[SCM] Samba Website Repository - branch master updated

Karolin Seeger kseeger at samba.org
Mon Feb 28 06:19:58 MST 2011


The branch, master has been updated
       via  183ec42 Update security information.
       via  34591f4 Announce Samba 3.5.7, 3.4.12 and 3.3.15.
      from  b445431 update irclog URL

http://gitweb.samba.org/?p=samba-web.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit 183ec42bcd69888e23bc2fa0dafc62f5dfe1b7bb
Author: Karolin Seeger <kseeger at samba.org>
Date:   Mon Feb 28 13:58:26 2011 +0100

    Update security information.
    
    Karolin

commit 34591f495f8e0b7890ef06406f43177c49901457
Author: Karolin Seeger <kseeger at samba.org>
Date:   Mon Feb 28 13:34:01 2011 +0100

    Announce Samba 3.5.7, 3.4.12 and 3.3.15.
    
    Karolin

-----------------------------------------------------------------------

Summary of changes:
 generated_news/latest_10_bodies.html               |   79 ++++++++-----------
 generated_news/latest_10_headlines.html            |    6 ++
 generated_news/latest_2_bodies.html                |   34 +++-----
 history/header_history.html                        |    3 +
 history/samba-3.3.15.html                          |   43 +++++++++++
 history/samba-3.4.12.html                          |   43 +++++++++++
 history/samba-3.5.7.html                           |   42 ++++++++++
 history/security.html                              |   14 ++++
 latest_stable_release.html                         |    6 +-
 .../{CVE-2010-3069.html => CVE-2011-0719.html}     |   38 +++++----
 10 files changed, 221 insertions(+), 87 deletions(-)
 create mode 100755 history/samba-3.3.15.html
 create mode 100755 history/samba-3.4.12.html
 create mode 100755 history/samba-3.5.7.html
 copy security/{CVE-2010-3069.html => CVE-2011-0719.html} (52%)


Changeset truncated at 500 lines:

diff --git a/generated_news/latest_10_bodies.html b/generated_news/latest_10_bodies.html
index bdb6bf8..c44ce2b 100644
--- a/generated_news/latest_10_bodies.html
+++ b/generated_news/latest_10_bodies.html
@@ -1,4 +1,36 @@
- 
+	<h5><a name="3.5.7">28 February 2011</a></h5>
+	<p class="headline">Samba 3.5.7 Security Release Available</p>
+
+	<p>This is a security release to address <a href="http://www.samba.org/samba/security/CVE-2011-0719">CVE-2011-0719</a> (Denial of service - memory corruption). Patches for all current releases are available on our <a href="http://www.samba.org/samba/security/">security page</a>.</p>
+
+<p>The uncompressed tarballs and patch files have been signed
+using GnuPG (ID 6568B7EA).  The source code can be
+<a href="http://www.samba.org/samba/ftp/stable/samba-3.5.7.tar.gz">downloaded now</a>.
+See <a href="http://www.samba.org/samba/history/samba-3.5.7.html">the release notes for more
+info</a>.</p>
+
+	<h5><a name="3.4.12">28 February 2011</a></h5>
+	<p class="headline">Samba 3.4.12 Security Release Available</p>
+
+	<p>This is a security release to address <a href="http://www.samba.org/samba/security/CVE-2011-0719">CVE-2011-0719</a> (Denial of service - memory corruption). Patches for all current releases are available on our <a href="http://www.samba.org/samba/security/">security page</a>.</p>
+
+<p>The uncompressed tarballs and patch files have been signed
+using GnuPG (ID 6568B7EA).  The source code can be
+<a href="http://www.samba.org/samba/ftp/stable/samba-3.4.12.tar.gz">downloaded now</a>.
+See <a href="http://www.samba.org/samba/history/samba-3.4.12.html">the release notes for more
+info</a>.</p>
+
+	<h5><a name="3.3.15">28 February 2011</a></h5>
+	<p class="headline">Samba 3.3.15 Security Release Available</p>
+
+	<p>This is a security release to address <a href="http://www.samba.org/samba/security/CVE-2011-0719">CVE-2011-0719</a> (Denial of service - memory corruption). Patches for all current releases are available on our <a href="http://www.samba.org/samba/security/">security page</a>.</p>
+
+<p>The uncompressed tarballs and patch files have been signed
+using GnuPG (ID 6568B7EA).  The source code can be
+<a href="http://www.samba.org/samba/ftp/stable/samba-3.3.15.tar.gz">downloaded now</a>.
+See <a href="http://www.samba.org/samba/history/samba-3.3.15.html">the release notes for more
+info</a>.</p>
+
         <h5><a name="3.4.11"> 23 January 2011</a></h5>
         <p class="headline">Samba 3.4.11 Available for Download</p>
         <p>This is the latest stable release of the Samba 3.4 series.</p>
@@ -100,48 +132,3 @@ using GnuPG (ID 6568B7EA).  The source code can be
 See <a href="http://www.samba.org/samba/history/samba-3.3.14.html">the release notes for more
 info</a>.</p>
 
