[SCM] Samba Website Repository - branch master updated
Karolin Seeger
kseeger at samba.org
Mon Feb 28 06:19:58 MST 2011
The branch, master has been updated
via 183ec42 Update security information.
via 34591f4 Announce Samba 3.5.7, 3.4.12 and 3.3.15.
from b445431 update irclog URL
http://gitweb.samba.org/?p=samba-web.git;a=shortlog;h=master
- Log -----------------------------------------------------------------
commit 183ec42bcd69888e23bc2fa0dafc62f5dfe1b7bb
Author: Karolin Seeger <kseeger at samba.org>
Date: Mon Feb 28 13:58:26 2011 +0100
Update security information.
Karolin
commit 34591f495f8e0b7890ef06406f43177c49901457
Author: Karolin Seeger <kseeger at samba.org>
Date: Mon Feb 28 13:34:01 2011 +0100
Announce Samba 3.5.7, 3.4.12 and 3.3.15.
Karolin
-----------------------------------------------------------------------
Summary of changes:
generated_news/latest_10_bodies.html | 79 ++++++++-----------
generated_news/latest_10_headlines.html | 6 ++
generated_news/latest_2_bodies.html | 34 +++-----
history/header_history.html | 3 +
history/samba-3.3.15.html | 43 +++++++++++
history/samba-3.4.12.html | 43 +++++++++++
history/samba-3.5.7.html | 42 ++++++++++
history/security.html | 14 ++++
latest_stable_release.html | 6 +-
.../{CVE-2010-3069.html => CVE-2011-0719.html} | 38 +++++----
10 files changed, 221 insertions(+), 87 deletions(-)
create mode 100755 history/samba-3.3.15.html
create mode 100755 history/samba-3.4.12.html
create mode 100755 history/samba-3.5.7.html
copy security/{CVE-2010-3069.html => CVE-2011-0719.html} (52%)
Changeset truncated at 500 lines:
diff --git a/generated_news/latest_10_bodies.html b/generated_news/latest_10_bodies.html
index bdb6bf8..c44ce2b 100644
--- a/generated_news/latest_10_bodies.html
+++ b/generated_news/latest_10_bodies.html
@@ -1,4 +1,36 @@
-
+ <h5><a name="3.5.7">28 February 2011</a></h5>
+ <p class="headline">Samba 3.5.7 Security Release Available</p>
+
+ <p>This is a security release to address <a href="http://www.samba.org/samba/security/CVE-2011-0719">CVE-2011-0719</a> (Denial of service - memory corruption). Patches for all current releases are available on our <a href="http://www.samba.org/samba/security/">security page</a>.</p>
+
+<p>The uncompressed tarballs and patch files have been signed
+using GnuPG (ID 6568B7EA). The source code can be
+<a href="http://www.samba.org/samba/ftp/stable/samba-3.5.7.tar.gz">downloaded now</a>.
+See <a href="http://www.samba.org/samba/history/samba-3.5.7.html">the release notes for more
+info</a>.</p>
+
+ <h5><a name="3.4.12">28 February 2011</a></h5>
+ <p class="headline">Samba 3.4.12 Security Release Available</p>
+
+ <p>This is a security release to address <a href="http://www.samba.org/samba/security/CVE-2011-0719">CVE-2011-0719</a> (Denial of service - memory corruption). Patches for all current releases are available on our <a href="http://www.samba.org/samba/security/">security page</a>.</p>
+
+<p>The uncompressed tarballs and patch files have been signed
+using GnuPG (ID 6568B7EA). The source code can be
+<a href="http://www.samba.org/samba/ftp/stable/samba-3.4.12.tar.gz">downloaded now</a>.
+See <a href="http://www.samba.org/samba/history/samba-3.4.12.html">the release notes for more
+info</a>.</p>
+
+ <h5><a name="3.3.15">28 February 2011</a></h5>
+ <p class="headline">Samba 3.3.15 Security Release Available</p>
+
+ <p>This is a security release to address <a href="http://www.samba.org/samba/security/CVE-2011-0719">CVE-2011-0719</a> (Denial of service - memory corruption). Patches for all current releases are available on our <a href="http://www.samba.org/samba/security/">security page</a>.</p>
+
+<p>The uncompressed tarballs and patch files have been signed
+using GnuPG (ID 6568B7EA). The source code can be
+<a href="http://www.samba.org/samba/ftp/stable/samba-3.3.15.tar.gz">downloaded now</a>.
