[SCM] Samba Website Repository - branch master updated

Karolin Seeger kseeger at samba.org
Wed Jan 30 01:57:32 MST 2013


The branch, master has been updated
       via  e6160ed Announce Samba 4.0.4, 3.6.12 and 3.5.21.
      from  3160184 samba-fr moved to hosting at renater

http://gitweb.samba.org/?p=samba-web.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit e6160ed77a7c41f8cb5dfd7931f11c99d0fa2731
Author: Karolin Seeger <kseeger at samba.org>
Date:   Wed Jan 30 09:59:15 2013 +0100

    Announce Samba 4.0.4, 3.6.12 and 3.5.21.
    
    CVE-2013-0213 (Clickjacking issue in SWAT) and
    CVE-2013-0214 (Potential XSRF in SWAT)
    
    Karolin

-----------------------------------------------------------------------

Summary of changes:
 generated_news/latest_10_bodies.html    |   49 +++++++++++++---
 generated_news/latest_10_headlines.html |    4 +-
 generated_news/latest_2_bodies.html     |   52 ++++++++++++++----
 history/header_history.html             |    3 +
 history/samba-3.5.21.html               |   59 ++++++++++++++++++++
 history/samba-3.6.12.html               |   59 ++++++++++++++++++++
 history/samba-4.0.2.html                |   59 ++++++++++++++++++++
 history/security.html                   |   18 ++++++
 latest_stable_release.html              |    6 +-
 security/CVE-2013-0213.html             |   80 +++++++++++++++++++++++++++
 security/CVE-2013-0214.html             |   92 +++++++++++++++++++++++++++++++
 11 files changed, 456 insertions(+), 25 deletions(-)
 create mode 100755 history/samba-3.5.21.html
 create mode 100755 history/samba-3.6.12.html
 create mode 100755 history/samba-4.0.2.html
 create mode 100644 security/CVE-2013-0213.html
 create mode 100644 security/CVE-2013-0214.html


Changeset truncated at 500 lines:

