1 =============================
2 Release Notes for Samba 4.7.3
4 =============================
7 This is a security release in order to address the following defects:
9 o CVE-2017-14746 (Use-after-free vulnerability.)
10 o CVE-2017-15275 (Server heap memory information leak.)
18 All versions of Samba from 4.0.0 onwards are vulnerable to a use after
19 free vulnerability, where a malicious SMB1 request can be used to
20 control the contents of heap memory via a deallocated heap pointer. It
21 is possible this may be used to compromise the SMB server.
24 All versions of Samba from 3.6.0 onwards are vulnerable to a heap
25 memory information leak, where server allocated heap memory may be
26 returned to the client without being cleared.
28 There is no known vulnerability associated with this error, but
29 uncleared heap memory may contain previously used data that may help
30 an attacker compromise the server via other methods. Uncleared heap
31 memory may potentially contain password hashes or other high-value
34 For more details and workarounds, please see the security advisories:
36 o https://www.samba.org/samba/security/CVE-2017-14746.html
37 o https://www.samba.org/samba/security/CVE-2017-15275.html
43 o Jeremy Allison <jra@samba.org>
44 * BUG 13041: CVE-2017-14746: s3: smbd: Fix SMB1 use-after-free crash bug.
45 * BUG 13077: CVE-2017-15275: s3: smbd: Chain code can return uninitialized
46 memory when talloc buffer is grown.
49 #######################################
50 Reporting bugs & Development Discussion
51 #######################################
53 Please discuss this release on the samba-technical mailing list or by
54 joining the #samba-technical IRC channel on irc.freenode.net.
56 If you do report problems then please try to send high quality
57 feedback. If you don't provide vital information to help us track down
58 the problem then you will probably be ignored. All bug reports should
59 be filed under the "Samba 4.1 and newer" product in the project's Bugzilla
60 database (https://bugzilla.samba.org/).
63 ======================================================================
64 == Our Code, Our Bugs, Our Responsibility.
66 ======================================================================
69 Release notes for older releases follow:
70 ----------------------------------------
72 =============================
73 Release Notes for Samba 4.7.2
75 =============================
78 This is an additional bugfix release to address a possible data corruption
79 issue. Please update immediately! For details, please see
81 https://bugzilla.samba.org/show_bug.cgi?id=13130
83 Samba 4.6.0 and newer is affected by this issue.
89 o Jeremy Allison <jra@samba.org>
90 * BUG 13121: Non-smbd processes using kernel oplocks can hang smbd.
92 o Joe Guo <joeg@catalyst.net.nz>
93 * BUG 13127: python: use communicate to fix Popen deadlock.
95 o Volker Lendecke <vl@samba.org>
96 * BUG 13130: smbd on disk file corruption bug under heavy threaded load.
98 o Stefan Metzmacher <metze@samba.org>
99 * BUG 13130: tevent: version 0.9.34.
101 o Ralph Wuerthner <ralph.wuerthner@de.ibm.com>
102 * BUG 13118: s3: smbd: Fix delete-on-close after smb2_find.
105 #######################################
106 Reporting bugs & Development Discussion
107 #######################################
109 Please discuss this release on the samba-technical mailing list or by
110 joining the #samba-technical IRC channel on irc.freenode.net.
112 If you do report problems then please try to send high quality
113 feedback. If you don't provide vital information to help us track down
114 the problem then you will probably be ignored. All bug reports should
115 be filed under the "Samba 4.1 and newer" product in the project's Bugzilla
116 database (https://bugzilla.samba.org/).
119 ======================================================================
120 == Our Code, Our Bugs, Our Responsibility.
122 ======================================================================
125 ----------------------------------------------------------------------
128 =============================
129 Release Notes for Samba 4.7.1
131 =============================
134 This is the latest stable release of the Samba 4.7 release series.
140 o Michael Adam <obnox@samba.org>
141 * BUG 13091: vfs_glusterfs: Fix exporting subdirs with shadow_copy2.
143 o Jeremy Allison <jra@samba.org>
144 * BUG 13027: s3: smbd: Currently if getwd() fails after a chdir(), we panic.