+See <a href="http://www.samba.org/samba/history/samba-3.3.15.html">the release notes for more
+info</a>.</p>
+
<h5><a name="3.4.11"> 23 January 2011</a></h5>
<p class="headline">Samba 3.4.11 Available for Download</p>
<p>This is the latest stable release of the Samba 3.4 series.</p>
@@ -100,48 +132,3 @@ using GnuPG (ID 6568B7EA). The source code can be
See <a href="http://www.samba.org/samba/history/samba-3.3.14.html">the release notes for more
info</a>.</p>
-
- <h5><a name="3.6.0pre1">28 July 2010</a></h5>
- <p class="headline">Samba 3.6.0pre1 Available for Download</p>
- <p>Samba 3.6.0pre1 is available for download. This is a
- preview of the next upgrade production release version of Samba.
- It is intended for <b>testing purposes only</b>. Please test and
- <a href="https://bugzilla.samba.org/">report any bugs that you
- find</a>. Please read the changes in the
- <a href="http://samba.org/samba/ftp/pre/WHATSNEW-3-6-0pre1.txt">Release Notes</a>
- for details on new features and difference in behavior from
- previous releases.</p>
-
- <p>The <a href="http://samba.org/samba/ftp/pre/samba-3.6.0pre1.tar.gz">Samba 3.6.0pre1
- source code</a> can be downloaded now. The <a
- href="http://samba.org/samba/ftp/pre/samba-3.6.0pre1.tar.asc">GnuPG
- signature is for the <em>un</em>compressed tarball</a>.
- Precompiled packages will
- be made available on a volunteer basis and can be found in the
- <a href="http://samba.org/samba/ftp/Binary_Packages/">Binary_Packages download area</a>.</p>
-
-
- <h5><a name="3.5.4">23 June 2010</a></h5>
- <p class="headline">Samba 3.5.4 Available for Download</p>
- <p>This is the latest stable release of the Samba 3.5 series.</p>
-
-<p>The uncompressed tarballs and patch files have been signed
-using GnuPG (ID 6568B7EA). The source code can be
-<a href="http://samba.org/samba/ftp/stable/samba-3.5.4.tar.gz">downloaded
-now</a>. A <a href="http://samba.org/samba/ftp/patches/patch-3.5.3-3.5.4.diffs.gz">patch against
-Samba 3.5.3</a> is also available. See <a href="http://samba.org/samba/history/samba-3.5.4.html">the
-release notes for more info</a>.</p>
-
-
- <h5><a name="3.3.13">16 June 2010</a></h5>
- <p class="headline">Samba 3.3.13 Security Release Available</p>
- <p>This is a security release to address <a href="http://www.samba.org/samba/security/CVE-2010-2063">CVE-2010-2063</a>.
-
-Patches for all current releases are available on our <a href="http://www.samba.org/samba/security/">security page</a>.</p>
-
-<p>The uncompressed tarballs and patch files have been signed
-using GnuPG (ID 6568B7EA). The source code can be
-<a href="http://www.samba.org/samba/ftp/stable/samba-3.3.13.tar.gz">downloaded now</a>.