diff --git a/generated_news/latest_10_bodies.html b/generated_news/latest_10_bodies.html
index a666f9c..e4bc79d 100644
--- a/generated_news/latest_10_bodies.html
+++ b/generated_news/latest_10_bodies.html
@@ -1,3 +1,43 @@
+       <h5><a name="4.0.2">30 January 2013</a></h5>
+       <p class="headline">Samba 4.0.2, 3.6.12 and 3.5.21 <b>Security Releases</b> Available for Download</p>
+       <p>These are security releases in order to address
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213">CVE-2013-0213</a>
+       (Samba 3.0.x to 4.0.1 (incl.) are affected by a <b>clickjacking issue in SWAT</b>) and <br>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214">CVE-2013-0214 </a>
+       (Samba 3.0.x to 4.0.1 (incl.) are affected by a <b>potential XSRF in SWAT</b>).</p>
+
+<p>The uncompressed tarballs and patch files have been signed
+using GnuPG (ID 6568B7EA).</p>
+<p>
+The source code can be downloaded here:
+<li><a href="http://samba.org/samba/ftp/stable/samba-4.0.2.tar.gz">download
+Samba 4.0.2</a>,</li>
+<li><a href="http://samba.org/samba/ftp/stable/samba-3.6.12.tar.gz">download
+Samba 3.6.12</a>,</li>
+<li><a href="http://samba.org/samba/ftp/stable/samba-3.5.21.tar.gz">download
+Samba 3.5.21</a>.</li>
+</p>
+
+<p>
+Patches against the parents are also available:
+<li><a href="http://samba.org/samba/ftp/patches/patch-4.0.1-4.0.2.diffs.gz">patch Samba
+4.0.1/4.0.2</a>,</li>
+<li><a href="http://samba.org/samba/ftp/patches/patch-3.6.11-3.6.12.diffs.gz">patch
+Samba 3.6.11/3.6.12</a>,</li>
+<li><a href="http://samba.org/samba/ftp/patches/patch-3.5.20-3.5.21.diffs.gz">patch
+Samba 3.5.20/3.5.21</a>.</li>
+</p>
+
+<p>
+Please see the release notes for more info:
+<li><a href="http://samba.org/samba/history/samba-4.0.2.html">release notes
+Samba 4.0.2</a>,</li>
+<li><a href="http://samba.org/samba/history/samba-3.6.12.html">release notes
+Samba 3.6.12</a>,</li>
+<li><a href="http://samba.org/samba/history/samba-3.5.21.html">release notes
+Samba 3.5.21</a>.</li>
+</p>
+
 	<h5><a name="3.6.11">21 January 2013</a></h5>
 	<p class="headline">Samba 3.6.11 Available for Download</p>
 	<p>This is the latest stable release of the Samba 3.6 series.</p>
@@ -98,12 +138,3 @@ See <a href="https://download.samba.org/pub/samba/rc/WHATSNEW-4-0-0rc5.txt">the
 using GnuPG (ID 6568B7EA).  The source code can be
 <a href="http://samba.org/samba/ftp/stable/samba-3.5.19.tar.gz">downloaded
 now</a>. A <a href="http://samba.org/samba/ftp/patches/patch-3.5.18-3.5.19.diffs.gz">patch against Samba 3.5.18</a> is also available. See <a href="http://samba.org/samba/history/samba-3.5.19.html">the release notes for more info</a>.</p>
-
-	<h5><a name="4.0.0rc4">30 October 2012</a></h5>
-	<p class="headline">Samba 4.0.0rc4 Available for Download</p>
-	<p>This is the fourth release candidate of the Samba 4.0 series.</p>
-
-<p>The uncompressed tarballs and patch files have been signed
-using GnuPG (ID 6568B7EA).  The source code can be
-<a href="https://download.samba.org/pub/samba/rc/samba-4.0.0rc4.tar.gz">downloaded now</a>.
-See <a href="https://download.samba.org/pub/samba/rc/WHATSNEW-4-0-0rc4.txt">the release notes for more info</a>.</p>
diff --git a/generated_news/latest_10_headlines.html b/generated_news/latest_10_headlines.html
index 492893b..4d5c638 100644
--- a/generated_news/latest_10_headlines.html
+++ b/generated_news/latest_10_headlines.html
@@ -1,4 +1,6 @@
 <ul>
+	<li> 30 January 2013 <a href="#4.0.2">Samba 4.0.2, 3.6.12 and 3.5.21 Security Releases Available for Download</a></li>
+
 	<li> 21 January 2013 <a href="#3.6.11">Samba 3.6.11 Available for Download</a></li>
 
 	<li> 15 January 2013 <a href="#CfP">Call for Papers SambaXP 2013</a></li>
@@ -16,6 +18,4 @@
 	<li> 13 November 2012 <a href="#4.0.0rc5">Samba 4.0.0rc5 Available for Download</a></li>
 
