Changeset 593
- Timestamp:
- Jul 1, 2011, 10:18:23 AM (14 years ago)
- Location:
- trunk/server
- Files:
-
- 23 edited
Legend:
- Unmodified
- Added
- Removed
-
TabularUnified trunk/server/WHATSNEW.txt ¶
r590 r593 1 ============================= 2 Release Notes for Samba 3.5.7 3 February 28, 2011 4 ============================= 5 6 7 This is a security release in order to address CVE-2011-0719. 8 9 10 o CVE-2011-0719: 11 All current released versions of Samba are vulnerable to 12 a denial of service caused by memory corruption. Range 13 checks on file descriptors being used in the FD_SET macro 14 were not present allowing stack corruption. This can cause 15 the Samba code to crash or to loop attempting to select 16 on a bad file descriptor set. 17 18 19 Changes since 3.5.6: 20 -------------------- 21 22 23 o Jeremy Allison <jra@samba.org> 24 * BUG 7949: Fix DoS in Winbind and smbd with many file descriptors open. 25 26 27 ###################################################################### 28 Reporting bugs & Development Discussion 29 ####################################### 30 31 Please discuss this release on the samba-technical mailing list or by 32 joining the #samba-technical IRC channel on irc.freenode.net. 33 34 If you do report problems then please try to send high quality 35 feedback. If you don't provide vital information to help us track down 36 the problem then you will probably be ignored. All bug reports should 37 be filed under the Samba 3.5 product in the project's Bugzilla 38 database (https://bugzilla.samba.org/). 39 40 41 ====================================================================== 42 == Our Code, Our Bugs, Our Responsibility. 43 == The Samba Team 44 ====================================================================== 45 46 47 Release notes for older releases follow: 48 ---------------------------------------- 49 1 50 ============================= 2 51 Release Notes for Samba 3.5.6 … … 95 144 96 145 97 Release notes for older releases follow: 98 ---------------------------------------- 146 ---------------------------------------------------------------------- 147 99 148 100 149 ============================= -
TabularUnified trunk/server/lib/tevent/tevent_select.c ¶
r414 r593 112 112 struct tevent_fd *fde; 113 113 114 if (fd < 0 || fd >= FD_SETSIZE) { 115 errno = EBADF; 116 return NULL; 117 } 118 114 119 fde = tevent_common_add_fd(ev, mem_ctx, fd, flags, 115 120 handler, private_data, … … 144 149 /* setup any fd events */ 145 150 for (fde = select_ev->ev->fd_events; fde; fde = fde->next) { 151 if (fde->fd < 0 || fde->fd >= FD_SETSIZE) { 152 errno = EBADF; 153 return -1; 154 } 155 146 156 if (fde->flags & TEVENT_FD_READ) { 147 157 FD_SET(fde->fd, &r_fds); -
TabularUnified trunk/server/lib/tevent/tevent_standard.c ¶
r414 r593 458 458 /* setup any fd events */ 459 459 for (fde = std_ev->ev->fd_events; fde; fde = fde->next) { 460 if (fde->fd < 0 || fde->fd >= FD_SETSIZE) { 461 std_ev->exit_code = EBADF; 462 return -1; 463 } 464 460 465 if (fde->flags & TEVENT_FD_READ) { 461 466 FD_SET(fde->fd, &r_fds); -
