1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
2 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
3 <html xmlns="http://www.w3.org/1999/xhtml">
5 <title>Samba 4.17.2 - Release Notes</title>
8 <H2>Samba 4.17.2 Available for Download</H2>
10 <a href="https://download.samba.org/pub/samba/stable/samba-4.17.2.tar.gz">Samba 4.17.2 (gzipped)</a><br>
11 <a href="https://download.samba.org/pub/samba/stable/samba-4.17.2.tar.asc">Signature</a>
14 <a href="https://download.samba.org/pub/samba/patches/samba-4.17.1-4.17.2.diffs.gz">Patch (gzipped) against Samba 4.17.1</a><br>
15 <a href="https://download.samba.org/pub/samba/patches/samba-4.17.1-4.17.2.diffs.asc">Signature</a>
19 ==============================
20 Release Notes for Samba 4.17.2
22 ==============================
25 This is a security release in order to address the following defects:
27 o CVE-2022-3437: There is a limited write heap buffer overflow in the GSSAPI
28 unwrap_des() and unwrap_des3() routines of Heimdal (included
30 https://www.samba.org/samba/security/CVE-2022-3437.html
32 o CVE-2022-3592: A malicious client can use a symlink to escape the exported
34 https://www.samba.org/samba/security/CVE-2022-3592.html
39 o Volker Lendecke <vl@samba.org>
40 * BUG 15207: CVE-2022-3592.
42 o Joseph Sutton <josephsutton@catalyst.net.nz>
43 * BUG 15134: CVE-2022-3437.