145 * BUG 13068: s3: VFS: Ensure default SMB_VFS_GETWD() call can't return a
146 partially completed struct smb_filename.
147 * BUG 13069: sys_getwd() can leak memory or possibly return the wrong errno
149 * BUG 13093: 'smbclient' doesn't correctly canonicalize all local names
152 o Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
153 * BUG 13095: Fix broken linked attribute handling.
155 o Andrew Bartlett <abartlet@samba.org>
156 * BUG 12994: Missing LDAP query escapes in DNS rpc server.
157 * BUG 13087: replace: Link to -lbsd when building replace.c by hand.
159 o Ralph Boehme <slow@samba.org>
160 * BUG 6133: Cannot delete non-ACL files on Solaris/ZFS/NFSv4 ACL filesystem.
161 * BUG 7909: Map SYNCHRONIZE acl permission statically in zfs_acl vfs module.
162 * BUG 7933: Samba fails to honor SEC_STD_WRITE_OWNER bit with the
164 * BUG 12991: s3/mdssvc: Missing assignment in sl_pack_float.
165 * BUG 12995: Wrong Samba access checks when changing DOS attributes.
166 * BUG 13062: samba_runcmd_send() leaves zombie processes on timeout
167 * BUG 13065: net: groupmap cleanup should not delete BUILTIN mappings.
168 * BUG 13076: Enabling vfs_fruit results in loss of Finder tags and other
171 o Alexander Bokovoy <ab@samba.org>
172 * BUG 9613: man pages: Properly ident lists.
173 * BUG 13081: smb.conf.5: Sort parameters alphabetically.
175 o Samuel Cabrero <scabrero@suse.de>
176 * BUG 12993: s3: spoolss: Fix GUID string format on GetPrinter info.
178 o Amitay Isaacs <amitay@gmail.com>
179 * BUG 13042: Remote serverid check doesn't check for the unique id.
180 * BUG 13056: CTDB starts consuming memory if there are dead nodes in the
182 * BUG 13070: ctdb-common: Ignore event scripts with multiple '.'s.
184 o Lutz Justen <ljusten@google.com>
185 * BUG 13046: libgpo doesn't sort the GPOs in the correct order.
187 o Volker Lendecke <vl@samba.org>
188 * BUG 13042: Remote serverid check doesn't check for the unique id.
189 * BUG 13090: vfs_catia: Fix a potential memleak.
190 * BUG 12903: Fix file change notification for renames.
192 o Gary Lockyer <gary@catalyst.net.nz>
193 * BUG 12952: Samba DNS server does not honour wildcards.
195 o Stefan Metzmacher <metze@samba.org>
196 * BUG 13079: Can't change password in samba from a Windows client if Samba
197 runs on IPv6 only interface.
199 o Anoop C S <anoopcs@redhat.com>
200 * BUG 13086: vfs_fruit: Replace closedir() by SMB_VFS_CLOSEDIR.
202 o Christof Schmitt <cs@samba.org>
203 * BUG 13047: Apple client can't cope with SMB2 async replies when creating
206 o Andreas Schneider <asn@samba.org>
207 * BUG 12959: s4:rpc_server:backupkey: Move variable into scope.
208 * BUG 13099: s4:scripting: Fix ntstatus_gen.h generation on 32bit.
209 * BUG 13100: s3:vfs_glusterfs: Fix a double free in vfs_gluster_getwd().
210 * BUG 13101: Fix resouce leaks and pointer issues.
213 * BUG 13049: vfs_solarisacl: Fix build for samba 4.7 and up.
216 #######################################
217 Reporting bugs & Development Discussion
218 #######################################
220 Please discuss this release on the samba-technical mailing list or by
221 joining the #samba-technical IRC channel on irc.freenode.net.
223 If you do report problems then please try to send high quality
224 feedback. If you don't provide vital information to help us track down
225 the problem then you will probably be ignored. All bug reports should
226 be filed under the "Samba 4.1 and newer" product in the project's Bugzilla
227 database (https://bugzilla.samba.org/).
