X-Git-Url: http://git.samba.org/?a=blobdiff_plain;f=WHATSNEW.txt;h=712748f58758a127465f6dc9c7763ee26322a665;hb=5118001d493061a4a3ec757332f0bff5c1e056d4;hp=09934595329ffedceb35e3366806048b86765f34;hpb=33d332960fa266a08ff0ee72945101051fa4d71e;p=samba.git diff --git a/WHATSNEW.txt b/WHATSNEW.txt index 09934595329..712748f5875 100644 --- a/WHATSNEW.txt +++ b/WHATSNEW.txt @@ -1,3 +1,92 @@ + ============================== + Release Notes for Samba 3.5.15 + , 2012 + ============================== + + +This is the latest stable release of Samba 3.5. + +Major enhancements in Samba 3.5.15 include: + +o + +Changes since 3.5.14: +--------------------- + + +o Stefan Metzmacher + + +###################################################################### +Reporting bugs & Development Discussion +####################################### + +Please discuss this release on the samba-technical mailing list or by +joining the #samba-technical IRC channel on irc.freenode.net. + +If you do report problems then please try to send high quality +feedback. If you don't provide vital information to help us track down +the problem then you will probably be ignored. All bug reports should +be filed under the Samba 3.5 product in the project's Bugzilla +database (https://bugzilla.samba.org/). + + +====================================================================== +== Our Code, Our Bugs, Our Responsibility. +== The Samba Team +====================================================================== + + +Release notes for older releases follow: +---------------------------------------- + + ============================== + Release Notes for Samba 3.5.14 + April 10, 2012 + ============================== + + +This is a security release in order to address +CVE-2012-1182 ("root" credential remote code execution). + +o CVE-2012-1182: + Samba 3.0.x to 3.6.3 are affected by a + vulnerability that allows remote code + execution as the "root" user. + + +Changes since 3.5.13: +--------------------- + + +o Stefan Metzmacher + *BUG 8815: PIDL based autogenerated code allows overwriting beyond of + allocated array (CVE-2012-1182). + + +###################################################################### +Reporting bugs & Development Discussion +####################################### + +Please discuss this release on the samba-technical mailing list or by +joining the #samba-technical IRC channel on irc.freenode.net. + +If you do report problems then please try to send high quality +feedback. If you don't provide vital information to help us track down +the problem then you will probably be ignored. All bug reports should +be filed under the Samba 3.5 product in the project's Bugzilla +database (https://bugzilla.samba.org/). + + +====================================================================== +== Our Code, Our Bugs, Our Responsibility. +== The Samba Team +====================================================================== + + +---------------------------------------------------------------------- + + ============================== Release Notes for Samba 3.5.13 March 12, 2012 @@ -121,8 +210,8 @@ database (https://bugzilla.samba.org/). ====================================================================== -Release notes for older releases follow: ----------------------------------------- +---------------------------------------------------------------------- + ============================== Release Notes for Samba 3.5.12