[Announce] Samba 3.6.3 Security Release Available
Karolin Seeger
kseeger at samba.org
Sun Jan 29 13:50:46 MST 2012
Release Announcements
=====================
This is a security release in order to address
CVE-2012-0817 (Memory leak/Denial of service).
o CVE-2012-0817:
The Samba File Serving daemon (smbd) in Samba versions
3.6.0 to 3.6.2 is affected by a memory leak that can
cause a server denial of service.
Changes since 3.6.2:
--------------------
o Jeremy Allison <jra at samba.org>
* BUG 8724: Fix memory leak in parent smbd on connection.
o Ira Cooper <samba at ira.wakeful.net>
* BUG 8724: Fix memory leak in parent smbd on connection.
######################################################################
Reporting bugs & Development Discussion
#######################################
Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.
If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored. All bug reports should
be filed under the Samba 3.6 product in the project's Bugzilla
database (https://bugzilla.samba.org/).
======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================
================
Download Details
================
The uncompressed tarballs and patch files have been signed
using GnuPG (ID 6568B7EA). The source code can be downloaded
from:
http://download.samba.org/samba/ftp/stable
The release notes are available online at:
http://www.samba.org/samba/history/samba-3.6.3.html
Binary packages will be made available on a volunteer basis from
http://download.samba.org/samba/ftp/Binary_Packages/
Our Code, Our Bugs, Our Responsibility.
(https://bugzilla.samba.org/)
--Enjoy
The Samba Team
More information about the samba-announce
mailing list