Samba 3.6.3 Security Release Available

Release Announcements
=====================

This is a security release in order to address
CVE-2012-0817 (Memory leak/Denial of service).

o CVE-2012-0817:
The Samba File Serving daemon (smbd) in Samba versions
3.6.0 to 3.6.2 is affected by a memory leak that can
cause a server denial of service.

Changes since 3.6.2:
——————–

o Jeremy Allison <jra@samba.org>
* BUG 8724: Fix memory leak in parent smbd on connection.

o Ira Cooper <samba@ira.wakeful.net>
* BUG 8724: Fix memory leak in parent smbd on connection.

######################################################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don’t provide vital information to help us track down
the problem then you will probably be ignored. All bug reports should
be filed under the Samba 3.6 product in the project’s Bugzilla
database (https://bugzilla.samba.org/).

======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================

================
Download Details
================

The uncompressed tarballs and patch files have been signed
using GnuPG (ID 6568B7EA). The source code can be downloaded
from:

http://download.samba.org/samba/ftp/stable

The release notes are available online at:

http://www.samba.org/samba/history/samba-3.6.3.html

Binary packages will be made available on a volunteer basis from

http://download.samba.org/samba/ftp/Binary_Packages/

Our Code, Our Bugs, Our Responsibility.
(https://bugzilla.samba.org/)

–Enjoy
The Samba Team

Comments are closed.