TabularUnified trunk/server/nsswitch/libwbclient/wbc_async.c ¶
r414 r593 510 510 int selret; 511 511 512 if (fd == -1) {512 if (fd < 0 || fd >= FD_SETSIZE) { 513 513 return true; 514 514 } -
TabularUnified trunk/server/nsswitch/wb_common.c ¶
r590 r593 245 245 case EINPROGRESS: 246 246 FD_ZERO(&w_fds); 247 if (fd < 0 || fd >= FD_SETSIZE) { 248 errno = EBADF; 249 goto error_out; 250 } 247 251 FD_SET(fd, &w_fds); 248 252 tv.tv_sec = CONNECT_TIMEOUT - wait_time; … … 392 396 393 397 FD_ZERO(&r_fds); 398 if (winbindd_fd < 0 || winbindd_fd >= FD_SETSIZE) { 399 errno = EBADF; 400 winbind_close_sock(); 401 return -1; 402 } 394 403 FD_SET(winbindd_fd, &r_fds); 395 404 ZERO_STRUCT(tv); … … 452 461 453 462 FD_ZERO(&r_fds); 463 if (winbindd_fd < 0 || winbindd_fd >= FD_SETSIZE) { 464 errno = EBADF; 465 winbind_close_sock(); 466 return -1; 467 } 454 468 FD_SET(winbindd_fd, &r_fds); 455 469 ZERO_STRUCT(tv); -
TabularUnified trunk/server/packaging/RHEL-CTDB/samba.spec ¶
r590 r593 6 6 Packager: Samba Team <samba@samba.org> 7 7 Name: samba 8 Version: 3.5. 68 Version: 3.5.7 9 9 Release: 1GITHASH 10 10 Epoch: 0 -
TabularUnified trunk/server/packaging/RHEL/makerpms.sh ¶
r590 r593 21 21 USERID=`id -u` 22 22 GRPID=`id -g` 23 VERSION='3.5. 6'23 VERSION='3.5.7' 24 24 REVISION='' 25 25 SPECFILE="samba.spec" -
TabularUnified trunk/server/packaging/RHEL/samba.spec ¶
r590 r593 6 6 Packager: Samba Team <samba@samba.org> 7 7 Name: samba 8 Version: 3.5. 68 Version: 3.5.7 9 9 Release: 1 10 10 Epoch: 0 -
TabularUnified trunk/server/source3/VERSION ¶
r590 r593 26 26 SAMBA_VERSION_MAJOR=3 27 27 SAMBA_VERSION_MINOR=5 28 SAMBA_VERSION_RELEASE= 628 SAMBA_VERSION_RELEASE=7 29 29 30 30 ######################################################## -
TabularUnified trunk/server/source3/build.options ¶
r454 r593 1 1 MAKE="" 2 2 LIBC="064X" 3 BRAND=" YES"3 BRAND="NO" -
TabularUnified trunk/server/source3/client/client.c ¶
r414 r593 4421 4421 again: 4422 4422 4423 if (cli->fd == -1) 4423 if (cli->fd < 0 || cli->fd >= FD_SETSIZE) { 4424 errno = EBADF; 4424 4425 return; 4426 } 4425 4427 4426 4428 FD_ZERO(&fds); -
TabularUnified trunk/server/source3/client/dnsbrowse.c ¶
r414 r593 80 80 if (fdset != NULL) { 81 81 TALLOC_FREE(fdset); 82 } 83 84 if (mdnsfd < 0 || mdnsfd >= FD_SETSIZE) { 85 errno = EBADF; 86 break; 82 87 } 83 88 … … 182 187 } 183 188 189 if (mdnsfd < 0 || mdnsfd >= FD_SETSIZE) { 190 errno = EBADF; 191 TALLOC_FREE(ctx); 192 return 1; 193 } 194 184 195 fdsetsz = howmany(mdnsfd + 1, NFDBITS) * sizeof(fd_mask); 185 196 fdset = TALLOC_ZERO(ctx, fdsetsz); -
TabularUnified trunk/server/source3/lib/events.c ¶
r429 r593 56 56 57 57 for (fde = ev->fd_events; fde; fde = fde->next) { 58 if (fde->fd < 0 || fde->fd >= FD_SETSIZE) { 59 /* We ignore here, as it shouldn't be 60 possible to add an invalid fde->fd 61 but we don't want FD_SET to see an 62 invalid fd. */ 63 continue; 64 } 65 58 66 if (fde->flags & EVENT_FD_READ) { 59 67 FD_SET(fde->fd, read_fds); -
TabularUnified trunk/server/source3/lib/g_lock.c ¶
r454 r593 392 392 FD_ZERO(r_fds); 393 393 max_fd = ctdbd_conn_get_fd(conn); 394 FD_SET(max_fd, r_fds); 394 if (max_fd >= 0 && max_fd < FD_SETSIZE) { 395 FD_SET(max_fd, r_fds); 396 } 395 397 } 396 398 #endif -