- 
-	<h5><a name="3.6.0pre1">28 July 2010</a></h5>
-	<p class="headline">Samba 3.6.0pre1 Available for Download</p>
-	<p>Samba 3.6.0pre1 is available for download.  This is a
- preview of the next upgrade production release version of Samba.
- It is intended for <b>testing purposes only</b>.  Please test and 
- <a href="https://bugzilla.samba.org/">report any bugs that you
- find</a>.  Please read the changes in the 
- <a href="http://samba.org/samba/ftp/pre/WHATSNEW-3-6-0pre1.txt">Release Notes</a>
- for details on new features and difference in behavior from
- previous releases.</p>
-
- <p>The <a href="http://samba.org/samba/ftp/pre/samba-3.6.0pre1.tar.gz">Samba 3.6.0pre1
- source code</a> can be downloaded now.  The <a
- href="http://samba.org/samba/ftp/pre/samba-3.6.0pre1.tar.asc">GnuPG
- signature is for the <em>un</em>compressed tarball</a>.
- Precompiled packages will
- be made available on a volunteer basis and can be found in the 
- <a href="http://samba.org/samba/ftp/Binary_Packages/">Binary_Packages download area</a>.</p>
-
- 
-	<h5><a name="3.5.4">23 June 2010</a></h5>
-	<p class="headline">Samba 3.5.4 Available for Download</p>
-	<p>This is the latest stable release of the Samba 3.5 series.</p>
-
-<p>The uncompressed tarballs and patch files have been signed
-using GnuPG (ID 6568B7EA).  The source code can be  
-<a href="http://samba.org/samba/ftp/stable/samba-3.5.4.tar.gz">downloaded
-now</a>. A <a href="http://samba.org/samba/ftp/patches/patch-3.5.3-3.5.4.diffs.gz">patch against
-Samba 3.5.3</a> is also available. See <a href="http://samba.org/samba/history/samba-3.5.4.html">the
-release notes for more info</a>.</p>
-
- 
-	<h5><a name="3.3.13">16 June 2010</a></h5>
-	<p class="headline">Samba 3.3.13 Security Release Available</p>
-	<p>This is a security release to address <a href="http://www.samba.org/samba/security/CVE-2010-2063">CVE-2010-2063</a>.
-
-Patches for all current releases are available on our <a href="http://www.samba.org/samba/security/">security page</a>.</p>
-
-<p>The uncompressed tarballs and patch files have been signed
-using GnuPG (ID 6568B7EA).  The source code can be
-<a href="http://www.samba.org/samba/ftp/stable/samba-3.3.13.tar.gz">downloaded now</a>.
-See <a href="http://www.samba.org/samba/history/samba-3.3.13.html">the release notes for more
-info</a>.</p>
-
diff --git a/generated_news/latest_10_headlines.html b/generated_news/latest_10_headlines.html
index 9ce8279..bf80517 100644
--- a/generated_news/latest_10_headlines.html
+++ b/generated_news/latest_10_headlines.html
@@ -1,4 +1,10 @@
 <ul>
+	<li> 28 February 2011 <a href="#3.5.7">Samba 3.5.7 Available for Download</a></li>
+
+	<li> 28 February 2011 <a href="#3.4.12">Samba 3.4.12 Available for Download</a></li>
+
+	<li> 28 February 2011 <a href="#3.3.15">Samba 3.3.15 Available for Download</a></li>
+
 	<li> 23 January 2011 <a href="#3.4.11">Samba 3.4.11 Available for Download</a></li>
 
