Release Announcements
---------------------

This is the latest stable release of the Samba 4.13 release series.


Changes since 4.13.2
--------------------

o  Jeremy Allison <[email protected]>
   * BUG 14210: libcli: smb2: Never print length if smb2_signing_key_valid()
     fails for crypto blob.
   * BUG 14486: s3: modules: gluster. Fix the error I made in preventing talloc
     leaks from a function. 
   * BUG 14515: s3: smbd: Don't overwrite contents of fsp->aio_requests[0] with
     NULL via TALLOC_FREE().
   * BUG 14568: s3: spoolss: Make parameters in call to user_ok_token() match
     all other uses.
   * BUG 14590: s3: smbd: Quiet log messages from usershares for an unknown
     share.

o  Ralph Boehme <[email protected]>
   * BUG 14248: samba process does not honor max log size.
   * BUG 14587: vfs_zfsacl: Add missing inherited flag on hidden "magic"
     everyone@ ACE.

o  Isaac Boukris <[email protected]>
   * BUG 13124: s3-libads: Pass timeout to open_socket_out in ms.

o  Günther Deschner <[email protected]>
   * BUG 14486: s3-vfs_glusterfs: Always disable write-behind translator.

o  Volker Lendecke <[email protected]>
   * BUG 14517: smbclient: Fix recursive mget.
   * BUG 14581: clitar: Use do_list()'s recursion in clitar.c.

o  Anoop C S <[email protected]>
   * BUG 14486: manpages/vfs_glusterfs: Mention silent skipping of write-behind
     translator.
   * BUG 14573: vfs_shadow_copy2: Preserve all open flags assuming ROFS.

o  Jones Syue <[email protected]>
   * BUG 14514: interface: Fix if_index is not parsed correctly.


#######################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.  All bug reports should
be filed under the Samba 4.1 and newer product in the project's Bugzilla
database (https://bugzilla.samba.org/).


======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================



================
Download Details
================

The uncompressed tarballs and patch files have been signed
using GnuPG (ID 6F33915B6568B7EA).  The source code can be downloaded
from:

        https://download.samba.org/pub/samba/stable/

The release notes are available online at:

        https://www.samba.org/samba/history/samba-4.13.3.html

Our Code, Our Bugs, Our Responsibility.
(https://bugzilla.samba.org/)

                        --Enjoy
                        The Samba Team

Attachment: signature.asc
Description: PGP signature

Reply via email to