Commits on Source (9)
-
Count number of answers generated by internal DNS query routine and stop at 20 to match Microsoft's loop prevention mechanism. (backport to Samba 4.5) BUG: https://bugzilla.samba.org/show_bug.cgi?id=13600 Signed-off-by:
Aaron Haslett <aaronhaslett@catalyst.net.nz> Reviewed-by:
Andrew Bartlett <abartlet@samba.org> Reviewed-by:
Garming Sam <garming@catalyst.net.nz>
-
Signed-off-by:
Garming Sam <garming@catalyst.net.nz> Reviewed-by:
Andrew Bartlett <abartlet@samba.org> (cherry picked from commit 668e4e4a)
-
Signed-off-by:
Garming Sam <garming@catalyst.net.nz> Reviewed-by:
Andrew Bartlett <abartlet@samba.org> (cherry picked from commit ad3b3e97)
-
Signed-off-by:
Garming Sam <garming@catalyst.net.nz> Reviewed-by:
Andrew Bartlett <abartlet@samba.org> Autobuild-User(master): Garming Sam <garming@samba.org> Autobuild-Date(master): Tue Sep 6 15:41:54 CEST 2016 on sn-devel-144 (cherry picked from commit 45190773)
-
In Heimdal KRB5_KDC_ERR_CLIENT_NAME_MISMATCH is an enum, so we tried to double-free mem_ctx. This was introduced in 9a0263a7 for the MIT KDC effort. BUG: https://bugzilla.samba.org/show_bug.cgi?id=13628 Signed-off-by:
Andrew Bartlett <abartlet@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
CVE-2018-16841 selftest: Check for mismatching principal in certficate compared with principal in AS-REQ BUG: https://bugzilla.samba.org/show_bug.cgi?id=13628 Signed-off-by:
Andrew Bartlett <abartlet@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
In the case of hitting the talloc ~256MB limit, this causes a crash in the server. Note that you would actually need to load >256MB of data into the LDAP. Although there is some generated/hidden data which would help you reach that limit (descriptors and RMD blobs). BUG: https://bugzilla.samba.org/show_bug.cgi?id=13674 Signed-off-by:
Garming Sam <garming@catalyst.net.nz> Reviewed-by:
Andrew Bartlett <abartlet@samba.org>
-
Mathieu Parent authored
-
Mathieu Parent authored
debian/patches/CVE-2018-14629-v4-5.patch
0 → 100644
debian/patches/CVE-2018-16841-master.patch
0 → 100644
debian/patches/CVE-2018-16851-master.patch
0 → 100644
selftest/knownfail.d/dns
0 → 100644