| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
metze
|
|
|
|
| |
metze
|
|
|
|
| |
metze
|
|
|
|
| |
metze
|
|
|
|
|
|
|
|
|
| |
elements (bug #8815 / CVE-2012-1182)
An anonymous researcher and Brian Gorenc (HP DVLabs) working
with HP's Zero Day Initiative program have found this and notified us.
metze
|
|
|
|
| |
metze
|
|
|
|
| |
metze
|
|
|
|
| |
metze
|
|
|
|
|
| |
metze
(cherry picked from commit bea4948acb4bbee2fbf886adeb53edbc84de96da)
|
|
|
|
|
| |
metze
(cherry picked from commit 92791ce9a8439ac06a22afdbeb0d0fc66c32cb31)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
midl also supports this:
struct {
long l1;
[string] wchar_t str[16];
long l2;
};
Where the wire size of str is encoded like a length_is() header:
4-byte offset == 0;
4-byte array length;
The strings are zero terminated.
metze
(cherry picked from commit 7ccc9a6ef563cc855752b4e74152420b9be5af43)
|
|
|
|
| |
Karolin
|
|
|
|
|
| |
Karolin
(cherry picked from commit 6f4316c93105165505bd8975530e01c8e50fb9c0)
|
|
|
|
|
| |
Karolin
(cherry picked from commit 4573fbed636e114d21f6efbb3204ae09dfc9c0c2)
|
|
|
|
|
| |
Karolin
(cherry picked from commit 3777f31f377e97e09d6cbe9c65c4c4b79b637da2)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
SLES 9's glibc for example had weird macros where the use of strncat resulted
in the use of strcat which we don't allow.
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Autobuild-User: Björn Jacke <bj@sernet.de>
Autobuild-Date: Thu Aug 4 17:50:24 CEST 2011 on sn-devel-104
(cherry picked from commit d3b4d75364210e2d2a4a1cd806f28b0021f22909)
Fix bug #8362 (build issue on old glibc systems).
(cherry picked from commit 87fa72a5202fe3780d4a61289bf755027cd078f4)
(cherry picked from commit 552ccc6588b0744ae9b3731b1406749baea03d5a)
(cherry picked from commit b941edf9c20bd6a92aec2a62be5b830db1194ce8)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This is more portable, as we have a strtoll replacement
in lib/replace.
metze
Autobuild-User: Stefan Metzmacher <metze@samba.org>
Autobuild-Date: Sat Aug 6 11:55:45 CEST 2011 on sn-devel-104
(cherry picked from commit a6be0820d09b3f3eabfbb5f4356add303aa8a494)
Fix bug #8347 (CVE-2011-2522 regression for HP-UX, AIX and OSF).
(cherry picked from commit ac5d8c0148e10a3a0af9e1dc0849bb6920c26ad7)
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
(bug #8276)
Fix bug #7949 (DoS in Winbind and smbd with many file descriptors open)
(commit feb3fcd0fa4bda0967b881315595d7702f4d1752) changed the bahavior,
so that we skipped some sockets.
This should work for v3-4-test.
metze
(cherry picked from commit 11b4dec29c9306531e73d5f4c12f89934dd538b4)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Since the fix for bso#7836, the parent smbd is responsible for
maintaining an up-to-date printcap cache. It does this by forking a
child process to asynchronously fetch printcap data from CUPS.
When the child process exits after fetching all printcap data, the
parent smbd is sent SIGCHLD. This triggers smbd_sig_chld_handler() which
looks for the exited process PID on a "children" list.
Child smbd process PIDs are added to the "children" list to ensure
cleanup on unclean shutdown and log level change notification messages.
Printcap update process PIDs are not added to the list as they do not
maintain any state that requires cleanup, nor do they wait on tevent for
messages.
Autobuild-User: Volker Lendecke <vlendec@samba.org>
Autobuild-Date: Thu Feb 17 11:11:45 CET 2011 on sn-devel-104
(cherry picked from commit 9c12232f1ae36e00d04114ad73edd8ba3c2c6a5c)
Fix bug #8269 (smbd spams log with "Could not find child X -- ignoring"
messages).
(cherry picked from commit ba118ac287d49267dd2f346d4ddd2e590ebbe653)
(cherry picked from commit c943af7ff13c64343e5246b27a7416627bffd365)
|
|
|
|
| |
(cherry picked from commit 9a172dcd2e7bf91d78885325bce7a19e937b48af)
|
|
|
|
|
|
|
|
|
| |
There is currently a lot of duplicate code included for processing
responses to CUPS_GET_PRINTERS and CUPS_GET_CLASSES requests. This
change splits this code into a separate function.
Signed-off-by: Günther Deschner <gd@samba.org>
(cherry picked from commit a3635edc96e481f1125db1c26e33cae5b22a01a4)
|
|
|
|
|
|
|
|
|
|
|
| |
Use printcap IDL for marshalling and unmarshalling messages between cups
child and parent smbd processes. This simplifies the IPC and ensures
the parent is notified of cups errors encountered by the child.
https://bugzilla.samba.org/show_bug.cgi?id=7994
Signed-off-by: Günther Deschner <gd@samba.org>
(cherry picked from commit e5a0ac40d7467bb6ce07d942fdadb43f1ec81bfc)
|
|
|
|
|
| |
Signed-off-by: Günther Deschner <gd@samba.org>
(cherry picked from commit 9a107d2d65d3080aebe441b8b93cf17abeb092f7)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
cups_async_callback() is called to receive new printcap data from a
child process which requests the information from cupsd.