 	<li> 22 January 2011 <a href="#3.4.10">Samba 3.4.10 Available for Download</a></li>
diff --git a/generated_news/latest_2_bodies.html b/generated_news/latest_2_bodies.html
index cae4443..80e4e98 100644
--- a/generated_news/latest_2_bodies.html
+++ b/generated_news/latest_2_bodies.html
@@ -1,29 +1,21 @@
-        <h5><a name="3.4.11"> 23 January 2011</a></h5>
-        <p class="headline">Samba 3.4.11 Available for Download</p>
-        <p>This is the latest stable release of the Samba 3.4 series.</p>
+	<h5><a name="3.5.7">28 February 2011</a></h5>
+	<p class="headline">Samba 3.5.7 Security Release Available</p>
+
+	<p>This is a security release to address <a href="http://www.samba.org/samba/security/CVE-2011-0719">CVE-2011-0719</a> (Denial of service - memory corruption). Patches for all current releases are available on our <a href="http://www.samba.org/samba/security/">security page</a>.</p>
 
 <p>The uncompressed tarballs and patch files have been signed
 using GnuPG (ID 6568B7EA).  The source code can be
-<a href="http://samba.org/samba/ftp/stable/samba-3.4.11.tar.gz">downloaded
-now</a>. A <a
-href="http://samba.org/samba/ftp/patches/patch-3.4.10-3.4.11.diffs.gz">patch
-against
-Samba 3.4.10</a> is also available. See <a
-href="http://samba.org/samba/history/samba-3.4.11.html">the
-release notes for more info</a>.</p>
+<a href="http://www.samba.org/samba/ftp/stable/samba-3.5.7.tar.gz">downloaded now</a>.
+See <a href="http://www.samba.org/samba/history/samba-3.5.7.html">the release notes for more
+info</a>.</p>
 
+	<h5><a name="3.4.12">28 February 2011</a></h5>
+	<p class="headline">Samba 3.4.12 Security Release Available</p>
 
-        <h5><a name="3.4.10"> 22 January 2011</a></h5>
-        <p class="headline">Samba 3.4.10 Available for Download</p>
-        <p>This is the latest stable release of the Samba 3.4 series.</p>
+	<p>This is a security release to address <a href="http://www.samba.org/samba/security/CVE-2011-0719">CVE-2011-0719</a> (Denial of service - memory corruption). Patches for all current releases are available on our <a href="http://www.samba.org/samba/security/">security page</a>.</p>
 
