diff options
author | Karolin Seeger <kseeger@samba.org> | 2013-07-29 20:55:18 +0200 |
---|---|---|
committer | Karolin Seeger <kseeger@samba.org> | 2013-07-29 20:55:18 +0200 |
commit | e03ad1401fd1cca54f9f5c4c1e98ec9ad87b5565 (patch) | |
tree | 26b138b32a45ccd0f446f8861e309c414e2f7f74 /WHATSNEW.txt | |
parent | efdbcabbe97a594572d71d714d258a5854c5d8ce (diff) | |
download | samba-e03ad1401fd1cca54f9f5c4c1e98ec9ad87b5565.tar.gz |
WHATSNEW: Add release notes for Samba 3.6.17.samba-3.6.17
Signed-off-by: Karolin Seeger <kseeger@samba.org>
Diffstat (limited to 'WHATSNEW.txt')
-rw-r--r-- | WHATSNEW.txt | 23 |
1 files changed, 19 insertions, 4 deletions
diff --git a/WHATSNEW.txt b/WHATSNEW.txt index a921e4a7a25..4291736269a 100644 --- a/WHATSNEW.txt +++ b/WHATSNEW.txt @@ -1,19 +1,34 @@ ============================== Release Notes for Samba 3.6.17 - August 14, 2013 + August 05, 2013 ============================== -This is is the latest stable release of Samba 3.6. +This is a security release in order to address +CVE-2013-4124 (Missing integer wrap protection in EA list reading can cause +server to loop with DOS). + +o CVE-2013-4124: + All current released versions of Samba are vulnerable to a denial of + service on an authenticated or guest connection. A malformed packet + can cause the smbd server to loop the CPU performing memory + allocations and preventing any further service. + + A connection to a file share, or a local account is needed to exploit + this problem, either authenticated or unauthenticated if guest + connections are allowed. -Major enhancements in Samba 3.6.17 include: + This flaw is not exploitable beyond causing the code to loop + allocating memory, which may cause the machine to exceed memory + limits. -o Changes since 3.6.16: --------------------- o Jeremy Allison <jra@samba.org> + * BUG 10010: CVE-2013-4124: Missing integer wrap protection in EA list + reading can cause server to loop with DOS. ###################################################################### |