Software 42767 Published by

Samba 4.17.1 has been released.  Samba is the standard Windows interoperability suite of programs for Linux and Unix.



Announce: Samba 4.17.1 Available for Download

This is the latest stable release of the Samba 4.17 release series.

Gnome_shell_screenshot_rd3930

Changes since 4.17.0
--------------------

o  Jeremy Allison
   * BUG 14611: CVE-2021-20251 [SECURITY] Bad password count not incremented
     atomically.
   * BUG 15174: smbXsrv_connection_shutdown_send result leaked.    * BUG 15182: Flush on a named stream never completes.    * BUG 15195: Permission denied calling SMBC_getatr when file not exists.

o  Douglas Bagnall
   * BUG 15189: Samba 4.5 sometimes cannot be upgraded to Samba 4.6 or later
     over DRS: WERROR_DS_DRA_MISSING_PARENT due to faulty GET_ANC.    * BUG 15191: pytest: add file removal helpers for TestCaseInTempDir.
o  Andrew Bartlett
   * BUG 14611: CVE-2021-20251 [SECURITY] Bad password count not incremented
     atomically.
   * BUG 15189: Samba 4.5 sometimes cannot be upgraded to Samba 4.6 or later.
     over DRS: WERROR_DS_DRA_MISSING_PARENT due to faulty GET_ANC.
o  Ralph Boehme
   * BUG 15182: Flush on a named stream never completes.
o  Volker Lendecke
   * BUG 15151: vfs_gpfs silently garbles timestamps > year 2106.
o  Gary Lockyer
   * BUG 14611: CVE-2021-20251 [SECURITY] Bad password count not incremented
     atomically.

o  Stefan Metzmacher
   * BUG 15200: multi-channel socket passing may hit a race if one of the     involved processes already existed.
   * BUG 15201: memory leak on temporary of struct
imessaging_post_state and
     struct tevent_immediate on struct imessaging_context (in      rpcd_spoolss and maybe others).

o  Noel Power
   * BUG 15205: Since popt1.19 various use after free errors using result of
     poptGetArg are now exposed.

o  Anoop C S
   * BUG 15192: Remove special case for O_CREAT in SMB_VFS_OPENAT from      vfs_glusterfs.

o  Andreas Schneider
   * BUG 15169: GETPWSID in memory cache grows indefinetly with each NTLM auth.

o  Joseph Sutton
   * BUG 14611: CVE-2021-20251 [SECURITY] Bad password count not incremented
     atomically.

#######################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by joining the #samba-technical:matrix.org matrix room, or
#samba-technical IRC channel on irc.libera.chat.

If you do report problems then please try to send high quality feedback. If you don't provide vital information to help us track down the problem then you will probably be ignored.  All bug reports should be filed under the Samba 4.1 and newer product in the project's Bugzilla database ( https://bugzilla.samba.org/).

======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================


================

Download Details
================

The uncompressed tarballs and patch files have been signed
using GnuPG (ID AA99442FB680B620).  The source code can be downloaded from:

        https://download.samba.org/pub/samba/stable/
The release notes are available online at:

        https://www.samba.org/samba/history/samba-4.17.1.html
Our Code, Our Bugs, Our Responsibility.
( https://bugzilla.samba.org/)

                        --Enjoy
                        The Samba Team