230 ======================================================================
231 == Our Code, Our Bugs, Our Responsibility.
233 ======================================================================
236 ----------------------------------------------------------------------
239 =============================
240 Release Notes for Samba 4.7.0
242 =============================
245 This is the first stable release of Samba 4.7.
246 Please read the release notes carefully before upgrading.
254 'smbclient' no longer prints a 'Domain=[...] OS=[Windows 6.1] Server=[...]'
255 banner when connecting to the first server. With SMB2 and Kerberos,
256 there's no way to print this information reliably. Now we avoid it at all
257 consistently. In interactive sessions the following banner is now presented
258 to the user: 'Try "help" do get a list of possible commands.'.
260 The default for "client max protocol" has changed to "SMB3_11",
261 which means that 'smbclient' (and related commands) will work against
262 servers without SMB1 support.
264 It's possible to use the '-m/--max-protocol' option to overwrite
265 the "client max protocol" option temporarily.
267 Note that the '-e/--encrypt' option also works with most SMB3 servers
268 (e.g. Windows >= 2012 and Samba >= 4.0.0), so the SMB1 unix extensions
269 are not required for encryption.
271 The change to SMB3_11 as default also means 'smbclient' no longer
272 negotiates SMB1 unix extensions by default, when talking to a Samba server with
273 "unix extensions = yes". As a result, some commands are not available, e.g.
274 'posix_encrypt', 'posix_open', 'posix_mkdir', 'posix_rmdir', 'posix_unlink',
275 'posix_whoami', 'getfacl' and 'symlink'. Using "-mNT1" reenables them, if the
276 server supports SMB1.
278 Note the default ("CORE") for "client min protocol" hasn't changed,
279 so it's still possible to connect to SMB1-only servers by default.
281 'smbclient' learned a new command 'deltree' that is able to do
282 a recursive deletion of a directory tree.
288 Whole DB read locks: Improved LDAP and replication consistency
289 --------------------------------------------------------------
291 Prior to Samba 4.7 and ldb 1.2.0, the LDB database layer used by Samba
292 erroneously did not take whole-DB read locks to protect search
293 and DRS replication operations.
295 While each object returned remained subject to a record-level lock (so
296 would remain consistent to itself), under a race condition with a
297 rename or delete, it and any links (like the member attribute) to it
298 would not be returned.
300 The symptoms of this issue include:
302 Replication failures with this error showing in the client side logs:
303 error during DRS repl ADD: No objectClass found in replPropertyMetaData for
304 Failed to commit objects:
305 WERR_GEN_FAILURE/NT_STATUS_INVALID_NETWORK_RESPONSE
307 A crash of the server, in particular the rpc_server process with
308 INTERNAL ERROR: Signal 11
310 LDAP read inconsistency
311 A DN subject to a search at the same time as it is being renamed
312 may not appear under either the old or new name, but will re-appear
313 for a subsequent search.
315 See https://bugzilla.samba.org/show_bug.cgi?id=12858 for more details
316 and updated advise on database recovery for affected installations.
318 Samba AD with MIT Kerberos
319 --------------------------
321 After four years of development, Samba finally supports compiling and
322 running Samba AD with MIT Kerberos. You can enable it with:
324 ./configure --with-system-mitkrb5
326 Samba requires version 1.15.1 of MIT Kerberos to build with AD DC support.
327 The krb5-devel and krb5-server packages are required.
328 The feature set is not on par with the Heimdal build but the most important
329 things, like forest and external trusts, are working. Samba uses the KDC binary
330 provided by MIT Kerberos.
332 Missing features, compared to Heimdal, are:
334 * S4U2SELF/S4U2PROXY support
335 * RODC support (not fully working with Heimdal either)
337 The Samba AD process will take care of starting the MIT KDC and it will load a
338 KDB (Kerberos Database) driver to access the Samba AD database. When
339 provisioning an AD DC using 'samba-tool' it will take care of creating a correct
340 kdc.conf file for the MIT KDC.