 	<li> 05 November 2012 <a href="#3.5.19">Samba 3.5.19 Available for Download</a></li>
-
-	<li> 30 October 2012 <a href="#4.0.0rc4">Samba 4.0.0rc4 Available for Download</a></li>
 </ul>
diff --git a/generated_news/latest_2_bodies.html b/generated_news/latest_2_bodies.html
index 1ae3eec..457bd9c 100644
--- a/generated_news/latest_2_bodies.html
+++ b/generated_news/latest_2_bodies.html
@@ -1,3 +1,44 @@
+       <h5><a name="4.0.2">30 January 2013</a></h5>
+       <p class="headline">Samba 4.0.2, 3.6.12 and 3.5.21 <b>Security Releases</b> Available for Download</p>
+       <p>These are security releases in order to address
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213">CVE-2013-0213</a>
+       (Samba 3.0.x to 4.0.1 (incl.) are affected by a <b>clickjacking issue in SWAT</b>) and <br>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214">CVE-2013-0214 </a>
+       (Samba 3.0.x to 4.0.1 (incl.) are affected by a <b>potential XSRF in SWAT</b>).</p>
+
+<p>The uncompressed tarballs and patch files have been signed
+using GnuPG (ID 6568B7EA).</p>
+<p>
+The source code can be downloaded here:
+<li><a href="http://samba.org/samba/ftp/stable/samba-4.0.2.tar.gz">download
+Samba 4.0.2</a>,</li>
+<li><a href="http://samba.org/samba/ftp/stable/samba-3.6.12.tar.gz">download
+Samba 3.6.12</a>,</li>
+<li><a href="http://samba.org/samba/ftp/stable/samba-3.5.21.tar.gz">download
+Samba 3.5.21</a>.</li>
+</p>
+
+<p>
+Patches against the parents are also available:
+<li><a href="http://samba.org/samba/ftp/patches/patch-4.0.1-4.0.2.diffs.gz">patch Samba
+4.0.1/4.0.2</a>,</li>
+<li><a href="http://samba.org/samba/ftp/patches/patch-3.6.11-3.6.12.diffs.gz">patch
+Samba 3.6.11/3.6.12</a>,</li>
+<li><a href="http://samba.org/samba/ftp/patches/patch-3.5.20-3.5.21.diffs.gz">patch
+Samba 3.5.20/3.5.21</a>.</li>
+</p>
+
+<p>
+Please see the release notes for more info:
+<li><a href="http://samba.org/samba/history/samba-4.0.2.html">release notes
+Samba 4.0.2</a>,</li>
+<li><a href="http://samba.org/samba/history/samba-3.6.12.html">release notes
+Samba 3.6.12</a>,</li>
+<li><a href="http://samba.org/samba/history/samba-3.5.21.html">release notes
+Samba 3.5.21</a>.</li>
+</p>
+
+
 	<h5><a name="3.6.11">21 January 2013</a></h5>
 	<p class="headline">Samba 3.6.11 Available for Download</p>
 	<p>This is the latest stable release of the Samba 3.6 series.</p>
@@ -9,14 +50,3 @@ now</a>. A <a href="http://samba.org/samba/ftp/patches/patch-3.6.10-3.6.11.diffs
 patch against Samba 3.6.10</a> is also available.
 See <a href="http://samba.org/samba/history/samba-3.6.11.html">
 the release notes for more info</a>.</p>
-
-
-	<h5><a name="CfP">15 January 2013</a></h5>
-        <p class="headline">Call for Papers SambaXP 2013</p>
-
-<p>From May 14th to 17th 2013 developers and users will meet again in
-Goettingen, Germany at the 12th international SAMBA conference, the
-"samba eXPerience 2013".</p>
-<p>The call for papers and early bird registration are open until February
-28th 2013. Please find all necessary information at the <a
-href="http://sambaXP.org">conference site</a>.
diff --git a/history/header_history.html b/history/header_history.html
index 5b53276..396241f 100755
--- a/history/header_history.html
+++ b/history/header_history.html
@@ -9,8 +9,10 @@
 		<li><a href="/samba/history/">Release Notes</a>
 		<li class="navSub">
 			<ul>
+			<li><a href="samba-4.0.2.html">samba-4.0.2</a></li>
 			<li><a href="samba-4.0.1.html">samba-4.0.1</a></li>
 			<li><a href="samba-4.0.0.html">samba-4.0.0</a></li>
+			<li><a href="samba-3.6.12.html">samba-3.6.12</a></li>
 			<li><a href="samba-3.6.11.html">samba-3.6.11</a></li>
 			<li><a href="samba-3.6.10.html">samba-3.6.10</a></li>