-See <a href="http://www.samba.org/samba/history/samba-3.3.13.html">the release notes for more
-info</a>.</p>
-
diff --git a/generated_news/latest_10_headlines.html b/generated_news/latest_10_headlines.html
index 9ce8279..bf80517 100644
--- a/generated_news/latest_10_headlines.html
+++ b/generated_news/latest_10_headlines.html
@@ -1,4 +1,10 @@
<ul>
+ <li> 28 February 2011 <a href="#3.5.7">Samba 3.5.7 Available for Download</a></li>
+
+ <li> 28 February 2011 <a href="#3.4.12">Samba 3.4.12 Available for Download</a></li>
+
+ <li> 28 February 2011 <a href="#3.3.15">Samba 3.3.15 Available for Download</a></li>
+
<li> 23 January 2011 <a href="#3.4.11">Samba 3.4.11 Available for Download</a></li>
<li> 22 January 2011 <a href="#3.4.10">Samba 3.4.10 Available for Download</a></li>
diff --git a/generated_news/latest_2_bodies.html b/generated_news/latest_2_bodies.html
index cae4443..80e4e98 100644
--- a/generated_news/latest_2_bodies.html
+++ b/generated_news/latest_2_bodies.html
@@ -1,29 +1,21 @@
- <h5><a name="3.4.11"> 23 January 2011</a></h5>
- <p class="headline">Samba 3.4.11 Available for Download</p>
- <p>This is the latest stable release of the Samba 3.4 series.</p>
+ <h5><a name="3.5.7">28 February 2011</a></h5>
+ <p class="headline">Samba 3.5.7 Security Release Available</p>
+
+ <p>This is a security release to address <a href="http://www.samba.org/samba/security/CVE-2011-0719">CVE-2011-0719</a> (Denial of service - memory corruption). Patches for all current releases are available on our <a href="http://www.samba.org/samba/security/">security page</a>.</p>
<p>The uncompressed tarballs and patch files have been signed
using GnuPG (ID 6568B7EA). The source code can be
-<a href="http://samba.org/samba/ftp/stable/samba-3.4.11.tar.gz">downloaded
-now</a>. A <a
-href="http://samba.org/samba/ftp/patches/patch-3.4.10-3.4.11.diffs.gz">patch
-against
-Samba 3.4.10</a> is also available. See <a
-href="http://samba.org/samba/history/samba-3.4.11.html">the
-release notes for more info</a>.</p>
+<a href="http://www.samba.org/samba/ftp/stable/samba-3.5.7.tar.gz">downloaded now</a>.
+See <a href="http://www.samba.org/samba/history/samba-3.5.7.html">the release notes for more
+info</a>.</p>
+ <h5><a name="3.4.12">28 February 2011</a></h5>
+ <p class="headline">Samba 3.4.12 Security Release Available</p>
- <h5><a name="3.4.10"> 22 January 2011</a></h5>
- <p class="headline">Samba 3.4.10 Available for Download</p>
- <p>This is the latest stable release of the Samba 3.4 series.</p>
+ <p>This is a security release to address <a href="http://www.samba.org/samba/security/CVE-2011-0719">CVE-2011-0719</a> (Denial of service - memory corruption). Patches for all current releases are available on our <a href="http://www.samba.org/samba/security/">security page</a>.</p>
<p>The uncompressed tarballs and patch files have been signed
using GnuPG (ID 6568B7EA). The source code can be
-<a href="http://samba.org/samba/ftp/stable/samba-3.4.10.tar.gz">downloaded
-now</a>. A <a
-href="http://samba.org/samba/ftp/patches/patch-3.4.9-3.4.10.diffs.gz">patch
-against
-Samba 3.4.9</a> is also available. See <a
-href="http://samba.org/samba/history/samba-3.4.10.html">the
-release notes for more info</a>.</p>
-
+<a href="http://www.samba.org/samba/ftp/stable/samba-3.4.12.tar.gz">downloaded now</a>.
+See <a href="http://www.samba.org/samba/history/samba-3.4.12.html">the release notes for more
+info</a>.</p>
diff --git a/history/header_history.html b/history/header_history.html
index ce706b0..161ee6a 100755
--- a/history/header_history.html
+++ b/history/header_history.html
@@ -9,6 +9,7 @@
<li><a href="/samba/history/">Release Notes</a>
<li class="navSub">
<ul>
+ <li><a href="samba-3.5.7.html">samba-3.5.7</a></li>
<li><a href="samba-3.5.6.html">samba-3.5.6</a></li>
<li><a href="samba-3.5.5.html">samba-3.5.5</a></li>
<li><a href="samba-3.5.4.html">samba-3.5.4</a></li>
@@ -16,6 +17,7 @@
<li><a href="samba-3.5.2.html">samba-3.5.2</a></li>
<li><a href="samba-3.5.1.html">samba-3.5.1</a></li>
<li><a href="samba-3.5.0.html">samba-3.5.0</a></li>
+ <li><a href="samba-3.4.12.html">samba-3.4.12</a></li>
<li><a href="samba-3.4.11.html">samba-3.4.11</a></li>
<li><a href="samba-3.4.10.html">samba-3.4.10</a></li>
<li><a href="samba-3.4.9.html">samba-3.4.9</a></li>
@@ -28,6 +30,7 @@
<li><a href="samba-3.4.2.html">samba-3.4.2</a></li>
<li><a href="samba-3.4.1.html">samba-3.4.1</a></li>
<li><a href="samba-3.4.0.html">samba-3.4.0</a></li>
+ <li><a href="samba-3.3.15.html">samba-3.3.15</a></li>
<li><a href="samba-3.3.14.html">samba-3.3.14</a></li>
<li><a href="samba-3.3.13.html">samba-3.3.13</a></li>
<li><a href="samba-3.3.12.html">samba-3.3.12</a></li>
diff --git a/history/samba-3.3.15.html b/history/samba-3.3.15.html
new file mode 100755
index 0000000..490591b
--- /dev/null
+++ b/history/samba-3.3.15.html
@@ -0,0 +1,43 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Release Notes Archive</title>
+</head>
+
+<body>
+
+ <H2>Samba 3.3.15 Available for Download</H2>
+
+<p>
+<pre>
+ ==============================
+ Release Notes for Samba 3.3.15
+ February 28, 2011
+ ==============================
+
+
+This is a security release in order to address CVE-2011-0719.
