The branch, v3-3-stable has been updated
       via  007f9c9... Revert "Fix bug #7067 - Linux asynchronous IO (aio) can 
cause smbd to fail to respond to a read or write."
       via  cb608fe... WHATSNEW: Prepare release notes for Samba 3.3.12.
       via  689fd1b... VERSION: Raise version number up to 3.3.12.
      from  adc7b06... WHATSNEW: Update changes since 3.3.10.

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=v3-3-stable


- Log -----------------------------------------------------------------
commit 007f9c90e952aeea2d8f73cff3ccd0f747a9c06e
Author: Karolin Seeger <ksee...@samba.org>
Date:   Mon Mar 8 21:08:36 2010 +0100

    Revert "Fix bug #7067 - Linux asynchronous IO (aio) can cause smbd to fail 
to respond to a read or write."
    
    This reverts commit 153357b9bb4d70a168c81cb9ff2da437eae823fc.
    
    This fixes bug #7222 (All users have full rigths on all shares) 
(CVE-2010-0728).

commit cb608fef71f9da629a1858cd1d6c8b19e27e6655
Author: Karolin Seeger <ksee...@samba.org>
Date:   Mon Mar 8 21:08:01 2010 +0100

    WHATSNEW: Prepare release notes for Samba 3.3.12.
    
    Karolin

commit 689fd1bd11806f92e9f5acbc634e27f7b197ee23
Author: Karolin Seeger <ksee...@samba.org>
Date:   Mon Mar 8 21:05:40 2010 +0100

    VERSION: Raise version number up to 3.3.12.
    
    Karolin

-----------------------------------------------------------------------

Summary of changes:
 WHATSNEW.txt         |   54 ++++++++++++++++++++++++++++++++++++++++-
 source/VERSION       |    2 +-
 source/include/smb.h |    3 +-
 source/lib/system.c  |   65 +++----------------------------------------------
 source/smbd/server.c |    8 ------
 5 files changed, 58 insertions(+), 74 deletions(-)


Changeset truncated at 500 lines:

diff --git a/WHATSNEW.txt b/WHATSNEW.txt
index 0d5d5f0..90a1960 100644
--- a/WHATSNEW.txt
+++ b/WHATSNEW.txt
@@ -1,4 +1,54 @@
                    ==============================
+                   Release Notes for Samba 3.3.12
+                           March 8, 2010
+                   ==============================
+
+
+This is a security release in order to address CVE-2010-0728.
+
+
+o  CVE-2010-0728:
+   In Samba releases 3.5.0, 3.4.6 and 3.3.11, new code
+   was added to fix a problem with Linux asynchronous IO handling.
+   This code introduced a bad security flaw on Linux platforms if the
+   binaries were built on Linux platforms with libcap support.
+   The flaw caused all smbd processes to inherit CAP_DAC_OVERRIDE
+   capabilities, allowing all file system access to be allowed
+   even when permissions should have denied access.
+
+
+Changes since 3.5.0
+-------------------
+
+
+o   Jeremy Allison <j...@samba.org>
+    * BUG 7222: Fix for CVE-2010-0728.
+
+
+######################################################################
+Reporting bugs & Development Discussion
+#######################################
+
+Please discuss this release on the samba-technical mailing list or by
+joining the #samba-technical IRC channel on irc.freenode.net.
+
+If you do report problems then please try to send high quality
+feedback. If you don't provide vital information to help us track down
+the problem then you will probably be ignored.  All bug reports should
+be filed under the Samba 3.3 product in the project's Bugzilla
+database (https://bugzilla.samba.org/).
+
+
+======================================================================
+== Our Code, Our Bugs, Our Responsibility.
+== The Samba Team
+======================================================================
+
+
+Release notes for older releases follow:
+----------------------------------------
+
+                   ==============================
                    Release Notes for Samba 3.3.11
                         February 26, 2010
                    ==============================
@@ -79,8 +129,8 @@ database (https://bugzilla.samba.org/).
 ======================================================================
 
 
-Release notes for older releases follow:
-----------------------------------------
+----------------------------------------------------------------------
+
 
                    ==============================
                    Release Notes for Samba 3.3.10
diff --git a/source/VERSION b/source/VERSION
index 29efdb3..01fc3b8 100644
--- a/source/VERSION
+++ b/source/VERSION
@@ -25,7 +25,7 @@
 ########################################################
 SAMBA_VERSION_MAJOR=3
 SAMBA_VERSION_MINOR=3
-SAMBA_VERSION_RELEASE=11
+SAMBA_VERSION_RELEASE=12
 
 ########################################################
 # Bug fix releases use a letter for the patch revision #
diff --git a/source/include/smb.h b/source/include/smb.h
index 3825c63..327f212 100644
--- a/source/include/smb.h
+++ b/source/include/smb.h
@@ -1684,8 +1684,7 @@ minimum length == 18.
 enum smbd_capability {
     KERNEL_OPLOCK_CAPABILITY,
     DMAPI_ACCESS_CAPABILITY,
-    LEASE_CAPABILITY,
-    KILL_CAPABILITY
+    LEASE_CAPABILITY
 };
 