342 For further details, see:
343 https://wiki.samba.org/index.php/Running_a_Samba_AD_DC_with_MIT_Kerberos_KDC
345 Dynamic RPC port range
346 ----------------------
348 The dynamic port range for RPC services has been changed from the old default
349 value "1024-1300" to "49152-65535". This port range is not only used by a
350 Samba AD DC, but also applies to all other server roles including NT4-style
351 domain controllers. The new value has been defined by Microsoft in Windows
352 Server 2008 and newer versions. To make it easier for Administrators to control
353 those port ranges we use the same default and make it configurable with the
354 option: "rpc server dynamic port range".
356 The "rpc server port" option sets the first available port from the new
357 "rpc server dynamic port range" option. The option "rpc server port" only
358 applies to Samba provisioned as an AD DC.
360 Authentication and Authorization audit support
361 ----------------------------------------------
363 Detailed authentication and authorization audit information is now
364 logged to Samba's debug logs under the "auth_audit" debug class,
365 including in particular the client IP address triggering the audit
366 line. Additionally, if Samba is compiled against the jansson JSON
367 library, a JSON representation is logged under the "auth_json_audit"
370 Audit support is comprehensive for all authentication and
371 authorisation of user accounts in the Samba Active Directory Domain
372 Controller, as well as the implicit authentication in password
373 changes. In the file server and classic/NT4 domain controller, NTLM
374 authentication, SMB and RPC authorization is covered, however password
375 changes are not at this stage, and this support is not currently
376 backed by a testsuite.
378 For further details, see:
379 https://wiki.samba.org/index.php/Setting_up_Audit_Logging
381 Multi-process LDAP Server
382 -------------------------
384 The LDAP server in the AD DC now honours the process model used for
385 the rest of the 'samba' process, rather than being forced into a single
386 process. This aids in Samba's ability to scale to larger numbers of AD
387 clients and the AD DC's overall resiliency, but will mean that there is a
388 fork()ed child for every LDAP client, which may be more resource
389 intensive in some situations. If you run Samba in a
390 resource-constrained VM, consider allocating more RAM and swap space.
392 Improved Read-Only Domain Controller (RODC) Support
393 ---------------------------------------------------
395 Support for RODCs in Samba AD until now has been experimental. With this latest
396 version, many of the critical bugs have been fixed and the RODC can be used in
397 DC environments requiring no writable behaviour. RODCs now correctly support
398 bad password lockouts and password disclosure auditing through the
399 msDS-RevealedUsers attribute.
401 The fixes made to the RWDC will also allow Windows RODC to function more
402 correctly and to avoid strange data omissions such as failures to replicate
403 groups or updated passwords. Password changes are currently rejected at the
404 RODC, although referrals should be given over LDAP. While any bad passwords can
405 trigger domain-wide lockout, good passwords which have not been replicated yet
406 for a password change can only be used via NTLM on the RODC (and not Kerberos).
408 The reliability of RODCs locating a writable partner still requires some
409 improvements and so the 'password server' configuration option is generally
410 recommended on the RODC.
412 Samba 4.7 is the first Samba release to be secure as an RODC or when
413 hosting an RODC. If you have been using earlier Samba versions to
414 host or be an RODC, please upgrade.
416 In particular see https://bugzilla.samba.org/show_bug.cgi?id=12977 for
417 details on the security implications for password disclosure to an
418 RODC using earlier versions.
420 Additional password hashes stored in supplementalCredentials
421 ------------------------------------------------------------
423 A new config option 'password hash userPassword schemes' has been added to
424 enable generation of SHA-256 and SHA-512 hashes (without storing the plaintext
425 password with reversible encryption). This builds upon previous work to improve
426 password sync for the AD DC (originally using GPG).
428 The user command of 'samba-tool' has been updated in order to be able to
429 extract these additional hashes, as well as extracting the (HTTP) WDigest
430 hashes that we had also been storing in supplementalCredentials.
432 Improvements to DNS during Active Directory domain join
433 -------------------------------------------------------
435 The 'samba-tool' domain join command will now add the A and GUID DNS records
436 (on both the local and remote servers) during a join if possible via RPC. This
437 should allow replication to proceed more smoothly post-join.