 			<li><a href="samba-3.6.9.html">samba-3.6.9</a></li>
@@ -23,6 +25,7 @@
 			<li><a href="samba-3.6.2.html">samba-3.6.2</a></li>
 			<li><a href="samba-3.6.1.html">samba-3.6.1</a></li>
 			<li><a href="samba-3.6.0.html">samba-3.6.0</a></li>
+			<li><a href="samba-3.5.21.html">samba-3.5.21</a></li>
 			<li><a href="samba-3.5.20.html">samba-3.5.20</a></li>
 			<li><a href="samba-3.5.19.html">samba-3.5.19</a></li>
 			<li><a href="samba-3.5.18.html">samba-3.5.18</a></li>
diff --git a/history/samba-3.5.21.html b/history/samba-3.5.21.html
new file mode 100755
index 0000000..4411898
--- /dev/null
+++ b/history/samba-3.5.21.html
@@ -0,0 +1,59 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Release Notes Archive</title>
+</head>
+
+<body>
+
+   <H2>Samba 3.5.21 Available for Download</H2>
+
+<p>
+<pre>
+                   ==============================
+                   Release Notes for Samba 3.5.21
+			 January 30, 2013
+                   ==============================
+
+
+This is a security release in order to address
+CVE-2013-0213 (Clickjacking issue in SWAT) and
+CVE-2013-0214 (Potential XSRF in SWAT).
+
+o  CVE-2013-0213:
+   All current released versions of Samba are vulnerable to clickjacking in the
+   Samba Web Administration Tool (SWAT). When the SWAT pages are integrated into
+   a malicious web page via a frame or iframe and then overlaid by other content,
+   an attacker could trick an administrator to potentially change Samba settings.
+
+   In order to be vulnerable, SWAT must have been installed and enabled
+   either as a standalone server launched from inetd or xinetd, or as a
+   CGI plugin to Apache. If SWAT has not been installed or enabled (which
+   is the default install state for Samba) this advisory can be ignored.
+
+o  CVE-2013-0214:
+   All current released versions of Samba are vulnerable to a cross-site
+   request forgery in the Samba Web Administration Tool (SWAT). By guessing a
+   user's password and then tricking a user who is authenticated with SWAT into
+   clicking a manipulated URL on a different web page, it is possible to manipulate
+   SWAT.
+
+   In order to be vulnerable, the attacker needs to know the victim's password.
+   Additionally SWAT must have been installed and enabled either as a standalone
+   server launched from inetd or xinetd, or as a CGI plugin to Apache. If SWAT has
+   not been installed or enabled (which is the default install state for Samba)
+   this advisory can be ignored.
+
+
+Changes since 3.5.20:
+---------------------
+
+o   Kai Blin <kai at samba.org>
+    * BUG 9576: CVE-2013-0213: Fix clickjacking issue in SWAT.
+    * BUG 9577: CVE-2013-0214: Fix potential XSRF in SWAT.
+</pre>
+
+</body>
+</html>
diff --git a/history/samba-3.6.12.html b/history/samba-3.6.12.html
new file mode 100755
index 0000000..c7d5660
--- /dev/null
+++ b/history/samba-3.6.12.html
@@ -0,0 +1,59 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Release Notes Archive</title>
+</head>
+
+<body>
+
+   <H2>Samba 3.6.12 Available for Download</H2>
+
+<p>
+<pre>
+                   ==============================
+                   Release Notes for Samba 3.6.12
+                          January 30, 2013
+                   ==============================
+
+
+This is a security release in order to address
+CVE-2013-0213 (Clickjacking issue in SWAT) and
+CVE-2013-0214 (Potential XSRF in SWAT).
+
+o  CVE-2013-0213:
+   All current released versions of Samba are vulnerable to clickjacking in the
+   Samba Web Administration Tool (SWAT). When the SWAT pages are integrated into
+   a malicious web page via a frame or iframe and then overlaid by other content,
+   an attacker could trick an administrator to potentially change Samba settings.
+