 /* if a kernel does support oplocks then a structure of the following
diff --git a/source/lib/system.c b/source/lib/system.c
index fd18928..36745b1 100644
--- a/source/lib/system.c
+++ b/source/lib/system.c
@@ -705,11 +705,6 @@ int sys_chroot(const char *dname)
 
 #if defined(HAVE_POSIX_CAPABILITIES)
 
-/* This define hasn't made it into the glibc capabilities header yet. */
-#ifndef SECURE_NO_SETUID_FIXUP
-#define SECURE_NO_SETUID_FIXUP          2
-#endif
-
 /**************************************************************************
  Try and abstract process capabilities (for systems that have them).
 ****************************************************************************/
@@ -740,32 +735,6 @@ static bool set_process_capability(enum smbd_capability 
capability,
        }
 #endif
 
-#if defined(HAVE_PRCTL) && defined(PR_SET_SECUREBITS) && 
defined(SECURE_NO_SETUID_FIXUP)
-        /* New way of setting capabilities as "sticky". */
-
-       /*
-        * Use PR_SET_SECUREBITS to prevent setresuid()
-        * atomically dropping effective capabilities on
-        * uid change. Only available in Linux kernels
-        * 2.6.26 and above.
-        *
-        * See here:
-        * 
http://www.kernel.org/doc/man-pages/online/pages/man7/capabilities.7.html
-        * for details.
-        *
-        * Specifically the CAP_KILL capability we need
-        * to allow Linux threads under different euids
-        * to send signals to each other.
-        */
-
-       if (prctl(PR_SET_SECUREBITS, 1 << SECURE_NO_SETUID_FIXUP)) {
-               DEBUG(0,("set_process_capability: "
-                       "prctl PR_SET_SECUREBITS failed with error %s\n",
-                       strerror(errno) ));
-               return false;
-       }
-#endif
-
        cap = cap_get_proc();
        if (cap == NULL) {
                DEBUG(0,("set_process_capability: cap_get_proc failed: %s\n",
@@ -794,11 +763,6 @@ static bool set_process_capability(enum smbd_capability 
capability,
                        cap_vals[num_cap_vals++] = CAP_LEASE;
 #endif
                        break;
-               case KILL_CAPABILITY:
-#ifdef CAP_KILL
-                       cap_vals[num_cap_vals++] = CAP_KILL;
-#endif
-                       break;
        }
 
        SMB_ASSERT(num_cap_vals <= ARRAY_SIZE(cap_vals));
@@ -808,37 +772,16 @@ static bool set_process_capability(enum smbd_capability 
capability,
                return True;
        }
 
-       /*
-        * Ensure the capability is effective. We assume that as a root
-        * process it's always permitted.
-        */
-
-       if (cap_set_flag(cap, CAP_EFFECTIVE, num_cap_vals, cap_vals,
-                       enable ? CAP_SET : CAP_CLEAR) == -1) {
-               DEBUG(0, ("set_process_capability: cap_set_flag effective "
-                       "failed (%d): %s\n",
-                       (int)capability,
-                       strerror(errno)));
-               cap_free(cap);
-               return false;
-       }
+       cap_set_flag(cap, CAP_EFFECTIVE, num_cap_vals, cap_vals,
+               enable ? CAP_SET : CAP_CLEAR);
 
        /* We never want to pass capabilities down to our children, so make
         * sure they are not inherited.
         */
-       if (cap_set_flag(cap, CAP_INHERITABLE, num_cap_vals,
-                       cap_vals, CAP_CLEAR) == -1) {
-               DEBUG(0, ("set_process_capability: cap_set_flag inheritable "
-                       "failed (%d): %s\n",
-                       (int)capability,
-                       strerror(errno)));
-               cap_free(cap);
-               return false;
-       }
+       cap_set_flag(cap, CAP_INHERITABLE, num_cap_vals, cap_vals, CAP_CLEAR);
 
        if (cap_set_proc(cap) == -1) {
-               DEBUG(0, ("set_process_capability: cap_set_flag (%d) failed: 
%s\n",
-                       (int)capability,
+               DEBUG(0, ("set_process_capability: cap_set_proc failed: %s\n",
                        strerror(errno)));
                cap_free(cap);
                return False;
diff --git a/source/smbd/server.c b/source/smbd/server.c
index 23c8c12..5129484 100644
--- a/source/smbd/server.c
+++ b/source/smbd/server.c
@@ -1240,14 +1240,6 @@ extern void build_options(bool screen);
        gain_root_privilege();
        gain_root_group_privilege();
 
-       /*
-        * Ensure we have CAP_KILL capability set on Linux,
-        * where we need this to communicate with threads.
-        * This is inherited by new threads, but not by new
-        * processes across exec().
-        */
-       set_effective_capability(KILL_CAPABILITY);
-
        fault_setup((void (*)(void *))exit_server_fault);
        dump_core_setup("smbd");
 


-- 
Samba Shared Repository

Reply via email to