+
+
+o CVE-2011-0719:
+ All current released versions of Samba are vulnerable to
+ a denial of service caused by memory corruption. Range
+ checks on file descriptors being used in the FD_SET macro
+ were not present allowing stack corruption. This can cause
+ the Samba code to crash or to loop attempting to select
+ on a bad file descriptor set.
+
+
+Changes since 3.3.14
+--------------------
+
+
+o Jeremy Allison <jra at samba.org>
+ * BUG 7949: Fix DoS in Winbind and smbd with many file descriptors open.
+</pre>
+</p>
+
+</body>
+</html>
diff --git a/history/samba-3.4.12.html b/history/samba-3.4.12.html
new file mode 100755
index 0000000..5025a36
--- /dev/null
+++ b/history/samba-3.4.12.html
@@ -0,0 +1,43 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Release Notes Archive</title>
+</head>
+
+<body>
+
+ <H2>Samba 3.4.12 Available for Download</H2>
+
+<p>
+<pre>
+ ==============================
+ Release Notes for Samba 3.4.12
+ February 28, 2011
+ ==============================
+
+
+This is a security release in order to address CVE-2011-0719.
+
+
+o CVE-2011-0719:
+ All current released versions of Samba are vulnerable to
+ a denial of service caused by memory corruption. Range
+ checks on file descriptors being used in the FD_SET macro
+ were not present allowing stack corruption. This can cause
+ the Samba code to crash or to loop attempting to select
+ on a bad file descriptor set.
+
+
+Changes since 3.4.11
+--------------------
+
+
+o Jeremy Allison <jra at samba.org>
+ * BUG 7949: Fix DoS in Winbind and smbd with many file descriptors open.
+</pre>
+</p>
+
+</body>
+</html>
diff --git a/history/samba-3.5.7.html b/history/samba-3.5.7.html
new file mode 100755
index 0000000..69858c1
--- /dev/null
+++ b/history/samba-3.5.7.html
@@ -0,0 +1,42 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Release Notes Archive</title>
+</head>
+
+<body>
+
+ <H2>Samba 3.5.7 Available for Download</H2>
+
+<p>
+<pre>
+ =============================
+ Release Notes for Samba 3.5.7
+ February 28, 2011
+ =============================
+
+
+This is a security release in order to address CVE-2011-0719.
+
+
+o CVE-2011-0719:
+ All current released versions of Samba are vulnerable to
+ a denial of service caused by memory corruption. Range
+ checks on file descriptors being used in the FD_SET macro
+ were not present allowing stack corruption. This can cause
+ the Samba code to crash or to loop attempting to select
+ on a bad file descriptor set.
+
+
+Changes since 3.5.6:
+--------------------
+
+
+o Jeremy Allison <jra at samba.org>
+ * BUG 7949: Fix DoS in Winbind and smbd with many file descriptors open.