TabularUnified trunk/server/source3/lib/packet.c ¶
r414 r593 108 108 fd_set r_fds; 109 109 110 if (ctx->fd < 0 || ctx->fd >= FD_SETSIZE) { 111 errno = EBADF; 112 return map_nt_error_from_unix(errno); 113 } 114 110 115 FD_ZERO(&r_fds); 111 116 FD_SET(ctx->fd, &r_fds); -
TabularUnified trunk/server/source3/lib/readline.c ¶
r454 r593 92 92 timeout.tv_usec = 0; 93 93 94 if (fd < 0 || fd >= FD_SETSIZE) { 95 errno = EBADF; 96 break; 97 } 98 94 99 FD_ZERO(&fds); 95 100 FD_SET(fd,&fds); -
TabularUnified trunk/server/source3/lib/select.c ¶
r465 r593 80 80 } 81 81 82 if (select_pipe[0] < 0 || select_pipe[0] >= FD_SETSIZE) { 83 DEBUG(0, ("sys_select: bad fd\n")); 84 if (readfds != NULL) 85 FD_ZERO(readfds); 86 if (writefds != NULL) 87 FD_ZERO(writefds); 88 if (errorfds != NULL) 89 FD_ZERO(errorfds); 90 errno = EBADF; 91 return -1; 92 } 82 93 /* 83 94 * These next two lines seem to fix a bug with the Linux … … 106 117 FD_ZERO(readfds2); 107 118 } 119 108 120 FD_SET(select_pipe[0], readfds2); 109 121 -
TabularUnified trunk/server/source3/lib/util_sock.c ¶
r454 r593 496 496 497 497 for (nread=0; nread < mincnt; ) { 498 if (fd < 0 || fd >= FD_SETSIZE) { 499 errno = EBADF; 500 return map_nt_error_from_unix(EBADF); 501 } 502 498 503 FD_ZERO(&fds); 499 504 FD_SET(fd,&fds); … … 1236 1241 for (i=0; i<num_addrs; i++) { 1237 1242 sockets[i] = socket(addrs[i].ss_family, SOCK_STREAM, 0); 1238 if (sockets[i] < 0 )1243 if (sockets[i] < 0 || sockets[i] >= FD_SETSIZE) 1239 1244 goto done; 1240 1245 set_blocking(sockets[i], false); … … 1285 1290 1286 1291 for (i=0; i<num_addrs; i++) { 1287 if (sockets[i] == -1) 1292 if (sockets[i] < 0 || sockets[i] >= FD_SETSIZE) { 1293 /* This cannot happen - ignore if so. */ 1288 1294 continue; 1295 } 1289 1296 FD_SET(sockets[i], &wr_fds); 1290 1297 FD_SET(sockets[i], &r_fds); … … 1306 1313 for (i=0; i<num_addrs; i++) { 1307 1314 1308 if (sockets[i] == -1) 1315 if (sockets[i] < 0 || sockets[i] >= FD_SETSIZE) { 1316 /* This cannot happen - ignore if so. */ 1309 1317 continue; 1318 } 1310 1319 1311 1320 /* Stevens, Network Programming says that if there's a -
TabularUnified trunk/server/source3/libaddns/dnssock.c ¶
r414 r593 220 220 int fd_ready; 221 221 222 if (fd < 0 || fd >= FD_SETSIZE) { 223 /* read timeout */ 224 return ERROR_DNS_SOCKET_ERROR; 225 } 226 222 227 FD_ZERO( &rfds ); 223 228 FD_SET( fd, &rfds ); -
TabularUnified trunk/server/source3/libsmb/nmblib.c ¶
r590 r593 1095 1095 int ret; 1096 1096 1097 if (fd < 0 || fd >= FD_SETSIZE) { 1098 errno = EBADF; 1099 return NULL; 1100 } 1101 1097 1102 FD_ZERO(&fds); 1098 1103 FD_SET(fd,&fds); -
TabularUnified trunk/server/source3/nmbd/nmbd_packets.c ¶