439 The mname element of the SOA record will now also be dynamically generated to
440 point to the local read-write server. 'samba_dnsupdate' should now be more
441 reliable as it will now find the appropriate name server even when resolv.conf
442 points to a forwarder.
444 Significant AD performance and replication improvements
445 -------------------------------------------------------
447 Previously, replication of group memberships was been an incredibly expensive
448 process for the AD DC. This was mostly due to unnecessary CPU time being spent
449 parsing member linked attributes. The database now stores these linked
450 attributes in sorted form to perform efficient searches for existing members.
451 In domains with a large number of group memberships, a join can now be
452 completed in half the time compared with Samba 4.6.
454 LDAP search performance has also improved, particularly in the unindexed search
455 case. Parsing and processing of security descriptors should now be more
456 efficient, improving replication but also overall performance.
458 Query record for open file or directory
459 ---------------------------------------
461 The record attached to an open file or directory in Samba can be
462 queried through the 'net tdb locking' command. In clustered Samba this
463 can be useful to determine the file or directory triggering
464 corresponding "hot" record warnings in ctdb.
466 Removal of lpcfg_register_defaults_hook()
467 -----------------------------------------
469 The undocumented and unsupported function lpcfg_register_defaults_hook()
470 that was used by external projects to call into Samba and modify
471 smb.conf default parameter settings has been removed. If your project
472 was using this call please raise the issue on
473 samba-technical@lists.samba.org in order to design a supported
474 way of obtaining the same functionality.
476 Change of loadable module interface
477 -----------------------------------
479 The _init function of all loadable modules in Samba has changed
482 NTSTATUS _init(void);
486 NTSTATUS _init(TALLOC_CTX *);
488 This allows a program loading a module to pass in a long-lived
489 talloc context (which must be guaranteed to be alive for the
490 lifetime of the module). This allows modules to avoid use of
491 the talloc_autofree_context() (which is inherently thread-unsafe)
492 and still be valgrind-clean on exit. Modules that don't need to
493 free long-lived data on exit should use the NULL talloc context.
495 SHA256 LDAPS Certificates
496 -------------------------
498 The self-signed certificate generated for use on LDAPS will now be
499 generated with a SHA256 self-signature, not a SHA1 self-signature.
501 Replacing this certificate with a certificate signed by a trusted
502 CA is still highly recommended.
507 * CTDB no longer allows mixed minor versions in a cluster
509 See the AllowMixedVersions tunable option in ctdb-tunables(7) and also
510 https://wiki.samba.org/index.php/Upgrading_a_CTDB_cluster#Policy
512 * CTDB now ignores hints from Samba about TDB flags when attaching to databases
514 CTDB will use the correct flags depending on the type of database.
515 For clustered databases, the smb.conf setting
516 dbwrap_tdb_mutexes:*=true will be ignored. Instead, CTDB continues
517 to use the TDBMutexEnabled tunable.
519 * New configuration variable CTDB_NFS_CHECKS_DIR
521 See ctdbd.conf(5) for more details.
523 * The CTDB_SERVICE_AUTOSTARTSTOP configuration variable has been
526 To continue to manage/unmanage services while CTDB is running:
528 - Start service by hand and then flag it as managed
530 - Mark service as unmanaged and shut it down by hand
532 - In some cases CTDB does something fancy - e.g. start Samba under
533 "nice", so care is needed. One technique is to disable the
534 eventscript, mark as managed, run the startup event by hand and then
535 re-enable the eventscript.
537 * The CTDB_SCRIPT_DEBUGLEVEL configuration variable has been removed
539 * The example NFS Ganesha call-out has been improved
541 * A new "replicated" database type is available
543 Replicated databases are intended for CTDB's internal use to
544 replicate state data across the cluster, but may find other
545 uses. The data in replicated databases is valid for the lifetime of
546 CTDB and cleared on first attach.
548 Using x86_64 Accelerated AES Crypto Instructions
549 ------------------------------------------------
551 Samba on x86_64 can now be configured to use the Intel accelerated AES
552 instruction set, which has the potential to make SMB3 signing and
553 encryption much faster on client and server. To enable this, configure
554 Samba using the new option --accel-aes=intelaesni.
556 This is a temporary solution that is being included to allow users
557 to enjoy the benefits of Intel accelerated AES on the x86_64 platform,
558 but the longer-term solution will be to move Samba to a fully supported
559 external crypto library.
