New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
samba4: privilege escalation exploit (low severity) #13758
Comments
ok, can try to find a fix for this, but atm i'm a little time restricted. Will probably just try to get the next releases ready and after this may look more into this issues. Thanks for reporting this again. |
While we can sanitize/filter the simple inputs like "DESCRIPTION", i see no actual way to make the template edit field secure, the samba config is just too big and has to many parameters that we cant sanitize. So without removing/restricting the template edit functionality there is no real "fix" for this issue in openwrt. |
* update to 4.13.3 * enable vfs io_uring module by default, if kernel supports it * fix for possibloe exploit openwrt/packages#13758 * sanetize all external template/config inputs * fix some shellcheck warnings * remove old aio modules/deps
* update to 4.13.3 * enable vfs io_uring module by default, if kernel supports it * fix for possible exploit openwrt#13758 * sanetize all external template/config inputs * fix some shellcheck warnings * remove old aio modules/deps Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
* update to 4.13.3 * enable vfs io_uring module by default, if kernel supports it * fix for possible exploit openwrt/packages#13758 * sanetize all external template/config inputs * fix some shellcheck warnings * remove old aio modules/deps Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
* fix for possible exploit openwrt#13758 * sanetize all external template/config inputs * fix some shellcheck warnings Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
* fix for possible exploit openwrt#13758 * sanetize all external template/config inputs * fix some shellcheck warnings Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
* update to 4.13.3 * enable vfs io_uring module by default, if kernel supports it * fix for possible exploit openwrt#13758 * sanetize all external template/config inputs * fix some shellcheck warnings * remove old aio modules/deps Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
* fix for possible exploit openwrt#13758 * sanetize all external template/config inputs * fix some shellcheck warnings Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
Maintainer: @Andy2244
Environment: OpenWrt master and OpenWrt 19.07
Description:
There is a privilege escalation problem in the samba init script:
https://github.com/full-disclosure/FDEU-CVE-2020-1FC5
The author of this problem contacted us some time ago, sorry for the delay:
I agree that the severity for OpenWrt is low, but this should get fixed anyway.
This was reported for the old samba3 package which is already removed in OpenWrt master, but the same code is also in the samba4 package.
If someone wants to develop a fixes, I can take care of backporting it to samba3 package in OpenWrt 19.07 and 18.06.
The text was updated successfully, but these errors were encountered: