The branch, v4-2-test has been updated
       via  92cc4e0 s3: winbind: Prevent null ptr access by returning error if 
no creds available
       via  d9afa70 s3: rpcclient: Prevent null ptr access by returning error 
if no creds available
       via  01ca2cf s3: smbd: If EA's are turned off on a share don't allow an 
SMB2 create containing them.
       via  c63638e vfs_gpfs: Re-enable share modes
      from  95232e6 Changing log level of two entries to from 1 to 3

https://git.samba.org/?p=samba.git;a=shortlog;h=v4-2-test


- Log -----------------------------------------------------------------
commit 92cc4e07f9558b2d4b7510f9ed4b769c9f467941
Author: Noel Power <[email protected]>
Date:   Thu Oct 22 12:37:17 2015 +0100

    s3: winbind: Prevent null ptr access by returning error if no creds 
available
    
    Prevent rpccli_netlogon_network_logon/rpccli_netlogon_password_logon
    being called with 'NULL' credentials
    
    BUG: https://bugzilla.samba.org/show_bug.cgi?id=11569
    
    Signed-off-by: Noel Power <[email protected]>
    Reviewed-by: Jeremy Allison <[email protected]>
    Reviewed-by: Stefan Metzmacher <[email protected]>
    (cherry picked from commit e8fab02773892812f563eea7098847618df76e1b)
    
    Autobuild-User(v4-2-test): Karolin Seeger <[email protected]>
    Autobuild-Date(v4-2-test): Mon Nov 16 12:55:13 CET 2015 on sn-devel-104

commit d9afa70503d93460da27c887241fd6a59ec49f0a
Author: Noel Power <[email protected]>
Date:   Mon Nov 2 09:59:12 2015 +0000

    s3: rpcclient: Prevent null ptr access by returning error if no creds 
available
    
    Prevent rpccli_netlogon_password_logon being called with 'NULL' credentials.
    
    BUG: https://bugzilla.samba.org/show_bug.cgi?id=11569
    
    Signed-off-by: Noel Power <[email protected]>
    Reviewed-by: Jeremy Allison <[email protected]>
    Reviewed-by: Stefan Metzmacher <[email protected]>
    (cherry picked from commit 89940f39c6d2db03b3a468942d686e762f126f9f)

commit 01ca2cffd7aa7b12173d7aefe43ce39c6532ae33
Author: Jeremy Allison <[email protected]>
Date:   Wed Nov 4 09:34:57 2015 -0800

    s3: smbd: If EA's are turned off on a share don't allow an SMB2 create 
containing them.
    
    Otherwise a create that should have failed may succeed.
    
    Based on an original patch from John Mulligan <[email protected]>
    and comments from Uri Simchoni <[email protected]>
    
    BUG: https://bugzilla.samba.org/show_bug.cgi?id=11589
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Reviewed-by: Uri Simchoni <[email protected]>
    
    Autobuild-User(master): Uri Simchoni <[email protected]>
    Autobuild-Date(master): Wed Nov  4 22:14:22 CET 2015 on sn-devel-104
    
    (cherry picked from commit aa3cc0b459124c66de0aad8ff41908e1bf261222)

commit c63638e217ad5e3866a31968bd7d568685e0e987
Author: Volker Lendecke <[email protected]>
Date:   Thu Nov 5 13:22:33 2015 +0100

    vfs_gpfs: Re-enable share modes
    
    is_ntfs_default_stream_smb_fname returns false for a NULL stream name, so 
for
    streamless filenames we do not set gpfs share modes without this patch.
    