561 The third_party/aesni-intel code will be removed from Samba as soon as
562 external crypto library performance reaches parity.
564 The default is to build without setting --accel-aes, which uses the
565 existing Samba software AES implementation.
570 The "strict sync" global parameter has been changed from
571 a default of "no" to "yes". This means smbd will by default
572 obey client requests to synchronize unwritten data in operating
573 system buffers safely onto disk. This is a safer default setting
574 for modern SMB1/2/3 clients.
576 The 'ntlm auth' option default is renamed to 'ntlmv2-only', reflecting
577 the previous behaviour. Two new values have been provided,
578 'mschapv2-and-ntlmv2-only' (allowing MSCHAPv2 while denying NTLMv1)
579 and 'disabled', totally disabling NTLM authentication and password
585 Parameter Name Description Default
586 -------------- ----------- -------
587 allow unsafe cluster upgrade New parameter no
588 auth event notification New parameter no
589 auth methods Deprecated
590 client max protocol Effective SMB3_11
592 map untrusted to domain New value/ auto
595 mit kdc command New parameter
596 profile acls Deprecated
597 rpc server dynamic port range New parameter 49152-65535
598 strict sync Default changed yes
599 password hash userPassword schemes New parameter
600 ntlm auth New values ntlmv2-only
606 https://wiki.samba.org/inFdex.php/Release_Planning_for_Samba_4.7#Release_blocking_bugs
609 CHANGES SINCE 4.7.0rc6
610 ======================
613 A man in the middle attack may hijack client connections.
616 A man in the middle attack can read and may alter confidential
617 documents transferred via a client connection, which are reached
618 via DFS redirect when the original connection used SMB3.
621 Client with write access to a share can cause server memory contents to be
622 written into a file or printer.
625 CHANGES SINCE 4.7.0rc5
626 ======================
628 o Jeremy Allison <jra@samba.org>
629 * BUG 13003: s3: vfs: catia: compression get/set must act only on base file, and
630 must cope with fsp==NULL.
631 * BUG 13008: lib: crypto: Make smbd use the Intel AES instruction set for signing
634 o Andrew Bartlett <abartlet@samba.org>
635 * BUG 12946: s4-drsuapi: Avoid segfault when replicating as a non-admin with
636 GUID_DRS_GET_CHANGES.
637 * BUG 13015: Allow re-index of newer databases with binary GUID TDB keys
638 (this officially removes support for re-index of the original pack format 0,
639 rather than simply segfaulting).
640 * BUG 13017: Add ldb_ldif_message_redacted_string() to allow debug of redacted
641 log messages, avoiding showing secret values.
642 * BUG 13023: ldb: version 1.2.2.
643 * BUG 13025: schema: Rework dsdb_schema_set_indices_and_attributes() db
646 o Alexander Bokovoy <ab@samba.org>
647 * BUG 13030: Install dcerpc/__init__.py for all Python environments.
649 o Ralph Boehme <slow@samba.org>
650 * BUG 13024: s3/smbd: Sticky write time offset miscalculation causes broken
652 * BUG 13037: lib/util: Only close the event_fd in tfork if the caller didn't
653 call tfork_event_fd().
655 o Volker Lendecke <vl@samba.org>
656 * BUG 13006: messaging: Avoid a socket leak after fork.
658 o Stefan Metzmacher <metze@samba.org>
659 * BUG 13018: charset: Fix str[n]casecmp_m() by comparing lower case values.
661 o Gary Lockyer <gary@catalyst.net.nz>
662 * BUG 13037: util_runcmd: Free the fde in event handler.
664 o Amitay Isaacs <amitay@gmail.com>
665 * BUG 13012: ctdb-daemon: Fix implementation of process_exists control.