+   In order to be vulnerable, SWAT must have been installed and enabled
+   either as a standalone server launched from inetd or xinetd, or as a
+   CGI plugin to Apache. If SWAT has not been installed or enabled (which
+   is the default install state for Samba) this advisory can be ignored.
+
+o  CVE-2013-0214:
+   All current released versions of Samba are vulnerable to a cross-site
+   request forgery in the Samba Web Administration Tool (SWAT). By guessing a
+   user's password and then tricking a user who is authenticated with SWAT into
+   clicking a manipulated URL on a different web page, it is possible to manipulate
+   SWAT.
+
+   In order to be vulnerable, the attacker needs to know the victim's password.
+   Additionally SWAT must have been installed and enabled either as a standalone
+   server launched from inetd or xinetd, or as a CGI plugin to Apache. If SWAT has
+   not been installed or enabled (which is the default install state for Samba)
+   this advisory can be ignored.
+
+
+Changes since 3.6.11:
+--------------------
+
+o   Kai Blin <kai at samba.org>
+    * BUG 9576: CVE-2013-0213: Fix clickjacking issue in SWAT.
+    * BUG 9577: CVE-2013-0214: Fix potential XSRF in SWAT.
+</pre>
+
+</body>
+</html>
diff --git a/history/samba-4.0.2.html b/history/samba-4.0.2.html
new file mode 100755
index 0000000..84067a0
--- /dev/null
+++ b/history/samba-4.0.2.html
@@ -0,0 +1,59 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Release Notes Archive</title>
+</head>
+
+<body>
+
+   <H2>Samba 4.0.2 Available for Download</H2>
+
+<p>
+<pre>
+                   =============================
+                   Release Notes for Samba 4.0.2
+                         January 30, 2013
+                   =============================
+
+
+This is a security release in order to address
+CVE-2013-0213 (Clickjacking issue in SWAT) and
+CVE-2013-0214 (Potential XSRF in SWAT).
+
+o  CVE-2013-0213:
+   All current released versions of Samba are vulnerable to clickjacking in the
+   Samba Web Administration Tool (SWAT). When the SWAT pages are integrated into
+   a malicious web page via a frame or iframe and then overlaid by other content,
+   an attacker could trick an administrator to potentially change Samba settings.
+
+   In order to be vulnerable, SWAT must have been installed and enabled
+   either as a standalone server launched from inetd or xinetd, or as a
+   CGI plugin to Apache. If SWAT has not been installed or enabled (which
+   is the default install state for Samba) this advisory can be ignored.
+
+o  CVE-2013-0214:
+   All current released versions of Samba are vulnerable to a cross-site
+   request forgery in the Samba Web Administration Tool (SWAT). By guessing a
+   user's password and then tricking a user who is authenticated with SWAT into
+   clicking a manipulated URL on a different web page, it is possible to manipulate
+   SWAT.
+
+   In order to be vulnerable, the attacker needs to know the victim's password.
+   Additionally SWAT must have been installed and enabled either as a standalone
+   server launched from inetd or xinetd, or as a CGI plugin to Apache. If SWAT has
+   not been installed or enabled (which is the default install state for Samba)
+   this advisory can be ignored.
+
+
+Changes since 4.0.1:
+====================
+
+o   Kai Blin <kai at samba.org>
+    * BUG 9576: CVE-2013-0213: Fix clickjacking issue in SWAT.
+    * BUG 9577: CVE-2013-0214: Fix potential XSRF in SWAT.
+</pre>
+
+</body>
+</html>
diff --git a/history/security.html b/history/security.html
index 5c290ce..2df2d4e 100755
--- a/history/security.html
+++ b/history/security.html
@@ -22,6 +22,24 @@ link to full release notes for each release.</p>
       </tr>
 
