3.0.x and 2.2.x versions of Samba, which are no longer in active development.
</p>
-<p>The latest production release is <em>Samba 3.4.1</em> (<a
+<p>The latest production release is <em>Samba 3.4.2</em> (<a
href="/samba/history/samba-3.4.1.html">release notes</a> and <a
href="/samba/download/">download</a>).</p>
<div class="releases">
<h4>Current Stable Release</h4>
<ul>
- <li><a href="/samba/ftp/stable/samba-3.4.1.tar.gz">Samba 3.4.1 (gzipped)</a></li>
- <li><a href="/samba/history/samba-3.4.1.html">Release Notes</a></li>
- <li><a href="/samba/ftp/stable/samba-3.4.1.tar.asc">Signature</a></li>
+ <li><a href="/samba/ftp/stable/samba-3.4.2.tar.gz">Samba 3.4.2 (gzipped)</a></li>
+ <li><a href="/samba/history/samba-3.4.2.html">Release Notes</a></li>
+ <li><a href="/samba/ftp/stable/samba-3.4.2.tar.asc">Signature</a></li>
</ul>
<h4>Historical</h4>
<ul>
- <li><a href="/samba/ftp/stable/samba-3.3.7.tar.gz">Samba 3.3.7 (gzipped)</a></li>
- <li><a href="/samba/history/samba-3.3.7.html">Release Notes 3.3.7</a></li>
- <li><a href="/samba/ftp/stable/samba-3.3.7.tar.asc">Signature 3.3.7</a></li>
-
- <li><a href="/samba/ftp/stable/samba-3.2.14.tar.gz">Samba 3.2.14 (gzipped)</a></li>
- <li><a href="/samba/history/samba-3.2.14.html">Release Notes 3.2.14</a></li>
- <li><a href="/samba/ftp/stable/samba-3.2.14.tar.asc">Signature 3.2.14</a></li>
- <li><a href="/samba/ftp/stable/samba-3.0.36.tar.gz">Samba 3.0.36 (gzipped)</a></li>
- <li><a href="/samba/history/samba-3.0.36.html">Release Notes 3.0.36</a></li>
- <li><a href="/samba/ftp/stable/samba-3.0.36.tar.asc">Signature 3.0.36</a></li>
+ <li><a href="/samba/ftp/stable/samba-3.3.8.tar.gz">Samba 3.3.8 (gzipped)</a></li>
+ <li><a href="/samba/history/samba-3.3.8.html">Release Notes 3.3.8</a></li>
+ <li><a href="/samba/ftp/stable/samba-3.3.8.tar.asc">Signature 3.3.8</a></li>
+
+ <li><a href="/samba/ftp/stable/samba-3.2.15.tar.gz">Samba 3.2.15 (gzipped)</a></li>
+ <li><a href="/samba/history/samba-3.2.15.html">Release Notes 3.2.15</a></li>
+ <li><a href="/samba/ftp/stable/samba-3.2.15.tar.asc">Signature 3.2.15</a></li>
+ <li><a href="/samba/ftp/stable/samba-3.0.37.tar.gz">Samba 3.0.37 (gzipped)</a></li>
+ <li><a href="/samba/history/samba-3.0.37.html">Release Notes 3.0.37</a></li>
+ <li><a href="/samba/ftp/stable/samba-3.0.37.tar.asc">Signature 3.0.37</a></li>
</ul>
<h4>Maintenance</h4>
<div class="notes">
<h6>Release Notes</h6>
<ul>
+ <li><a href="samba-3.4.2.html">samba-3.4.2</a></li>
<li><a href="samba-3.4.1.html">samba-3.4.1</a></li>
<li><a href="samba-3.4.0.html">samba-3.4.0</a></li>
+ <li><a href="samba-3.3.8.html">samba-3.3.8</a></li>
<li><a href="samba-3.3.7.html">samba-3.3.7</a></li>
<li><a href="samba-3.3.6.html">samba-3.3.6</a></li>
<li><a href="samba-3.3.5.html">samba-3.3.5</a></li>
<li><a href="samba-3.3.2.html">samba-3.3.2</a></li>
<li><a href="samba-3.3.1.html">samba-3.3.1</a></li>
<li><a href="samba-3.3.0.html">samba-3.3.0</a></li>
+ <li><a href="samba-3.2.15.html">samba-3.2.15</a></li>
<li><a href="samba-3.2.14.html">samba-3.2.14</a></li>
