Release Announcements
---------------------
This is the latest stable release of the Samba 4.17 release series.
Changes since 4.17.0
--------------------
o? Jeremy Allison <jra at samba.org>
?? * BUG 14611: CVE-2021-20251 [SECURITY] Bad password count not
incremented
???? atomically.
?? * BUG 15174: smbXsrv_connection_shutdown_send result leaked.
?? * BUG 15182: Flush on a named stream never completes.
?? * BUG 15195: Permission denied calling SMBC_getatr when file not exists.
o? Douglas Bagnall <douglas.bagnall at catalyst.net.nz>
?? * BUG 15189: Samba 4.5 sometimes cannot be upgraded to Samba 4.6 or
later
???? over DRS: WERROR_DS_DRA_MISSING_PARENT due to faulty GET_ANC.
?? * BUG 15191: pytest: add file removal helpers for TestCaseInTempDir.
o? Andrew Bartlett <abartlet at samba.org>
?? * BUG 14611: CVE-2021-20251 [SECURITY] Bad password count not
incremented
???? atomically.
?? * BUG 15189: Samba 4.5 sometimes cannot be upgraded to Samba 4.6 or
later.
???? over DRS: WERROR_DS_DRA_MISSING_PARENT due to faulty GET_ANC.
o? Ralph Boehme <slow at samba.org>
?? * BUG 15182: Flush on a named stream never completes.
o? Volker Lendecke <vl at samba.org>
?? * BUG 15151: vfs_gpfs silently garbles timestamps > year 2106.
o? Gary Lockyer <gary at catalyst.net.nz>
?? * BUG 14611: CVE-2021-20251 [SECURITY] Bad password count not
incremented
???? atomically.
o? Stefan Metzmacher <metze at samba.org>
?? * BUG 15200: multi-channel socket passing may hit a race if one of the
???? involved processes already existed.
?? * BUG 15201: memory leak on temporary of struct
imessaging_post_state and
???? struct tevent_immediate on struct imessaging_context (in
???? rpcd_spoolss and maybe others).
o? Noel Power <noel.power at suse.com>
?? * BUG 15205: Since popt1.19 various use after free errors using
result of
???? poptGetArg are now exposed.
o? Anoop C S <anoopcs at samba.org>
?? * BUG 15192: Remove special case for O_CREAT in SMB_VFS_OPENAT from
???? vfs_glusterfs.
o? Andreas Schneider <asn at samba.org>
?? * BUG 15169: GETPWSID in memory cache grows indefinetly with each
NTLM auth.
o? Joseph Sutton <josephsutton at catalyst.net.nz>
?? * BUG 14611: CVE-2021-20251 [SECURITY] Bad password count not
incremented
???? atomically.
#######################################
Reporting bugs & Development Discussion
#######################################
Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical:matrix.org matrix room, or
#samba-technical IRC channel on irc.libera.chat.
If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.? All bug reports should
be filed under the Samba 4.1 and newer product in the project's Bugzilla
database (https://bugzilla.samba.org/).
======================================================================= Our
Code, Our Bugs, Our Responsibility.
== The Samba Team
=====================================================================
===============Download Details
===============
The uncompressed tarballs and patch files have been signed
using GnuPG (ID AA99442FB680B620).? The source code can be downloaded
from:
??????? https://download.samba.org/pub/samba/stable/
The release notes are available online at:
??????? https://www.samba.org/samba/history/samba-4.17.1.html
Our Code, Our Bugs, Our Responsibility.
(https://bugzilla.samba.org/)
??????????????????????? --Enjoy
??????????????????????? The Samba Team