summaryrefslogtreecommitdiff
path: root/WHATSNEW.txt
diff options
context:
space:
mode:
authorKarolin Seeger <kseeger@samba.org>2013-07-29 20:55:18 +0200
committerKarolin Seeger <kseeger@samba.org>2013-07-29 20:55:18 +0200
commite03ad1401fd1cca54f9f5c4c1e98ec9ad87b5565 (patch)
tree26b138b32a45ccd0f446f8861e309c414e2f7f74 /WHATSNEW.txt
parentefdbcabbe97a594572d71d714d258a5854c5d8ce (diff)
downloadsamba-e03ad1401fd1cca54f9f5c4c1e98ec9ad87b5565.tar.gz
WHATSNEW: Add release notes for Samba 3.6.17.samba-3.6.17
Signed-off-by: Karolin Seeger <kseeger@samba.org>
Diffstat (limited to 'WHATSNEW.txt')
-rw-r--r--WHATSNEW.txt23
1 files changed, 19 insertions, 4 deletions
diff --git a/WHATSNEW.txt b/WHATSNEW.txt
index a921e4a7a25..4291736269a 100644
--- a/WHATSNEW.txt
+++ b/WHATSNEW.txt
@@ -1,19 +1,34 @@
==============================
Release Notes for Samba 3.6.17
- August 14, 2013
+ August 05, 2013
==============================
-This is is the latest stable release of Samba 3.6.
+This is a security release in order to address
+CVE-2013-4124 (Missing integer wrap protection in EA list reading can cause
+server to loop with DOS).
+
+o CVE-2013-4124:
+ All current released versions of Samba are vulnerable to a denial of
+ service on an authenticated or guest connection. A malformed packet
+ can cause the smbd server to loop the CPU performing memory
+ allocations and preventing any further service.
+
+ A connection to a file share, or a local account is needed to exploit
+ this problem, either authenticated or unauthenticated if guest
+ connections are allowed.
-Major enhancements in Samba 3.6.17 include:
+ This flaw is not exploitable beyond causing the code to loop
+ allocating memory, which may cause the machine to exceed memory
+ limits.
-o
Changes since 3.6.16:
---------------------
o Jeremy Allison <jra@samba.org>
+ * BUG 10010: CVE-2013-4124: Missing integer wrap protection in EA list
+ reading can cause server to loop with DOS.
######################################################################