<li><a href="samba-3.2.13.html">samba-3.2.13</a></li>
<li><a href="samba-3.2.12.html">samba-3.2.12</a></li>
<li><a href="samba-3.2.2.html">samba-3.2.2</a></li>
<li><a href="samba-3.2.1.html">samba-3.2.1</a></li>
<li><a href="samba-3.2.0.html">samba-3.2.0</a></li>
+ <li><a href="samba-3.0.37.html">samba-3.0.37</a></li>
<li><a href="samba-3.0.36.html">samba-3.0.36</a></li>
<li><a href="samba-3.0.35.html">samba-3.0.35</a></li>
<li><a href="samba-3.0.34.html">samba-3.0.34</a></li>
--- /dev/null
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Release Notes Archive</title>
+</head>
+
+<body>
+
+ <H2>Samba 3.0.37 Available for Download</H2>
+
+<p>
+<pre>
+ ==============================
+ Release Notes for Samba 3.0.37
+ October, 1 2009
+ ==============================
+
+
+This is a security release in order to address CVE-2009-2813, CVE-2009-2948
+and CVE-2009-2906.
+Please note that Samba 3.0 is not maintained any longer. This security
+release is shipped on a voluntary basis.
+
+ o CVE-2009-2813:
+ In all versions of Samba later than 3.0.11, connecting to the home
+ share of a user will use the root of the filesystem
+ as the home directory if this user is misconfigured to have
+ an empty home directory in /etc/passwd.
+
+ o CVE-2009-2948:
+ If mount.cifs is installed as a setuid program, a user can pass it a
+ credential or password path to which he or she does not have access and
+ then use the --verbose option to view the first line of that file.
+
+ o CVE-2009-2906:
+ Specially crafted SMB requests on authenticated SMB connections can
+ send smbd into a 100% CPU loop, causing a DoS on the Samba server.
+
+
+######################################################################
+Changes
+#######
+
+Changes since 3.0.36
+--------------------
+
+
+o Jeremy Allison <jra@samba.org>
+ * BUG 6763: Fix for CVE-2009-2813.
+ * BUG 6768: Fix for CVE-2009-2906.
+
+
+o Jeff Layton <jlayton@redhat.com>
+ * Fix for CVE-2009-2948.
+</pre>
+</body>
+</html>
--- /dev/null
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Release Notes Archive</title>
+</head>
+
+<body>
+
+ <H2>Samba 3.2.15 Available for Download</H2>
+
+<p>
+<pre>
+ ==============================
+ Release Notes for Samba 3.2.15
+ October 1, 2009
+ ==============================
+
+
+This is a security release in order to address CVE-2009-2813, CVE-2009-2948
+and CVE-2009-2906.
+
+ o CVE-2009-2813:
+ In all versions of Samba later than 3.0.11, connecting to the home
+ share of a user will use the root of the filesystem
+ as the home directory if this user is misconfigured to have
+ an empty home directory in /etc/passwd.
+
+ o CVE-2009-2948:
+ If mount.cifs is installed as a setuid program, a user can pass it a
+ credential or password path to which he or she does not have access and
+ then use the --verbose option to view the first line of that file.
+ All known Samba versions are affected.
+
+ o CVE-2009-2906:
+ Specially crafted SMB requests on authenticated SMB connections can
+ send smbd into a 100% CPU loop, causing a DoS on the Samba server.