 <p>The uncompressed tarballs and patch files have been signed
 using GnuPG (ID 6568B7EA).  The source code can be
-<a href="http://samba.org/samba/ftp/stable/samba-3.4.10.tar.gz">downloaded
-now</a>. A <a
-href="http://samba.org/samba/ftp/patches/patch-3.4.9-3.4.10.diffs.gz">patch
-against
-Samba 3.4.9</a> is also available. See <a
-href="http://samba.org/samba/history/samba-3.4.10.html">the
-release notes for more info</a>.</p>
-
+<a href="http://www.samba.org/samba/ftp/stable/samba-3.4.12.tar.gz">downloaded now</a>.
+See <a href="http://www.samba.org/samba/history/samba-3.4.12.html">the release notes for more
+info</a>.</p>
diff --git a/history/header_history.html b/history/header_history.html
index ce706b0..161ee6a 100755
--- a/history/header_history.html
+++ b/history/header_history.html
@@ -9,6 +9,7 @@
 		<li><a href="/samba/history/">Release Notes</a>
 		<li class="navSub">
 			<ul>
+			<li><a href="samba-3.5.7.html">samba-3.5.7</a></li>
 			<li><a href="samba-3.5.6.html">samba-3.5.6</a></li>
 			<li><a href="samba-3.5.5.html">samba-3.5.5</a></li>
 			<li><a href="samba-3.5.4.html">samba-3.5.4</a></li>
@@ -16,6 +17,7 @@
 			<li><a href="samba-3.5.2.html">samba-3.5.2</a></li>
 			<li><a href="samba-3.5.1.html">samba-3.5.1</a></li>
 			<li><a href="samba-3.5.0.html">samba-3.5.0</a></li>
+			<li><a href="samba-3.4.12.html">samba-3.4.12</a></li>
 			<li><a href="samba-3.4.11.html">samba-3.4.11</a></li>
 			<li><a href="samba-3.4.10.html">samba-3.4.10</a></li>
 			<li><a href="samba-3.4.9.html">samba-3.4.9</a></li>
@@ -28,6 +30,7 @@
 			<li><a href="samba-3.4.2.html">samba-3.4.2</a></li>
 			<li><a href="samba-3.4.1.html">samba-3.4.1</a></li>
 			<li><a href="samba-3.4.0.html">samba-3.4.0</a></li>
+			<li><a href="samba-3.3.15.html">samba-3.3.15</a></li>
 			<li><a href="samba-3.3.14.html">samba-3.3.14</a></li>
 			<li><a href="samba-3.3.13.html">samba-3.3.13</a></li>
 			<li><a href="samba-3.3.12.html">samba-3.3.12</a></li>
diff --git a/history/samba-3.3.15.html b/history/samba-3.3.15.html
new file mode 100755
index 0000000..490591b
--- /dev/null
+++ b/history/samba-3.3.15.html
@@ -0,0 +1,43 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Release Notes Archive</title>
+</head>
+
+<body>
+
+   <H2>Samba 3.3.15 Available for Download</H2>
+
+<p>
+<pre>
+                   ==============================
+                   Release Notes for Samba 3.3.15
+		         February 28, 2011
+                   ==============================
+
+
+This is a security release in order to address CVE-2011-0719.
+
+
+o  CVE-2011-0719:
+   All current released versions of Samba are vulnerable to
+   a denial of service caused by memory corruption. Range
+   checks on file descriptors being used in the FD_SET macro
+   were not present allowing stack corruption. This can cause
+   the Samba code to crash or to loop attempting to select
+   on a bad file descriptor set.
+
+
+Changes since 3.3.14
+--------------------
+
+
+o   Jeremy Allison &lt;jra at samba.org&gt;
+    * BUG 7949: Fix DoS in Winbind and smbd with many file descriptors open.
+</pre>
+</p>
+
+</body>
+</html>
diff --git a/history/samba-3.4.12.html b/history/samba-3.4.12.html
new file mode 100755
index 0000000..5025a36
--- /dev/null
+++ b/history/samba-3.4.12.html
@@ -0,0 +1,43 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Release Notes Archive</title>
+</head>
+
+<body>
+
+   <H2>Samba 3.4.12 Available for Download</H2>
+
+<p>
+<pre>
+                   ==============================
+                   Release Notes for Samba 3.4.12
+			 February 28, 2011
+                   ==============================
+
+
+This is a security release in order to address CVE-2011-0719.
+
+
+o  CVE-2011-0719:
+   All current released versions of Samba are vulnerable to
+   a denial of service caused by memory corruption. Range
+   checks on file descriptors being used in the FD_SET macro
+   were not present allowing stack corruption. This can cause
+   the Samba code to crash or to loop attempting to select
+   on a bad file descriptor set.
+
+
+Changes since 3.4.11
+--------------------
+
+
+o   Jeremy Allison &lt;jra at samba.org&gt;
+    * BUG 7949: Fix DoS in Winbind and smbd with many file descriptors open.
+</pre>
+</p>
+
+</body>
+</html>
diff --git a/history/samba-3.5.7.html b/history/samba-3.5.7.html
new file mode 100755
index 0000000..69858c1
--- /dev/null
+++ b/history/samba-3.5.7.html
@@ -0,0 +1,42 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Release Notes Archive</title>
+</head>
+
+<body>
+
+   <H2>Samba 3.5.7 Available for Download</H2>
+
+<p>
+<pre>
+                   =============================
+                   Release Notes for Samba 3.5.7
+			  February 28, 2011
+                   =============================
+
+
+This is a security release in order to address CVE-2011-0719.
+
+
+o  CVE-2011-0719:
+   All current released versions of Samba are vulnerable to
+   a denial of service caused by memory corruption. Range
+   checks on file descriptors being used in the FD_SET macro
+   were not present allowing stack corruption. This can cause
+   the Samba code to crash or to loop attempting to select
+   on a bad file descriptor set.
+
+
+Changes since 3.5.6:
+--------------------
+
+
+o   Jeremy Allison &lt;jra at samba.org&gt;
+    * BUG 7949: Fix DoS in Winbind and smbd with many file descriptors open.
+</pre>
+
+</body>
+</html>
diff --git a/history/security.html b/history/security.html
index b1c7882..6c9bdb3 100755
--- a/history/security.html
+++ b/history/security.html
@@ -22,6 +22,20 @@ link to full release notes for each release.</p>
       </tr>
 
