[SCM] Samba Shared Repository - branch v4-0-test updated

Karolin Seeger kseeger at samba.org
Thu Nov 15 03:18:03 MST 2012


The branch, v4-0-test has been updated
       via  ce8beb7 Another fix needed for bug #9236 - ACL masks incorrectly applied when setting ACLs.
       via  f40de48 s4-dns: Fix format string vulnerability in an error message (bug #9354)
       via  5296386 lib/ldb: add missing newline in the output of ldb_ldif_write_trace()
      from  e46a6cd s3:winbind: BUG 9386: Failover if netlogon pipe is not available.

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=v4-0-test


- Log -----------------------------------------------------------------
commit ce8beb781f7456e53262bd331ab3fbb8a100356b
Author: Jeremy Allison <jra at samba.org>
Date:   Thu Nov 8 17:08:01 2012 -0800

    Another fix needed for bug #9236 - ACL masks incorrectly applied when setting ACLs.
    
    Not caught by make test as it's an extreme edge case for strange
    incoming ACLs. I only found this as I'm making raw.acls and smb2.acls
    pass against 3.6.x with acl_xattr mapped onto a POSIX backend (which
    isn't tested in make test).
    
    An incoming inheritable ACE entry containing only one permission,
    WRITE_DATA maps into a POSIX owner perm of "-w-", which violates
    the principle that the owner of a file/directory can always read.
    
    Autobuild-User(v4-0-test): Karolin Seeger <kseeger at samba.org>
    Autobuild-Date(v4-0-test): Thu Nov 15 11:17:55 CET 2012 on sn-devel-104

commit f40de482dac07db30e3b702d6853f5c8381e47c3
Author: Amitay Isaacs <amitay at gmail.com>
Date:   Mon Nov 5 01:09:28 2012 +1100

    s4-dns: Fix format string vulnerability in an error message (bug #9354)
    
    Also, fixes few comments.
    
    Thanks to Bruno Rohée <bruno at rohee.org> for reporting and patch fix.
    
    Signed-off-by: Amitay Isaacs <amitay at gmail.com>
    Reviewed-By: Kai Blin <kai at samba.org>
    
    Autobuild-User(master): Amitay Isaacs <amitay at samba.org>
    Autobuild-Date(master): Sun Nov  4 16:58:13 CET 2012 on sn-devel-104
    (cherry picked from commit 1f55865f2830d0fa36a3f4eeb846f66940b133cd)

commit 52963866a2e6527bbb093bbdb840b8c3f2cae9ad
Author: Stefan Metzmacher <metze at samba.org>
Date:   Mon Nov 12 11:42:52 2012 +0100

    lib/ldb: add missing newline in the output of ldb_ldif_write_trace()
    
    Signed-off-by: Stefan Metzmacher <metze at samba.org>
    
    Reviewed-by: Andrew Bartlett <abartlet at samba.org>
    
    Autobuild-User(master): Andrew Bartlett <abartlet at samba.org>
    Autobuild-Date(master): Tue Nov 13 13:53:31 CET 2012 on sn-devel-104
    
    Fix bug #9385 - add missing newline in the output of ldb_ldif_write_trace().

-----------------------------------------------------------------------

Summary of changes:
 lib/ldb/common/ldb_ldif.c      |    2 +-
 source3/smbd/posix_acls.c      |   14 ++++++++++----
 source4/dns_server/dlz_bind9.c |    9 +++++----
 3 files changed, 16 insertions(+), 9 deletions(-)


Changeset truncated at 500 lines:

diff --git a/lib/ldb/common/ldb_ldif.c b/lib/ldb/common/ldb_ldif.c
index 419906b..a2e4488 100644
--- a/lib/ldb/common/ldb_ldif.c
+++ b/lib/ldb/common/ldb_ldif.c
@@ -333,7 +333,7 @@ static int ldb_ldif_write_trace(struct ldb_context *ldb,
 		
 		if (in_trace && secret_attributes && ldb_attr_in_list(secret_attributes, msg->elements[i].name)) {
 			/* Deliberatly skip printing this password */
-			ret = fprintf_fn(private_data, "# %s::: REDACTED SECRET ATTRIBUTE",
+			ret = fprintf_fn(private_data, "# %s::: REDACTED SECRET ATTRIBUTE\n",
 					 msg->elements[i].name);
 			CHECK_RET;
 			continue;
diff --git a/source3/smbd/posix_acls.c b/source3/smbd/posix_acls.c
index d437b28..5ce3bf3 100644
--- a/source3/smbd/posix_acls.c
+++ b/source3/smbd/posix_acls.c
@@ -1369,7 +1369,11 @@ static bool ensure_canon_entry_valid(connection_struct *conn,
 	for (pace = *pp_ace; pace; pace = pace->next) {
 		if (pace->type == SMB_ACL_USER_OBJ) {
 
-			if (setting_acl && !is_default_acl) {
+			if (setting_acl) {
+				/*
+				 * Ensure we have default parameters for the
+				 * user (owner) even on default ACLs.
+				 */
 				apply_default_perms(params, is_directory, pace, S_IRUSR);
 			}
 			pace_user = pace;
@@ -1452,9 +1456,11 @@ static bool ensure_canon_entry_valid(connection_struct *conn,
 					pace->perms = pace_other->perms;
 			}
 
-			if (!is_default_acl) {
-				apply_default_perms(params, is_directory, pace, S_IRUSR);
-			}
+			/*
+			 * Ensure we have default parameters for the
+			 * user (owner) even on default ACLs.
+			 */
+			apply_default_perms(params, is_directory, pace, S_IRUSR);
 		} else {
 			pace->perms = unix_perms_to_acl_perms(pst->st_ex_mode, S_IRUSR, S_IWUSR, S_IXUSR);
 		}
diff --git a/source4/dns_server/dlz_bind9.c b/source4/dns_server/dlz_bind9.c
index c3c4172..87d9245 100644
--- a/source4/dns_server/dlz_bind9.c
+++ b/source4/dns_server/dlz_bind9.c
@@ -379,7 +379,8 @@ static bool b9_parse(struct dlz_bind9_data *state,
 
 	/* we should be at the end of the buffer now */
 	if (strtok_r(NULL, "\t ", &saveptr) != NULL) {
-		state->log(ISC_LOG_ERROR, "samba b9_parse: expected data at end of string for '%s'");
+		state->log(ISC_LOG_ERROR, "samba b9_parse: unexpected data at end of string for '%s'",
+		           rdatastr);
 		return false;
 	}
 
@@ -387,7 +388,7 @@ static bool b9_parse(struct dlz_bind9_data *state,
 }
 
 /*
-  send a resource recond to bind9
+  send a resource record to bind9
  */
 static isc_result_t b9_putrr(struct dlz_bind9_data *state,
 			     void *handle, struct dnsp_DnssrvRpcRecord *rec,
@@ -427,7 +428,7 @@ static isc_result_t b9_putrr(struct dlz_bind9_data *state,
 
 
 /*
-  send a named resource recond to bind9
+  send a named resource record to bind9
  */
 static isc_result_t b9_putnamedrr(struct dlz_bind9_data *state,
 				  void *handle, const char *name,
@@ -1451,7 +1452,7 @@ static bool b9_set_session_info(struct dlz_bind9_data *state, const char *name)
 		return false;
 	}
 
-	/* Do not use client credentials, if we not updating the client specified name */
+	/* Do not use client credentials, if we're not updating the client specified name */
 	if (strcmp(state->update_name, name) != 0) {
 		return true;
 	}


-- 
Samba Shared Repository


More information about the samba-cvs mailing list