+
+
+######################################################################
+Changes
+#######
+
+Changes since 3.2.14
+--------------------
+
+
+o Jeremy Allison <jra@samba.org>
+ * BUG 6763: Fix for CVE-2009-2813.
+ * BUG 6768: Fix for CVE-2009-2906.
+
+
+o Jeff Layton <jlayton@redhat.com>
+ * Fix for CVE-2009-2948.
+</pre>
+</body>
+</html>
--- /dev/null
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Release Notes Archive</title>
+</head>
+
+<body>
+
+ <H2>Samba 3.3.8 Available for Download</H2>
+
+<p>
+<pre>
+ =============================
+ Release Notes for Samba 3.3.8
+ October, 1 2009
+ =============================
+
+
+This is a security release in order to address CVE-2009-2813, CVE-2009-2948
+and CVE-2009-2906.
+
+ o CVE-2009-2813:
+ In all versions of Samba later than 3.0.11, connecting to the home
+ share of a user will use the root of the filesystem
+ as the home directory if this user is misconfigured to have
+ an empty home directory in /etc/passwd.
+
+ o CVE-2009-2948:
+ If mount.cifs is installed as a setuid program, a user can pass it a
+ credential or password path to which he or she does not have access and
+ then use the --verbose option to view the first line of that file.
+ All known Samba versions are affected.
+
+ o CVE-2009-2906:
+ Specially crafted SMB requests on authenticated SMB connections can
+ send smbd into a 100% CPU loop, causing a DoS on the Samba server.
+
+
+######################################################################
+Changes
+#######
+
+Changes since 3.3.7
+-------------------
+
+
+o Jeremy Allison <jra@samba.org>
+ * BUG 6763: Fix for CVE-2009-2813.
+ * BUG 6768: Fix for CVE-2009-2906.
+
+
+o Jeff Layton <jlayton@redhat.com>
+ * Fix for CVE-2009-2948.
+</pre>
+
+</body>
+</html>
--- /dev/null
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Release Notes Archive</title>
+</head>
+
+<body>
+
+ <H2>Samba 3.4.2 Available for Download</H2>
+
+<p>
+<pre>
+ =============================
+ Release Notes for Samba 3.4.2
+ October 1, 2009
+ =============================
+
+
+This is a security release in order to address CVE-2009-2813, CVE-2009-2948
+and CVE-2009-2906.
+
+ o CVE-2009-2813:
+ In all versions of Samba later than 3.0.11, connecting to the home
+ share of a user will use the root of the filesystem
+ as the home directory if this user is misconfigured to have
+ an empty home directory in /etc/passwd.
+
+ o CVE-2009-2948:
+ If mount.cifs is installed as a setuid program, a user can pass it a
+ credential or password path to which he or she does not have access and
+ then use the --verbose option to view the first line of that file.
+ All known Samba versions are affected.
+
+ o CVE-2009-2906:
+ Specially crafted SMB requests on authenticated SMB connections can
+ send smbd into a 100% CPU loop, causing a DoS on the Samba server.
+
+
+######################################################################
+Changes
+#######
+
+Changes since 3.4.1
+-------------------
+
+
+o Jeremy Allison <jra@samba.org>
+ * BUG 6763: Fix for CVE-2009-2813.
+ * BUG 6768: Fix for CVE-2009-2906.
+
+
+o Jeff Layton <jlayton@redhat.com>
+ * Fix for CVE-2009-2948.