r414 r593 1697 1697 count *= 4; 1698 1698 1699 if(count > FD_SETSIZE) {1699 if(count >= FD_SETSIZE) { 1700 1700 DEBUG(0,("create_listen_fdset: Too many file descriptors needed (%d). We can \ 1701 1701 only use %d.\n", count, FD_SETSIZE)); … … 1713 1713 1714 1714 /* Add in the lp_socket_address() interface on 137. */ 1715 if (ClientNMB < 0 || ClientNMB >= FD_SETSIZE) { 1716 errno = EBADF; 1717 SAFE_FREE(pset); 1718 return True; 1719 } 1720 1715 1721 FD_SET(ClientNMB,pset); 1716 1722 sock_array[num++] = ClientNMB; … … 1722 1728 /* Add in the 137 sockets on all the interfaces. */ 1723 1729 for (subrec = FIRST_SUBNET; subrec; subrec = NEXT_SUBNET_EXCLUDING_UNICAST(subrec)) { 1730 if (subrec->nmb_sock < 0 || subrec->nmb_sock >= FD_SETSIZE) { 1731 /* We have to ignore sockets outside FD_SETSIZE. */ 1732 continue; 1733 } 1724 1734 FD_SET(subrec->nmb_sock,pset); 1725 1735 sock_array[num++] = subrec->nmb_sock; 1726 1736 *maxfd = MAX( *maxfd, subrec->nmb_sock); 1727 1737 1738 if (subrec->nmb_bcast < 0 || subrec->nmb_bcast >= FD_SETSIZE) { 1739 /* We have to ignore sockets outside FD_SETSIZE. */ 1740 continue; 1741 } 1728 1742 sock_array[num++] = subrec->nmb_bcast; 1729 if (subrec->nmb_bcast != -1) { 1730 FD_SET(subrec->nmb_bcast,pset); 1731 *maxfd = MAX( *maxfd, subrec->nmb_bcast); 1732 } 1743 FD_SET(subrec->nmb_bcast,pset); 1744 *maxfd = MAX( *maxfd, subrec->nmb_bcast); 1733 1745 } 1734 1746 1735 1747 /* Add in the lp_socket_address() interface on 138. */ 1748 if (ClientDGRAM < 0 || ClientDGRAM >= FD_SETSIZE) { 1749 errno = EBADF; 1750 SAFE_FREE(pset); 1751 return True; 1752 } 1736 1753 FD_SET(ClientDGRAM,pset); 1737 1754 sock_array[num++] = ClientDGRAM; … … 1743 1760 /* Add in the 138 sockets on all the interfaces. */ 1744 1761 for (subrec = FIRST_SUBNET; subrec; subrec = NEXT_SUBNET_EXCLUDING_UNICAST(subrec)) { 1762 if (subrec->dgram_sock < 0 || subrec->dgram_sock >= FD_SETSIZE) { 1763 /* We have to ignore sockets outside FD_SETSIZE. */ 1764 continue; 1765 } 1745 1766 FD_SET(subrec->dgram_sock,pset); 1746 1767 sock_array[num++] = subrec->dgram_sock; 1747 1768 *maxfd = MAX( *maxfd, subrec->dgram_sock); 1748 1769 1770 if (subrec->dgram_bcast < 0 || subrec->dgram_bcast >= FD_SETSIZE) { 1771 /* We have to ignore sockets outside FD_SETSIZE. */ 1772 continue; 1773 } 1749 1774 sock_array[num++] = subrec->dgram_bcast; 1750 1775 if (subrec->dgram_bcast != -1) { … … 1877 1902 #ifndef SYNC_DNS 1878 1903 dns_fd = asyncdns_fd(); 1879 if (dns_fd != -1) {1904 if (dns_fd >= 0 && dns_fd < FD_SETSIZE) { 1880 1905 FD_SET(dns_fd, &r_fds); 1881 1906 maxfd = MAX( maxfd, dns_fd); -
TabularUnified trunk/server/source3/utils/smbfilter.c ¶
r590 r593 194 194 195 195 FD_ZERO(&fds); 196 if (s != -1) FD_SET(s, &fds);197 if (c != -1) FD_SET(c, &fds);196 if (s >= 0 && s < FD_SETSIZE) FD_SET(s, &fds); 197 if (c >= 0 && c < FD_SETSIZE) FD_SET(c, &fds); 198 198 199 199 num = sys_select_intr(MAX(s+1, c+1),&fds,NULL,NULL,NULL); … … 268 268 269 269 FD_ZERO(&fds); 270 if (s < 0 || s >= FD_SETSIZE) { 271 break; 272 } 270 273 FD_SET(s, &fds); 271 274 -
TabularUnified trunk/server/source3/winbindd/winbindd_dual.c ¶
r480 r593 1461 1461 FD_ZERO(&r_fds); 1462 1462 FD_ZERO(&w_fds); 1463 1464 if (state.sock < 0 || state.sock >= FD_SETSIZE) { 1465 TALLOC_FREE(frame); 1466 perror("EBADF"); 1467 _exit(1); 1468 } 1469 1463 1470 FD_SET(state.sock, &r_fds); 1464 1471 maxfd = state.sock;
Note:
See TracChangeset
for help on using the changeset viewer.