svn commit: samba r1787 - branches/SAMBA_2_2_RELEASE
jerry at samba.org
jerry at samba.org
Thu Aug 12 19:40:04 GMT 2004
Author: jerry
Date: 2004-08-12 19:40:03 +0000 (Thu, 12 Aug 2004)
New Revision: 1787
WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/&rev=1787&nolog=1
Log:
checkin release notes for 2.2.10 and 2.2.11
Modified:
branches/SAMBA_2_2_RELEASE/WHATSNEW.txt
Changeset:
Modified: branches/SAMBA_2_2_RELEASE/WHATSNEW.txt
===================================================================
--- branches/SAMBA_2_2_RELEASE/WHATSNEW.txt 2004-08-12 19:32:16 UTC (rev 1786)
+++ branches/SAMBA_2_2_RELEASE/WHATSNEW.txt 2004-08-12 19:40:03 UTC (rev 1787)
@@ -1,3 +1,59 @@
+ ==============================
+ Release Notes for Samba 2.2.11
+ Aug 12, 2004
+ ==============================
+
+This is the latest stable release of the Samba 2.2 code base.
+
+Please note that the Samba 2.2 code tree will reach end-of-life
+on October 1, 2004. Administrators of existing Samba 2.2
+installations are encouraged to upgrade to the latest Samba 3.0.x
+release prior to that date.
+
+The Samba 2.2.11 release addresses 2 bugs:
+
+ * Crashes in smbd caused derferencing a NULL pointer troggered
+ by a Windows XP SP2 client sending a FindNextPrintChange-
+ Notify() requirest without previously issueing FindFirst-
+ PrintChangeNotify().
+ * An smbd crash generated when attempting to reopen the Samba
+ log files under certain conditions.
+
+
+Older releases notes for 2.2.x distributions follow
+
+ ------------------------------------------------------
+ ==============================
+ Release Notes for Samba 2.2.10
+ July 22, 2004
+ ==============================
+
+
+######################## SECURITY RELEASE ########################
+
+Summary: Potential Buffer Overrun in Samba 2.2.x
+CVE ID: CAN-2004-0686
+ (http://cve.mitre.org/)
+
+This is the latest stable release of the Samba 2.2 code base.
+There are no further Samba 2.2.x releases planned at this time.
+
+-------------
+CAN-2004-0686
+-------------
+
+Affected Versions: Samba 2.2.0 through 2.2.9
+
+A buffer overrun has been located in the code used to support
+the 'mangling method = hash' smb.conf option. Affected Samba
+2.2 installations can avoid this possible security bug by using
+the hash2 mangling method. Server installations requiring
+the hash mangling method are encouraged to upgrade to Samba v2.2.10
+or v3.0.5.
+
+
+ ------------------------------------------------------
+
=============================
Release Notes for Samba 2.2.9
May 8, 2004
@@ -11,7 +67,6 @@
There are no further Samba 2.2.x releases planned at this time.
-Older releases notes for 2.2.x distributions follow
------------------------------------------------------
More information about the samba-cvs
mailing list