666 * BUG 13021: GET_DB_SEQNUM control can cause ctdb to deadlock when databases
668 * BUG 13029: ctdb-daemon: Free up record data if a call request is deferred.
669 * BUG 13036: ctdb-client: Initialize ctdb_ltdb_header completely for empty
672 o Christof Schmitt <cs@samba.org>
673 * BUG 13032: vfs_streams_xattr: Fix segfault when running with log level 10.
676 CHANGES SINCE 4.7.0rc4
677 ======================
679 o Andrew Bartlett <abartlet@samba.org>
680 * BUG 12929: smb.conf: Explain that "ntlm auth" is a per-passdb setting.
681 * BUG 12953: s4/lib/tls: Use SHA256 to sign the TLS certificates.
683 o Jeremy Allison <jra@samba.org>
684 * BUG 12932: Get rid of talloc_autofree_context().
686 o Amitay Isaacs <amitay@gmail.com>
687 * BUG 12978: After restarting CTDB, it attaches replicated databases with
690 o Stefan Metzmacher <metze@samba.org>
691 * BUG 12863: s3:smbclient: Don't try any workgroup listing with
692 "client min protocol = SMB2".
693 * BUG 12876: s3:libsmb: Don't call cli_NetServerEnum() on SMB2/3 connections
694 in SMBC_opendir_ctx().
695 * BUG 12881: s3:libsmb: Let do_connect() debug the negotiation result
696 similar to "session request ok".
697 * BUG 12919: s4:http/gensec: add missing tevent_req_done() to
698 gensec_http_ntlm_update_done().
699 * BUG 12968: Fix 'smbclient tarmode' with SMB2/3.
700 * BUG 12973: 'smbd': Don't use a lot of CPU on startup of a connection.
702 o Christof Schmitt <cs@samba.org>
703 * BUG 12983: vfs_default: Fix passing of errno from async calls.
705 o Andreas Schneider <asn@samba.org>
706 * BUG 12629: s3:utils: Do not report an invalid range for AD DC role.
707 * BUG 12704: s3:libsmb: Let get_ipc_connect() use
708 CLI_FULL_CONNECTION_FORCE_SMB1.
709 * BUG 12930: Fix build issues with GCC 7.1.
710 * BUG 12950: s3:script: Untaint user supplied data in modprinter.pl.
711 * BUG 12956: s3:libads: Fix changing passwords with Kerberos.
712 * BUG 12975: Fix changing the password with 'smbpasswd' as a local user on
716 CHANGES SINCE 4.7.0rc3
717 ======================
719 o Jeremy Allison <jra@samba.org>
720 * BUG 12913: Implement cli_smb2_setatr() by calling cli_smb2_setpathinfo().
722 o Andrew Bartlett <abartlet@samba.org>
723 * BUG 11392: s4-cldap/netlogon: Match Windows 2012R2 and return
724 NETLOGON_NT_VERSION_5 when version unspecified.
725 * BUG 12855: dsdb: Do not force a re-index of sam.ldb on upgrade to 4.7.
726 * BUG 12904: dsdb: Fix dsdb_next_callback to correctly use ldb_module_done()
728 * BUG 12939: s4-rpc_server: Improve debug of new endpoints.
730 o Ralph Boehme <slow@samba.org>
731 * BUG 12791: Fix kernel oplocks issues with named streams.
732 * BUG 12944: vfs_gpfs: Handle EACCES when fetching DOS attributes from xattr.
734 o Bob Campbell <bobcampbell@catalyst.net.nz>
735 * BUG 12842: samdb/cracknames: Support user and service principal as desired
738 o David Disseldorp <ddiss@samba.org>
739 * BUG 12911: vfs_ceph: Fix cephwrap_chdir().
741 o Gary Lockyer <gary@catalyst.net.nz>
742 * BUG 12865: Track machine account ServerAuthenticate3.
744 o Marc Muehlfeld <mmuehlfeld@samba.org>
745 * BUG 12947: python: Fix incorrect kdc.conf parameter name in kerberos.py.
