Release Announcements
=====================
This is a security release in order to address CVE-2010-2063.
o CVE-2010-2063:
In Samba 3.3.x and below, a buffer overrun is possible in chain_reply code.
Changes since 3.3.12
--------------------
o Jeremy Allison
* BUG 7494: Fix for CVE-2010-2063.
CVE-2010-2063 = samba: memory corruption vulnerability
================
Download Details
================
The uncompressed tarballs and patch files have been signed
using GnuPG (ID 6568B7EA). The source code can be downloaded
from:
http://download.samba.org/samba/ftp/
The release notes are available online at:
http://www.samba.org/samba/ftp/history/samba-3.3.13.html
Binary packages will be made available on a volunteer basis from
http://download.samba.org/samba/ftp/Binary_Packages/