+</pre>
+
+</body>
+</html>
diff --git a/history/security.html b/history/security.html
index b1c7882..6c9bdb3 100755
--- a/history/security.html
+++ b/history/security.html
@@ -22,6 +22,20 @@ link to full release notes for each release.</p>
</tr>
<tr>
+ <td>18 Feb 2011</td>
+ <td><a href="/samba/ftp/patches/security/samba-3.3.14-CVE-2011-0719.patch">
+ patch for Samba 3.3.14</a>
+ <a href="/samba/ftp/patches/security/samba-3.4.11-CVE-2011-0719.patch">
+ patch for Samba 3.4.11</a>
+ <a href="/samba/ftp/patches/security/samba-3.5.6-CVE-2011-0719.patch">
+ patch for Samba 3.5.6</a>
+ <td>Denial of service - memory corruption</td>
+ <td>all current releases</td>
+ <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719">CVE-2011-0719</a></td>
+ <td><a href="/samba/security/CVE-2011-0719.html">Announcement</a></td>
+ </tr>
+
+ <tr>
<td>14 Sep 2010</td>
<td><a href="/samba/ftp/patches/security/samba-3.3.13-CVE-2010-3069.patch">
patch for Samba 3.3.13</a>
diff --git a/latest_stable_release.html b/latest_stable_release.html
index 644822b..c059f0d 100644
--- a/latest_stable_release.html
+++ b/latest_stable_release.html
@@ -1,5 +1,5 @@
<p>
- <a href="/samba/ftp/stable/samba-3.5.6.tar.gz">Samba 3.5.6 (gzipped)</a><br>
- <a href="/samba/history/samba-3.5.6.html">Release Notes</a> ·
- <a href="/samba/ftp/stable/samba-3.5.6.tar.asc">Signature</a>
+ <a href="/samba/ftp/stable/samba-3.5.7.tar.gz">Samba 3.5.7 (gzipped)</a><br>
+ <a href="/samba/history/samba-3.5.7.html">Release Notes</a> ·
+ <a href="/samba/ftp/stable/samba-3.5.7.tar.asc">Signature</a>
</p>
diff --git a/security/CVE-2010-3069.html b/security/CVE-2011-0719.html
similarity index 52%
copy from security/CVE-2010-3069.html
copy to security/CVE-2011-0719.html
index 8683b91..07c14f5 100644
--- a/security/CVE-2010-3069.html
+++ b/security/CVE-2011-0719.html
@@ -8,19 +8,19 @@
<body>
- <H2>CVE-2010-3069: </H2>
+ <H2>CVE-2011-0719: </H2>
<p>
<pre>
===========================================================
-== Subject: Buffer Overrun Vulnerability
+== Subject: Denial of service - memory corruption
==
-== CVE ID#: CVE-2010-3069
+== CVE ID#: CVE-2011-0719
==
== Versions: Samba 3.0.x - 3.5.x (inclusive)
==
== Summary: Samba 3.0.x to 3.5.x are affected by a
-== buffer overrun vulnerability.
+== denial of service caused by memory corruption.
==
===========================================================
@@ -29,18 +29,21 @@ Description
===========
All current released versions of Samba are vulnerable to
-a buffer overrun vulnerability. The sid_parse() function
-(and related dom_sid_parse() function in the source4 code)
-do not correctly check their input lengths when reading a
-binary representation of a Windows SID (Security ID). This
-allows a malicious client to send a sid that can overflow
-the stack variable that is being used to store the SID in the
-Samba smbd server.
-
-A connection to a file share is needed to exploit this
-vulnerability, either authenticated or unauthenticated
+a denial of service caused by memory corruption. Range
+checks on file descriptors being used in the FD_SET macro
+were not present allowing stack corruption. This can cause
+the Samba code to crash or to loop attempting to select
+on a bad file descriptor set.
+
+A connection to a file share, or a local account is needed
+to exploit this problem, either authenticated or unauthenticated
(guest connection).
+Currently we do not believe this flaw is exploitable
+beyond a crash or causing the code to loop, but on the
+advice of our security reviewers we are releasing fixes
+in case an exploit is discovered at a later date.
+
==================
Patch Availability
==================
@@ -49,10 +52,10 @@ A patch addressing this defect has been posted to
http://www.samba.org/samba/security/
-Additionally, Samba 3.5.5 has been issued as security release to correct the
+Additionally, Samba 3.5.7 has been issued as security release to correct the
defect. Patches against older Samba versions are available at
http://samba.org/samba/patches/. Samba administrators running affected
-versions are advised to upgrade to 3.5.5 or apply the patch as soon
+versions are advised to upgrade to 3.5.7 or apply the patch as soon
as possible.
==========
@@ -66,8 +69,9 @@ Credits
=======
This problem was found by an internal audit of the Samba code by
-Andrew Bartlett of Cisco. Thanks to Andrew for his careful code
+Volker Lendecke of SerNet. Thanks to Volker for his careful code
review.
+
</pre>
</body>
</html>
--
Samba Website Repository
More information about the samba-cvs
mailing list