747 o Noel Power <noel.power@suse.com>
748 * BUG 12937: s3/utils: 'smbcacls' failed to detect DIRECTORIES using SMB2
751 o Arvid Requate <requate@univention.de>
752 * BUG 11392: s4-dsdb/netlogon: Allow missing ntver in cldap ping.
754 o Anoop C S <anoopcs@redhat.com>
755 * BUG 12936: source3/client: Fix typo in help message displayed by default.
757 o Andreas Schneider <asn@samba.org>
758 * BUG 12930: Fix building with GCC 7.1.1.
761 CHANGES SINCE 4.7.0rc2
762 ======================
764 o Jeremy Allison <jra@samba.org>
765 * BUG 12836: s3: smbd: Fix a read after free if a chained SMB1 call goes
767 * BUG 12899: s3: libsmb: Reverse sense of 'clear all attributes', ignore
768 attribute change in SMB2 to match SMB1.
769 * BUG 12914: s3: smbclient: Add new command deltree.
771 o Ralph Boehme <slow@samba.org>
772 * BUG 12885: s3/smbd: Let non_widelink_open() chdir() to directories
774 * BUG 12887: Remove SMB_VFS_STRICT_UNLOCK noop from the VFS.
775 * BUG 12891: Enable TDB mutexes in dbwrap and ctdb.
776 * BUG 12897: vfs_fruit: don't use MS NFS ACEs with Windows clients.
777 * BUG 12910: s3/notifyd: Ensure notifyd doesn't return from
780 o Alexander Bokovoy <ab@samba.org>
781 * BUG 12905: Build py3 versions of other rpc modules.
783 o Günther Deschner <gd@samba.org>
784 * BUG 12840: vfs_fruit: Add "fruit:model = <modelname>" parametric option.
787 * BUG 12720: idmap_ad: Retry query_user exactly once if we get
790 o Amitay Isaacs <amitay@gmail.com>
791 * BUG 12891: dbwrap_ctdb: Fix calculation of persistent flag.
793 o Thomas Jarosch <thomas.jarosch@intra2net.com>
794 * BUG 12927: s3: libsmb: Fix use-after-free when accessing pointer *p.
796 o Volker Lendecke <vl@samba.org>
797 * BUG 12925: smbd: Fix a connection run-down race condition.
799 o Stefan Metzmacher <metze@samba.org>
800 * tevent: version 0.9.33: make tevent_req_print() more robust against crashes.
802 * BUG 12882: Do not install _ldb_text.py if we have system libldb.
803 * BUG 12890: s3:smbd: consistently use talloc_tos() memory for
804 rpc_pipe_open_interface().
805 * BUG 12900: Fix index out of bound in ldb_msg_find_common_values.
807 o Rowland Penny <rpenny@samba.org>
808 * BUG 12884: Easily edit a users object in AD, as if using 'ldbedit'.
810 o Bernhard M. Wiedemann <bwiedemann@suse.de>
811 * BUG 12906: s3: drop build_env
813 o Andreas Schneider <asn@samba.org>
814 * BUG 12882: waf: Do not install _ldb_text.py if we have system libldb.
816 o Martin Schwenke <martin@meltin.net>
817 * BUG 12898: ctdb-common: Set close-on-exec when creating PID file.
820 CHANGES SINCE 4.7.0rc1
821 ======================
823 o Jeffrey Altman <jaltman@secure-endpoints.com>
824 * BUG 12894: CVE-2017-11103: Orpheus' Lyre KDC-REP service name validation
827 #######################################
828 Reporting bugs & Development Discussion
829 #######################################
831 Please discuss this release on the samba-technical mailing list or by
832 joining the #samba-technical IRC channel on irc.freenode.net.
834 If you do report problems then please try to send high quality
835 feedback. If you don't provide vital information to help us track down
836 the problem then you will probably be ignored. All bug reports should
837 be filed under the Samba 4.1 and newer product in the project's Bugzilla
838 database (https://bugzilla.samba.org/).
841 ======================================================================
842 == Our Code, Our Bugs, Our Responsibility.
844 ======================================================================