Newly received printcap information is stored in a temporary printcap
cache (tmp_pcap_cache). Once the child process closes the printcap IPC
file descriptor, the system printcap cache is replaced with the newly
populated tmp_pcap_cache, however this only occurs if tmp_pcap_cache is
non null (has at least one printer).
If the printcap cache is empty, which is the case when cups is not
exporting any printers, the printcap cache is not replaced resulting in
stale data.
Signed-off-by: Günther Deschner <gd@samba.org>
(cherry picked from commit 52bac5ffeea8ecbd2a5ecca023b3e2014c1350da)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
pcap_cache_loaded() assertions were added to the (re)load_printers()
functions, to ensure the caller had called pcap_cache_reload() prior to
reloading printer shares.
The problem is, pcap_cache_loaded() returns false if the the pcap_cache
contains no printer entries. i.e. pcap_cache_reload() has run but not
detected any printers.
Remove these assertions, correct call ordering is already enforced.
Signed-off-by: Günther Deschner <gd@samba.org>
The last 3 patches address bug #7836 (A newly added printer isn't visbile to
clients).
(cherry picked from commit da9b2d9d58193ed3da36c2f8ff1e41a1e743ba07)
|
|
|
|
|
|
|
| |
This reverts commit ad450870eacb114b3f15941a4478ba25701e035a.
Signed-off-by: Günther Deschner <gd@samba.org>
(cherry picked from commit ee094b53d7fd9c46bca57b9815993282c63af00c)
|
|
|
|
|
|
|
| |
This reverts commit 36ea03bbe28122ce03de4969e254dd276cfe5a79.
Signed-off-by: Günther Deschner <gd@samba.org>
(cherry picked from commit 3e1969d229dff2921b43189969dfbe522b167cc2)
|
|
|
|
| |
Karolin
|
|
|
|
| |
Karolin
|
|
|
|
|
|
| |
Thanks to Simo for reporting!
Karolin
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
In CGI mode, we don't get access to the user's password, which would
reduce the hash used so far to parameters an attacker can easily guess.
To work around this, read the nonce from secrets.tdb or generate one if
it's not there.
Also populate the C_user field so we can use that for token creation.
Signed-off-by: Kai Blin <kai@samba.org>
The last 12 patches address bug #8290 (CSRF vulnerability in SWAT).
This addresses CVE-2011-2522 (Cross-Site Request Forgery in SWAT).
|
|
|
|
| |
Signed-off-by: Kai Blin <kai@samba.org>
|
|
|
|
| |
Signed-off-by: Kai Blin <kai@samba.org>
|
|
|
|
| |
Signed-off-by: Kai Blin <kai@samba.org>
|
|
|
|
| |
Signed-off-by: Kai Blin <kai@samba.org>
|
|
|
|
| |
Signed-off-by: Kai Blin <kai@samba.org>
|
|
|
|
| |
Signed-off-by: Kai Blin <kai@samba.org>
|
|
|
|
| |
Signed-off-by: Kai Blin <kai@samba.org>
|
|
|
|
| |
Signed-off-by: Kai Blin <kai@samba.org>
|
|
|
|
| |
Signed-off-by: Kai Blin <kai@samba.org>
|
|
|
|
| |
Signed-off-by: Kai Blin <kai@samba.org>
|
|
|
|
| |
Signed-off-by: Kai Blin <kai@samba.org>
|
|
|
|
|
|
|
|
|
|
|
| |
Nobuhiro Tsuji of NTT DATA SECURITY CORPORATION reported a possible XSS attack
against SWAT, the Samba Web Administration Tool. The attack uses reflection to
insert arbitrary content into the "change password" page.
This patch fixes the reflection issue by not printing user-specified content on
the website anymore.
Signed-off-by: Kai Blin <kai@samba.org>
|
|
|
|
| |
Karolin
|
|
|
|
|
| |
Karolin
(cherry picked from commit 2c9a3dbdb18f8773754d2cc417c61f5dfd452008)
|
|
|
|
|
| |
Karolin
(cherry picked from commit 2c72a084ec5eb8d368e34962b39278eb3b2176c6)
|
|
|
|
|
| |
Karolin
(cherry picked from commit b5e5510ea62af1df31b5f06c5cf1029217b648e1)
|
|
|
|
|
| |
(cherry picked from commit 2167ac2cd42c9ed5aaae0086dbd27e29d1d77686)
(cherry picked from commit fd387cd0bf186a94b64e8c2085c943992629e5af)
|
|
|
|
|
| |
Karolin
(cherry picked from commit 0517118cbfe7455ba288d6c59cb5ed7f22274b35)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Make sure we use a timeout of 60 seconds, not 60 milliseconds...
This prevented us from successfully using the ncacn_ip_tcp client in a lot of
places, I guess.
Guenther
Autobuild-User: Volker Lendecke <vlendec@samba.org>
Autobuild-Date: Wed Apr 13 18:59:19 CEST 2011 on sn-devel-104
(cherry picked from commit 4b3fe5247a6e16b1ad9f05269e9aa00e3120e36a)
Fix bug #8085 - incorrect timeout handling in ncacn_ip_tcp client code.
(cherry picked from commit d7d39c723e1855a3d18813e8a79fcca9770b0142)
(cherry picked from commit f7a175f47ee65c58363615541577db65d8b9fa76)
|