diff --git a/SOURCES/CVE-2017-7494.patch b/SOURCES/CVE-2017-7494.patch
new file mode 100644
index 0000000..34b4437
--- /dev/null
+++ b/SOURCES/CVE-2017-7494.patch
@@ -0,0 +1,34 @@
+From d2bc9f3afe23ee04d237ae9f4511fbe59a27ff54 Mon Sep 17 00:00:00 2001
+From: Volker Lendecke <vl@samba.org>
+Date: Mon, 8 May 2017 21:40:40 +0200
+Subject: [PATCH] CVE-2017-7494: rpc_server3: Refuse to open pipe names with /
+ inside
+
+Bug: https://bugzilla.samba.org/show_bug.cgi?id=12780
+
+Signed-off-by: Volker Lendecke <vl@samba.org>
+Reviewed-by: Jeremy Allison <jra@samba.org>
+Reviewed-by: Stefan Metzmacher <metze@samba.org>
+---
+ source3/rpc_server/srv_pipe.c | 5 +++++
+ 1 file changed, 5 insertions(+)
+
+diff --git a/source3/rpc_server/srv_pipe.c b/source3/rpc_server/srv_pipe.c
+index 0633b5f..c3f0cd8 100644
+--- a/source3/rpc_server/srv_pipe.c
++++ b/source3/rpc_server/srv_pipe.c
+@@ -475,6 +475,11 @@ bool is_known_pipename(const char *pipename, struct ndr_syntax_id *syntax)
+ {
+ 	NTSTATUS status;
+ 
++	if (strchr(pipename, '/')) {
++		DEBUG(1, ("Refusing open on pipe %s\n", pipename));
++		return false;
++	}
++
+ 	if (lp_disable_spoolss() && strequal(pipename, "spoolss")) {
+ 		DEBUG(10, ("refusing spoolss access\n"));
+ 		return false;
+-- 
+1.9.1
+
diff --git a/SPECS/samba.spec b/SPECS/samba.spec
index 177a601..153d214 100644
--- a/SPECS/samba.spec
+++ b/SPECS/samba.spec
@@ -6,7 +6,7 @@
 # ctdb is enabled by default, you can disable it with: --without clustering
 %bcond_without clustering
 
-%define main_release 13
+%define main_release 14
 
 %define samba_version 4.4.4
 %define talloc_version 2.1.6
@@ -124,6 +124,7 @@ Patch13:   samba-4.4.x-fix_libads_krb5_memcache.patch
 Patch14:   CVE-2016-2125-v4-4.patch
 Patch15:   CVE-2016-2126-v4-4.patch
 Patch16:   CVE-2017-2619-v4-4.patch
+Patch17:   CVE-2017-7494.patch
 
 BuildRoot:      %(mktemp -ud %{_tmppath}/%{name}-%{version}-%{release}-XXXXXX)
 
@@ -725,6 +726,7 @@ and use CTDB instead.
 %patch14 -p1 -b .CVE-2016-2125-v4-4.patch
 %patch15 -p1 -b .CVE-2016-2126-v4-4.patch
 %patch16 -p1 -b .CVE-2017-2619-v4-4.patch
+%patch17 -p1 -b .CVE-2017-7494.patch
 
 %build
 %global _talloc_lib ,talloc,pytalloc,pytalloc-util
@@ -2033,6 +2035,9 @@ rm -rf %{buildroot}
 %endif # with_clustering_support
 
 %changelog
+* Thu May 18 2017 Guenther Deschner <gdeschner@redhat.com> - 4.4.4-14
+- resolves: #1450784 - Security fix for CVE-2017-7494
+
 * Wed Apr 05 2017 Andreas Schneider <asn@redhat.com> - 4.4.4-13
 - resolves: #1437816 - Fix krb5 memory cache in libads sasl code
 - resolves: #1437741 - Fix CVE-2016-2125, CVE-2016-2126 and CVE-2017-2619