>
|
||||||
|
Date: Thu, 9 Jul 2020 21:49:25 +0200
|
||||||
|
Subject: [PATCH] CVE-2020-14323 winbind: Fix invalid lookupsids DoS
|
||||||
|
|
||||||
|
A lookupsids request without extra_data will lead to "state->domain==NULL",
|
||||||
|
which makes winbindd_lookupsids_recv trying to dereference it.
|
||||||
|
|
||||||
|
Reported by Bas Alberts of the GitHub Security Lab Team as GHSL-2020-134
|
||||||
|
|
||||||
|
Bug: https://bugzilla.samba.org/show_bug.cgi?id=14436
|
||||||
|
Signed-off-by: Volker Lendecke <vl@samba.org>
|
||||||
|
---
|
||||||
|
source3/winbindd/winbindd_lookupsids.c | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/source3/winbindd/winbindd_lookupsids.c b/source3/winbindd/winbindd_lookupsids.c
|
||||||
|
index d28b5fa9f01..a289fd86f0f 100644
|
||||||
|
--- a/source3/winbindd/winbindd_lookupsids.c
|
||||||
|
+++ b/source3/winbindd/winbindd_lookupsids.c
|
||||||
|
@@ -47,7 +47,7 @@ struct tevent_req *winbindd_lookupsids_send(TALLOC_CTX *mem_ctx,
|
||||||
|
DEBUG(3, ("lookupsids\n"));
|
||||||
|
|
||||||
|
if (request->extra_len == 0) {
|
||||||
|
- tevent_req_done(req);
|
||||||
|
+ tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
||||||
|
return tevent_req_post(req, ev);
|
||||||
|
}
|
||||||
|
if (request->extra_data.data[request->extra_len-1] != '\0') {
|
||||||
|
--
|
||||||
|
2.29.2
|
||||||
|
|
||||||
|
From 0b259a48a70bde4dfd482e0720e593ae5a9c414a Mon Sep 17 00:00:00 2001
|
||||||
|
From: Volker Lendecke <vl@samba.org>
|
||||||
|
Date: Thu, 9 Jul 2020 21:48:57 +0200
|
||||||
|
Subject: [PATCH] CVE-2020-14323 torture4: Add a simple test for invalid
|
||||||
|
lookup_sids winbind call
|
||||||
|
|
||||||
|
We can't add this test before the fix, add it to knownfail and have the fix
|
||||||
|
remove the knownfail entry again. As this crashes winbind, many tests after
|
||||||
|
this one will fail.
|
||||||
|
|
||||||
|
Reported by Bas Alberts of the GitHub Security Lab Team as GHSL-2020-134
|
||||||
|
|
||||||
|
Bug: https://bugzilla.samba.org/show_bug.cgi?id=14436
|
||||||
|
Signed-off-by: Volker Lendecke <vl@samba.org>
|
||||||
|
---
|
||||||
|
source4/torture/winbind/struct_based.c | 27 ++++++++++++++++++++++++++
|
||||||
|
1 file changed, 27 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/source4/torture/winbind/struct_based.c b/source4/torture/winbind/struct_based.c
|
||||||
|
index 9745b621ca9..71f248c0d61 100644
|
||||||
|
--- a/source4/torture/winbind/struct_based.c
|
||||||
|
+++ b/source4/torture/winbind/struct_based.c
|
||||||
|
@@ -1110,6 +1110,29 @@ static bool torture_winbind_struct_lookup_name_sid(struct torture_context *tortu
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
+static bool torture_winbind_struct_lookup_sids_invalid(
|
||||||
|
+ struct torture_context *torture)
|
||||||
|
+{
|
||||||
|
+ struct winbindd_request req = {0};
|
||||||
|
+ struct winbindd_response rep = {0};
|
||||||
|
+ bool strict = torture_setting_bool(torture, "strict mode", false);
|
||||||
|
+ bool ok;
|
||||||
|
+
|
||||||
|
+ torture_comment(torture,
|
||||||
|
+ "Running WINBINDD_LOOKUP_SIDS (struct based)\n");
|
||||||
