Samba 3.3.13 Security Release Available for Download

Release Announcements
=====================

This is a security release in order to address CVE-2010-2063.

o CVE-2010-2063:
In Samba 3.3.x and below, a buffer overrun is possible in chain_reply code.

Changes since 3.3.12
——————–

o Jeremy Allison <jra@samba.org>
* BUG 7494: Fix for CVE-2010-2063.

######################################################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don’t provide vital information to help us track down
the problem then you will probably be ignored. All bug reports should
be filed under the Samba 3.3 product in the project’s Bugzilla
database (https://bugzilla.samba.org/).

======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================

================
Download Details
================

The uncompressed tarballs and patch files have been signed
using GnuPG (ID 6568B7EA). The source code can be downloaded
from:

http://download.samba.org/samba/ftp/

The release notes are available online at:

http://www.samba.org/samba/ftp/history/samba-3.3.13.html

Binary packages will be made available on a volunteer basis from

http://download.samba.org/samba/ftp/Binary_Packages/

Our Code, Our Bugs, Our Responsibility.
(https://bugzilla.samba.org/)

–Enjoy
The Samba Team

Comments are closed.