+</pre>
+
+</body>
+</html>
<td><em>Details</em></td>
</tr>
+ <tr>
+ <td>01 Oct 2009</td>
+ <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2948-1.patch">
+ patch 1 for Samba 3.4.1</a>
+ <a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2948-2.patch">
+ patch 2 for Samba 3.4.1</a>
+ <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2948-1.patch">
+ patch 1 for Samba 3.3.7</a>
+ <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2948-2.patch">
+ patch 2 for Samba 3.3.7</a>
+ <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2948-1.patch">
+ patch 1 for Samba 3.2.14</a>
+ <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2948-2.patch">
+ patch 2 for Samba 3.2.14</a>
+ <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2948-1.patch">
+ patch 1 for Samba 3.0.36</a>
+ <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2948-2.patch">
+ patch 2 for Samba 3.0.36</a>
+ <td>Information disclosure by setuid mount.cifs</td>
+ <td>all releases</td>
+ <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906">CVE-2009-2948</a></td>
+ <td><a href="/samba/security/CVE-2009-2948.html">Announcement</a></td>
+ </tr>
+
+ <tr>
+ <td>01 Oct 2009</td>
+ <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2906.patch">
+ patch for Samba 3.4.1</a>
+ <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2906.patch">
+ patch for Samba 3.3.7</a>
+ <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2906.patch">
+ patch for Samba 3.2.14</a>
+ <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2906.patch">
+ patch for Samba 3.0.36</a>
+ <td>Remote DoS against smbd on authenticated connections</td>
+ <td>all releases</td>
+ <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906">CVE-2009-2906</a></td>
+ <td><a href="/samba/security/CVE-2009-2906.html">Announcement</a></td>
+ </tr>
+ <tr>
+
+ <tr>
+ <td>01 Oct 2009</td>
+ <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2813.patch">
+ patch for Samba 3.4.1</a>
+ <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2813.patch">
+ patch for Samba 3.3.7</a>
+ <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2813.patch">
+ patch for Samba 3.2.14</a>
+ <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2813.patch">
+ patch for Samba 3.0.36</a>
+ <td>Misconfigured /etc/passwd file may share folders unexpectedly</td>
+ <td>> 3.0.11</td>
+ <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813">CVE-2009-2813</a></td>
+ <td><a href="/samba/security/CVE-2009-2813.html">Announcement</a></td>
+ </tr>
+ <tr>
+
<tr>
<td>23 Jun 2009</td>
<td><a href="/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patch">
<h2>Latest News</h2>
<!--#include virtual="/samba/news/headlines.html" -->
- <h4><a name="latest">25 September 2009</a></h4>
+ <h4><a name="latest">1 October 2009</a></h4>
+ <p class="headline">Samba 3.4.2 Available for Download</p>
+
+ <p>This is a security release to address
+ <a href="/samba/security/CVE-2009-2813.html">CVE-2009-2813</a>,
+ <a href="/samba/security/CVE-2009-2948.html">CVE-2009-2948</a> and
+ <a href="/samba/security/CVE-2009-2906.html">CVE-2009-2906</a>.
+ Patches for all current versions and security advisories
+ are available on our <a href="/samba/security/">security
+ page</a>.</p>
+
+ <p>The uncompressed tarballs and patch files have been signed
+ using GnuPG (ID 6568B7EA). The source code can be
+ <a href="/samba/ftp/stable/samba-3.4.2.tar.gz">downloaded now</a>.
+ See <a href="/samba/history/samba-3.4.2.html">the release notes for more
+ info</a>.</p>
+
+ <h4>1 October 2009</h4>
+ <p class="headline">Samba 3.3.8 Available for Download</p>
+
+ <p>This is a security release to address
+ <a href="/samba/security/CVE-2009-2813.html">CVE-2009-2813</a>,
+ <a href="/samba/security/CVE-2009-2948.html">CVE-2009-2948</a> and
+ <a href="/samba/security/CVE-2009-2906.html">CVE-2009-2906</a>.
+ Patches for all current versions and security advisories
+ are available on our <a href="/samba/security/">security
+ page</a>.</p>
+
+ <p>The uncompressed tarballs and patch files have been signed
+ using GnuPG (ID 6568B7EA). The source code can be
+ <a href="/samba/ftp/stable/samba-3.3.8.tar.gz">downloaded now</a>.