|
+
|
||||||
|
+ ok = true;
|
||||||
|
+ DO_STRUCT_REQ_REP_EXT(WINBINDD_LOOKUPSIDS, &req, &rep,
|
||||||
|
+ NSS_STATUS_NOTFOUND,
|
||||||
|
+ strict,
|
||||||
|
+ ok=false,
|
||||||
|
+ talloc_asprintf(
|
||||||
|
+ torture,
|
||||||
|
+ "invalid lookupsids succeeded"));
|
||||||
|
+
|
||||||
|
+ return ok;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
struct torture_suite *torture_winbind_struct_init(TALLOC_CTX *ctx)
|
||||||
|
{
|
||||||
|
struct torture_suite *suite = torture_suite_create(ctx, "struct");
|
||||||
|
@@ -1132,6 +1155,10 @@ struct torture_suite *torture_winbind_struct_init(TALLOC_CTX *ctx)
|
||||||
|
torture_suite_add_simple_test(suite, "getpwent", torture_winbind_struct_getpwent);
|
||||||
|
torture_suite_add_simple_test(suite, "endpwent", torture_winbind_struct_endpwent);
|
||||||
|
torture_suite_add_simple_test(suite, "lookup_name_sid", torture_winbind_struct_lookup_name_sid);
|
||||||
|
+ torture_suite_add_simple_test(
|
||||||
|
+ suite,
|
||||||
|
+ "lookup_sids_invalid",
|
||||||
|
+ torture_winbind_struct_lookup_sids_invalid);
|
||||||
|
|
||||||
|
suite->description = talloc_strdup(suite, "WINBIND - struct based protocol tests");
|
||||||
|
|
||||||
|
--
|
||||||
|
2.29.2
|
||||||
12
samba.spec
12
samba.spec
@ -49,7 +49,7 @@
|
|||||||
|
|
||||||
Name: samba
|
Name: samba
|
||||||
Version: 4.12.5
|
Version: 4.12.5
|
||||||
Release: 2
|
Release: 3
|
||||||
|
|
||||||
Summary: A suite for Linux to interoperate with Windows
|
Summary: A suite for Linux to interoperate with Windows
|
||||||
License: GPLv3+ and LGPLv3+
|
License: GPLv3+ and LGPLv3+
|
||||||
@ -67,6 +67,10 @@ Source7: samba.pamd
|
|||||||
Source201: README.downgrade
|
Source201: README.downgrade
|
||||||
|
|
||||||
Patch0: CVE-2020-1472.patch
|
Patch0: CVE-2020-1472.patch
|
||||||
|
Patch1: 0001-CVE-2020-14383.patch
|
||||||
|
Patch2: 0002-CVE-2020-14383.patch
|
||||||
|
Patch3: CVE-2020-14318.patch
|
||||||
|
Patch4: CVE-2020-14323.patch
|
||||||
|
|
||||||
BuildRequires: avahi-devel bison cups-devel dbus-devel docbook-style-xsl e2fsprogs-devel flex gawk gnupg2 gnutls-devel >= 3.4.7 gpgme-devel
|
BuildRequires: avahi-devel bison cups-devel dbus-devel docbook-style-xsl e2fsprogs-devel flex gawk gnupg2 gnutls-devel >= 3.4.7 gpgme-devel
|
||||||
BuildRequires: jansson-devel krb5-devel >= %{required_mit_krb5} libacl-devel libaio-devel libarchive-devel libattr-devel
|
BuildRequires: jansson-devel krb5-devel >= %{required_mit_krb5} libacl-devel libaio-devel libarchive-devel libattr-devel
|
||||||
@ -3087,6 +3091,12 @@ fi
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Sat Mar 27 2021 seuzw <930zhaowei@163.com> - 4.12.5-3
|
||||||
|
- Type:cves
|
||||||
|
- Id:CVE-2020-14318 CVE-2020-14323 CVE-2020-14383
|
||||||
|
- SUG:NA
|
||||||
|
- DESC:fix CVE-2020-14318 CVE-2020-14323 CVE-2020-14383
|
||||||
|
|
||||||
* Fri Sep 25 2020 liulong <liulong20@huawei.com> - 4.12.5-2
|
* Fri Sep 25 2020 liulong <liulong20@huawei.com> - 4.12.5-2
|
||||||
- Type:cves
|
- Type:cves
|
||||||
- Id:CVE-2020-1472
|
- Id:CVE-2020-1472
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user