Samba 4.17.1 (gzipped)
Signature
Patch (gzipped) against Samba 4.17.0
Signature
============================== Release Notes for Samba 4.17.1 October 19, 2022 ============================== This is the latest stable release of the Samba 4.17 release series. Changes since 4.17.0 -------------------- o Jeremy Allison <jra@samba.org> * BUG 14611: CVE-2021-20251 [SECURITY] Bad password count not incremented atomically. * BUG 15174: smbXsrv_connection_shutdown_send result leaked. * BUG 15182: Flush on a named stream never completes. * BUG 15195: Permission denied calling SMBC_getatr when file not exists. o Douglas Bagnall <douglas.bagnall@catalyst.net.nz> * BUG 15189: Samba 4.5 sometimes cannot be upgraded to Samba 4.6 or later over DRS: WERROR_DS_DRA_MISSING_PARENT due to faulty GET_ANC. * BUG 15191: pytest: add file removal helpers for TestCaseInTempDir. o Andrew Bartlett <abartlet@samba.org> * BUG 14611: CVE-2021-20251 [SECURITY] Bad password count not incremented atomically. * BUG 15189: Samba 4.5 sometimes cannot be upgraded to Samba 4.6 or later. over DRS: WERROR_DS_DRA_MISSING_PARENT due to faulty GET_ANC. o Ralph Boehme <slow@samba.org> * BUG 15182: Flush on a named stream never completes. o Volker Lendecke <vl@samba.org> * BUG 15151: vfs_gpfs silently garbles timestamps > year 2106. o Gary Lockyer <gary@catalyst.net.nz> * BUG 14611: CVE-2021-20251 [SECURITY] Bad password count not incremented atomically. o Stefan Metzmacher <metze@samba.org> * BUG 15200: multi-channel socket passing may hit a race if one of the involved processes already existed. * BUG 15201: memory leak on temporary of struct imessaging_post_state and struct tevent_immediate on struct imessaging_context (in rpcd_spoolss and maybe others). o Noel Power <noel.power@suse.com> * BUG 15205: Since popt1.19 various use after free errors using result of poptGetArg are now exposed. o Anoop C S <anoopcs@samba.org> * BUG 15192: Remove special case for O_CREAT in SMB_VFS_OPENAT from vfs_glusterfs. o Andreas Schneider <asn@samba.org> * BUG 15169: GETPWSID in memory cache grows indefinetly with each NTLM auth. o Joseph Sutton <josephsutton@catalyst.net.nz> * BUG 14611: CVE-2021-20251 [SECURITY] Bad password count not incremented atomically.