News
Samba 3.5.7, 3.4.12 and 3.3.15 Security Releases
EcusE
2011. 3. 1. 12:13
Release Announcements ===================== Samba 3.5.7, 3.4.12 and 3.3.15 are security releases in order to address CVE-2011-0719. o CVE-2011-0719: All current released versions of Samba are vulnerable to a denial of service caused by memory corruption.
Range checks on file descriptors being used in the FD_SET macro were not present allowing stack corruption.
This can cause the Samba code to crash or to loop attempting to select on a bad file descriptor set. A connection to a file share, or a local account is needed to exploit this problem, either authenticated or
unauthenticated (guest connection). Currently we do not believe this flaw is exploitable beyond a crash or causing the code to loop, but on the
advice of our security reviewers we are releasing fixes in case an exploit is discovered at a later date.
Changes ------- o Jeremy Allison * BUG 7949: Fix DoS in Winbind and smbd with many file descriptors open. ================ Download Details ================ The uncompressed tarballs and patch files have been signed using GnuPG (ID 6568B7EA).
The source code can be downloaded from: http://download.samba.org/samba/ftp/ The release notes are available online at: http://www.samba.org/samba/ftp/history/samba-3.5.7.html http://www.samba.org/samba/ftp/history/samba-3.4.12.html http://www.samba.org/samba/ftp/history/samba-3.3.15.html Binary packages will be made available on a volunteer basis from http://download.samba.org/samba/ftp/Binary_Packages/
관련 링크 : http://samba.org/samba/history/security.html