     <tr>
+	<td>18 Feb 2011</td>
+	<td><a href="/samba/ftp/patches/security/samba-3.3.14-CVE-2011-0719.patch">
+	patch for Samba 3.3.14</a>
+	<a href="/samba/ftp/patches/security/samba-3.4.11-CVE-2011-0719.patch">
+	patch for Samba 3.4.11</a>
+	<a href="/samba/ftp/patches/security/samba-3.5.6-CVE-2011-0719.patch">
+	patch for Samba 3.5.6</a>
+	<td>Denial of service - memory corruption</td>
+	<td>all current releases</td>
+	<td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719">CVE-2011-0719</a></td>
+	<td><a href="/samba/security/CVE-2011-0719.html">Announcement</a></td>
+    </tr>
+
+    <tr>
 	<td>14 Sep 2010</td>
 	<td><a href="/samba/ftp/patches/security/samba-3.3.13-CVE-2010-3069.patch">
 	patch for Samba 3.3.13</a>
diff --git a/latest_stable_release.html b/latest_stable_release.html
index 644822b..c059f0d 100644
--- a/latest_stable_release.html
+++ b/latest_stable_release.html
@@ -1,5 +1,5 @@
 <p>
-	<a href="/samba/ftp/stable/samba-3.5.6.tar.gz">Samba 3.5.6 (gzipped)</a><br>
-	<a href="/samba/history/samba-3.5.6.html">Release Notes</a> &middot;
-	<a href="/samba/ftp/stable/samba-3.5.6.tar.asc">Signature</a>
+	<a href="/samba/ftp/stable/samba-3.5.7.tar.gz">Samba 3.5.7 (gzipped)</a><br>
+	<a href="/samba/history/samba-3.5.7.html">Release Notes</a> &middot;
+	<a href="/samba/ftp/stable/samba-3.5.7.tar.asc">Signature</a>
 </p>
diff --git a/security/CVE-2010-3069.html b/security/CVE-2011-0719.html
similarity index 52%
copy from security/CVE-2010-3069.html
copy to security/CVE-2011-0719.html
index 8683b91..07c14f5 100644
--- a/security/CVE-2010-3069.html
+++ b/security/CVE-2011-0719.html
@@ -8,19 +8,19 @@
 
 <body>
 
-   <H2>CVE-2010-3069: </H2>
+   <H2>CVE-2011-0719: </H2>
 
 <p>
 <pre>
 ===========================================================
-== Subject:     Buffer Overrun Vulnerability
+== Subject:     Denial of service - memory corruption
 ==
-== CVE ID#:     CVE-2010-3069
+== CVE ID#:     CVE-2011-0719
 ==
 == Versions:    Samba 3.0.x - 3.5.x (inclusive)
 ==
 == Summary:     Samba 3.0.x to 3.5.x are affected by a
-==              buffer overrun vulnerability.
+==              denial of service caused by memory corruption.
 ==
 ===========================================================
 
@@ -29,18 +29,21 @@ Description
 ===========
 
 All current released versions of Samba are vulnerable to
-a buffer overrun vulnerability. The sid_parse() function
-(and related dom_sid_parse() function in the source4 code)
-do not correctly check their input lengths when reading a
-binary representation of a Windows SID (Security ID). This
-allows a malicious client to send a sid that can overflow
-the stack variable that is being used to store the SID in the
-Samba smbd server.
-
-A connection to a file share is needed to exploit this
-vulnerability, either authenticated or unauthenticated
+a denial of service caused by memory corruption. Range
+checks on file descriptors being used in the FD_SET macro
+were not present allowing stack corruption. This can cause
+the Samba code to crash or to loop attempting to select
+on a bad file descriptor set.
+
+A connection to a file share, or a local account is needed
+to exploit this problem, either authenticated or unauthenticated
 (guest connection).
 
+Currently we do not believe this flaw is exploitable
+beyond a crash or causing the code to loop, but on the
+advice of our security reviewers we are releasing fixes
+in case an exploit is discovered at a later date.
+
 ==================
 Patch Availability
 ==================
@@ -49,10 +52,10 @@ A patch addressing this defect has been posted to
 
   http://www.samba.org/samba/security/
 
-Additionally, Samba 3.5.5 has been issued as security release to correct the
+Additionally, Samba 3.5.7 has been issued as security release to correct the
 defect.  Patches against older Samba versions are available at
 http://samba.org/samba/patches/.  Samba administrators running affected
-versions are advised to upgrade to 3.5.5 or apply the patch as soon
+versions are advised to upgrade to 3.5.7 or apply the patch as soon
 as possible.
 
 ==========
@@ -66,8 +69,9 @@ Credits
 =======
 
 This problem was found by an internal audit of the Samba code by
-Andrew Bartlett of Cisco. Thanks to Andrew for his careful code
+Volker Lendecke of SerNet. Thanks to Volker for his careful code
 review.
+
 </pre>
 </body>
 </html>


-- 
Samba Website Repository


More information about the samba-cvs mailing list