    Bug: https://bugzilla.samba.org/show_bug.cgi?id=11243
    Signed-off-by: Volker Lendecke <[email protected]>
    Reviewed-by: Stefan Metzmacher <[email protected]>
    
    Autobuild-User(master): Volker Lendecke <[email protected]>
    Autobuild-Date(master): Fri Nov  6 03:21:01 CET 2015 on sn-devel-104

-----------------------------------------------------------------------

Summary of changes:
 source3/modules/vfs_gpfs.c       | 3 ++-
 source3/rpcclient/cmd_netlogon.c | 5 +++++
 source3/smbd/smb2_create.c       | 6 ++++++
 source3/winbindd/winbindd_pam.c  | 7 +++++--
 4 files changed, 18 insertions(+), 3 deletions(-)


Changeset truncated at 500 lines:

diff --git a/source3/modules/vfs_gpfs.c b/source3/modules/vfs_gpfs.c
index 4d64983..2939689 100644
--- a/source3/modules/vfs_gpfs.c
+++ b/source3/modules/vfs_gpfs.c
@@ -91,7 +91,8 @@ static int vfs_gpfs_kernel_flock(vfs_handle_struct *handle, 
files_struct *fsp,
         * fd, so lacking a distinct fd for the stream we have to skip
         * kernel_flock and set_gpfs_sharemode for stream.
         */
-       if (!is_ntfs_default_stream_smb_fname(fsp->fsp_name)) {
+       if (is_ntfs_stream_smb_fname(fsp->fsp_name) &&
+           !is_ntfs_default_stream_smb_fname(fsp->fsp_name)) {
                DEBUG(2,("%s: kernel_flock on stream\n", fsp_str_dbg(fsp)));
                return 0;
        }
diff --git a/source3/rpcclient/cmd_netlogon.c b/source3/rpcclient/cmd_netlogon.c
index 2d1c351..ea63602 100644
--- a/source3/rpcclient/cmd_netlogon.c
+++ b/source3/rpcclient/cmd_netlogon.c
@@ -800,6 +800,11 @@ static NTSTATUS cmd_netlogon_sam_logon(struct 
rpc_pipe_client *cli,
        if (argc == 6)
                sscanf(argv[5], "%x", &logon_param);
 
+       if (rpcclient_netlogon_creds == NULL) {
+               result = NT_STATUS_UNSUCCESSFUL;
+               goto done;
+       }
+
        /* Perform the sam logon */
 
        result = rpccli_netlogon_password_logon(rpcclient_netlogon_creds,
diff --git a/source3/smbd/smb2_create.c b/source3/smbd/smb2_create.c
index 2f9d500..ecedd08 100644
--- a/source3/smbd/smb2_create.c
+++ b/source3/smbd/smb2_create.c
@@ -695,6 +695,12 @@ static struct tevent_req *smbd_smb2_create_send(TALLOC_CTX 
*mem_ctx,
                }
 
                if (exta) {
+                       if (!lp_ea_support(SNUM(smb2req->tcon->compat))) {
+                               tevent_req_nterror(req,
+                                       NT_STATUS_EAS_NOT_SUPPORTED);
+                               return tevent_req_post(req, ev);
+                       }
+
                        ea_list = read_nttrans_ea_list(mem_ctx,
                                (const char *)exta->data.data, 
exta->data.length);
                        if (!ea_list) {
diff --git a/source3/winbindd/winbindd_pam.c b/source3/winbindd/winbindd_pam.c
index bed2220..a09143f 100644
--- a/source3/winbindd/winbindd_pam.c
+++ b/source3/winbindd/winbindd_pam.c
@@ -1367,8 +1367,11 @@ static NTSTATUS winbind_samlogon_retry_loop(struct 
winbindd_domain *domain,
                        return result;
                }
                netr_attempts = 0;
-
-               if (interactive && username != NULL && password != NULL) {
+               if (domain->conn.netlogon_creds == NULL) {
+                       DEBUG(3, ("No security credentials available for "
+                                 "domain [%s]\n", domainname));
+                       result = NT_STATUS_CANT_ACCESS_DOMAIN_INFO;
+               } else if (interactive && username != NULL && password != NULL) 
{
                        result = 
rpccli_netlogon_password_logon(domain->conn.netlogon_creds,
                                                                
netlogon_pipe->binding_handle,
                                                                mem_ctx,


-- 
Samba Shared Repository

Reply via email to