+ See <a href="/samba/history/samba-3.3.8.html">the release notes for more
+ info</a>.</p>
+
+ <h4>1 October 2009</h4>
+ <p class="headline">Samba 3.2.15 Available for Download</p>
+
+ <p>This is a security release to address
+ <a href="/samba/security/CVE-2009-2813.html">CVE-2009-2813</a>,
+ <a href="/samba/security/CVE-2009-2948.html">CVE-2009-2948</a> and
+ <a href="/samba/security/CVE-2009-2906.html">CVE-2009-2906</a>.
+ Patches for all current versions and security advisories
+ are available on our <a href="/samba/security/">security
+ page</a>.</p>
+
+ <p>The uncompressed tarballs and patch files have been signed
+ using GnuPG (ID 6568B7EA). The source code can be
+ <a href="/samba/ftp/stable/samba-3.2.15.tar.gz">downloaded now</a>.
+ See <a href="/samba/history/samba-3.2.15.html">the release notes for more
+ info</a>.</p>
+
+ <h4>1 October 2009</h4>
+ <p class="headline">Samba 3.0.37 Available for Download</p>
+
+ <p>This is a security release to address
+ <a href="/samba/security/CVE-2009-2813.html">CVE-2009-2813</a>,
+ <a href="/samba/security/CVE-2009-2948.html">CVE-2009-2948</a> and
+ <a href="/samba/security/CVE-2009-2906.html">CVE-2009-2906</a>.
+ Patches for all current versions and security advisories
+ are available on our <a href="/samba/security/">security
+ page</a>.</p>
+
+ <p>The uncompressed tarballs and patch files have been signed
+ using GnuPG (ID 6568B7EA). The source code can be
+ <a href="/samba/ftp/stable/samba-3.0.37.tar.gz">downloaded now</a>.
+ See <a href="/samba/history/samba-3.0.37.html">the release notes for more
+ info</a>.</p>
+
+ <h4>25 September 2009</h4>
<p class="headline">A new Samba Team Blog post can be read <a href="http://news.samba.org/developers/Samba_Team_Blog_2">here.</a></p>
<h4>9 September 2009</a></h4>
--- /dev/null
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Security Announcement Archive</title>
+</head>
+
+<body>
+
+<H2>CVE-2009-2813: Misconfigured /etc/passwd file may share folders
+unexpectedly</H2>
+
+<p>
+<pre>
+===========================================================
+== Subject: Misconfigured /etc/passwd file may share folders unexpectedly
+==
+== CVE ID#: CVE-2009-2813
+==
+== Versions: All versions of Samba later than 3.0.11
+==
+== Summary: If a user in /etc/passwd is misconfigured to have
+== an empty home directory then connecting to the home
+== share of this user will use the root of the filesystem
+== as the home directory.
+===========================================================
+
+===========
+Description
+===========
+
+If a user in /etc/passwd is misconfigured to have an empty home
+directory (::) and the automated [homes] share is enabled, or an
+explicit share is created with that username, then any client connecting
+to that share name will be able to access the whole filesystem from
+root (/) on downwards, subject to local file system permissions
+applied to the connecting user.
+
+==================
+Patch Availability
+==================
+
+Patches addressing both these issues have been posted to:
+
+ http://www.samba.org/samba/security/
+
+Additionally, Samba 3.0.37, 3.2.15, 3.3.8 and 3.4.2 have been issued
+as security releases to correct the defect. Samba administrators are
+advised to upgrade to these releases or apply the patch as soon
+as possible.
+
+==========
+Workaround
+==========
+
+Do not configure users in /etc/passwd with a blank home
+directory field.
+
+=======
+Credits
+=======
+
+Originally reported by J. David Hester of LCG Systems National
+Institutes of Health and forwarded to the Samba Team by Apple
+Computer Inc.