     <tr>
+	<td>30 Jan 2013</td>
+	<td><a href="/samba/ftp/patches/security/samba-4.0.1-CVE-2013-0213-CVE-2013-0214.patch">
+	patch for Samba 4.0.1</a>
+	<a href="/samba/ftp/patches/security/samba-3.6.11-CVE-2013-0213-CVE-2013-0214.patch">
+	patch for Samba 3.6.11</a>
+	<a href="/samba/ftp/patches/security/samba-3.5.20-CVE-2013-0213-CVE-2013-0214.patch">
+	patch for Samba 3.5.20</a>
+	<td></td>
+	<td>3.0.x-4.0.1</td>
+	<td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213">CVE-2013-0213</a>, 
+	    <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214">CVE-2013-0214</a>
+	</td>
+	<td><a href="/samba/security/CVE-2013-0213">Announcement</a>
+	    <a href="/samba/security/CVE-2013-0214">Announcement</a>
+	</td>
+    </tr>
+
+    <tr>
 	<td>15 Jan 2013</td>
 	<td><a href="/samba/ftp/patches/security/samba-4.0.0-CVE-2013-0172.patch">
 	patch for Samba 4.0.0</a>
diff --git a/latest_stable_release.html b/latest_stable_release.html
index 3703d5d..353e025 100644
--- a/latest_stable_release.html
+++ b/latest_stable_release.html
@@ -1,5 +1,5 @@
 <p>
-	<a href="/samba/ftp/stable/samba-4.0.1.tar.gz">Samba 4.0.1 (gzipped)</a><br>
-	<a href="/samba/history/samba-4.0.1.html">Release Notes</a> ·
-	<a href="/samba/ftp/stable/samba-4.0.1.tar.asc">Signature</a>
+	<a href="/samba/ftp/stable/samba-4.0.2.tar.gz">Samba 4.0.2 (gzipped)</a><br>
+	<a href="/samba/history/samba-4.0.2.html">Release Notes</a> ·
+	<a href="/samba/ftp/stable/samba-4.0.2.tar.asc">Signature</a>
 </p>
diff --git a/security/CVE-2013-0213.html b/security/CVE-2013-0213.html
new file mode 100644
index 0000000..e917f25
--- /dev/null
+++ b/security/CVE-2013-0213.html
@@ -0,0 +1,80 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Security Announcement Archive</title>
+</head>
+
+<body>
+
+   <H2>CVE-2013-0213.html:</H2>
+
+<p>
+<pre>
+===========================================================
+== Subject:     Clickjacking in SWAT
+==
+== CVE ID#:     CVE-2031-0213
+==
+== Versions:    Samba 3.0.x - 4.0.1 (inclusive)
+==
+== Summary:     The Samba Web Administration Tool (SWAT) in Samba versions
+==              3.0.x to 4.0.1 could possibly be used in clickjacking attacks.
+==
+==              Note that SWAT must be enabled in order for this
+==              vulnerability to be exploitable. By default, SWAT
+==              is *not* enabled on a Samba install.
+==
+===========================================================
+
+===========
+Description
+===========
+
+All current released versions of Samba are vulnerable to clickjacking in the
+Samba Web Administration Tool (SWAT). When the SWAT pages are integrated into
+a malicious web page via a frame or iframe and then overlaid by other content,
+an attacker could trick an administrator to potentially change Samba settings.
+
+In order to be vulnerable, SWAT must have been installed and enabled
+either as a standalone server launched from inetd or xinetd, or as a
+CGI plugin to Apache. If SWAT has not been installed or enabled (which
+is the default install state for Samba) this advisory can be ignored.
+
+==========
+Workaround
+==========
+
+Ensure SWAT is turned off and configure Samba using an alternative method
+to edit the smb.conf file.
+
+==================
+Patch Availability
+==================
+
+Patches addressing this defect have been posted to
+
+  http://www.samba.org/samba/security/
+
+Additionally, Samba 4.0.2, 3.6.12 and 3.5.21 have been issued as security
+releases to correct the defect.  Samba administrators running affected versions
+are advised to upgrade to 4.0.2, 3.6.12 or 3.5.21 or apply the patch as soon as
+possible.
+
+=======
+Credits
+=======
+
+The vulnerability was discovered and reported to the Samba Team by Jann Horn.
+The patches for all Samba versions were written and tested by Kai Blin
+(kai at samba.org).
+
+
+==========================================================
+== Our Code, Our Bugs, Our Responsibility.
+== The Samba Team
+==========================================================
+</pre>
+</body>
+</html>
diff --git a/security/CVE-2013-0214.html b/security/CVE-2013-0214.html
new file mode 100644
index 0000000..53421e4
--- /dev/null
+++ b/security/CVE-2013-0214.html
@@ -0,0 +1,92 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>


-- 
Samba Website Repository


More information about the samba-cvs mailing list