+
+Patches provided by Apple and Jeremy Allison of the Samba team.
+
+==========================================================
+== Our Code, Our Bugs, Our Responsibility.
+== The Samba Team
+==========================================================
+
+</pre>
+</body>
+</html>
--- /dev/null
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Security Announcement Archive</title>
+</head>
+
+<body>
+
+ <H2>CVE-2009-2906: Remote DoS against smbd on authenticated connections</H2>
+
+<p>
+<pre>
+===========================================================
+== Subject: Remote DoS against smbd on authenticated
+== connections
+==
+== CVE ID#: CVE-2009-2906
+==
+== Versions: All known versions of samba
+==
+== Summary: Specially crafted SMB requests on
+== authenticated SMB connections can send smbd
+== into a 100% CPU loop, causing a DoS on the
+== Samba server
+===========================================================
+
+===========
+Description
+===========
+
+Smbd is susceptible to a remote DoS attack by an authenticated remote
+client.
+
+If the client sends a reply to an oplock break notification
+that Samba does not expect it can cause smbd to spin the CPU
+repeatedly trying to process the unexpected packet and being
+unable to finish the processing. This is unlikely to happen
+with normal client activity (although not impossible).
+
+==================
+Patch Availability
+==================
+
+A Patch addressing this issue has been posted to:
+
+ http://www.samba.org/samba/security/
+
+Additionally, Samba 3.0.37, 3.2.15, 3.3.8 and 3.4.2 have been issued
+as security releases to correct the defect. Samba administrators are
+advised to upgrade to these releases or apply the patch as soon
+as possible.
+
+==========
+Workaround
+==========
+
+None available
+
+=======
+Credits
+=======
+
+Originally reported by Tim Prouty, Isilon and Samba Team
+
+Patches provided by Jeremy Allison, Samba Team
+
+==========================================================
+== Our Code, Our Bugs, Our Responsibility.
+== The Samba Team
+==========================================================
+</pre>
+</body>
+</html>
--- /dev/null
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+
+<head>
+<title>Samba - Security Announcement Archive</title>
+</head>
+
+<body>
+
+ <H2>CVE-2009-2948: Information disclosure by setuid mount.cifs</H2>
+
+<p>
+<pre>
+===========================================================
+== Subject: Information disclosure by setuid mount.cifs
+==
+== CVE ID#: CVE-2009-2948
+==
+== Versions: All known versions of samba
+==
+== Summary: When mount.cifs is installed as a setuid program
+== a user can pass it a credential or password path
+== to which he or she does not have access and then
+== use the --verbose option to view the first line
+== of that file.
+===========================================================
+
+===========
+Description
+===========
+
+The mount.cifs program allows a user to pass in the name of
+a credentials file or a file containing a password via several
+different means. When installed as a setuid program, it does
+not check to see whether the user would have had access to
+this file prior to gaining root privileges.
+
+Also, when run with the --verbose or -v options, it would
+print the value of the password being handed off to the
+kernel.
+
+==================
+Patch Availability
+==================
+
+Patches addressing both these issues have been posted to:
+
+ http://www.samba.org/samba/security/
+
+Additionally, Samba 3.0.37, 3.2.15, 3.3.8 and 3.4.2 have been issued
+as security releases to correct the defect. Samba administrators are
+advised to upgrade to these releases or apply the patch as soon
+as possible.
+
+==========
+Workaround
+==========
+
+Clear the setuid bit from mount.cifs. For instance:
+
+ # chmod u-s /sbin/mount.cifs
+
+...note that this will prevent unprivileged users from
+mounting CIFS shares however.
+
+=======
+Credits
+=======
+
+Originally reported by Ronald Volgers.
+
+Patches provided by Jeff Layton of the Samba team.
+
+==========================================================
+== Our Code, Our Bugs, Our Responsibility.
+== The Samba Team
+==========================================================
+</pre>
+</body>
+</html>