Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2008:0372 - Bug Fix Advisory
Issued:
2008-05-21
Updated:
2008-05-21

RHBA-2008:0372 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

samba bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated samba packages that fix several bugs and add an enhancement are
now available.

Description

Samba is a suite of programs used by machines to share files, printers, and
other information.

These updated packages fix the following bugs:

  • the 32-bit version of pam_winbind.so, required for 32-bit PAM-compatible

applications, did not work on systems running a 64-bit version of the
winbind daemon. Errors such as "Invalid request size received" occurred.

  • on Samba shares with UNIX(R) CIFS extensions enabled, removing a symbolic

link using the "rm -f" command returned a successful exit code; however,
the symbolic link was never removed. Symbolic links are correctly removed
in these updated packages.

  • a regression caused by the fix for CVE-2007-4572, which prevented some

clients from being able to properly access shares, has been resolved.

  • changes in the way Microsoft Windows Vista handles Kerberos packets,

caused certain Samba operations to fail. In these updated packages,
Microsoft Windows Vista clients can correctly connect to Samba servers.

  • in certain situations, on Microsoft Windows XP clients, attempting to

write to a file on a Samba share resulted in a "Network path was not found"
error.

  • if a user created a file on a Microsoft Windows XP client, and then went

offline and modified that file, synchronizing the offline files failed with
a "Access is denied" error. In these updated packages, offline files are
correctly synchronized.

  • two spellings mistakes in "smb.conf", "Netwrok" and "Scurity", have been

resolved.

  • it was possible to use the nmbd command to specify invalid port numbers

(higher than 65536), causing invalid ports to be created, and, in some
cases, a "port number definition: unsigned short" error to be displayed.
In these updated packages, when an invalid port number is specified, the
default port number is used.

  • communication problems with trusted domains from a Samba Domain

Controller, which caused a "Error looking up domain users" error when
running the "wbinfo -u" command, have been resolved.

  • if a directory was created that only allowed the owning group execute

permissions, and the "other" group no permissions, adding a new user to the
ACL via Microsoft Windows resulted in read permissions being added to the
owning group, and the "other" group. In these updated packages, adding a
new user to an ACL via Microsoft Windows, no longer adds read permissions
when they are not specified.

  • in certain situations, copying to or from a Samba share failed with a

"The specified network name is no longer available" error. Errors such as
"read_data: read failure for [x] bytes to client" and "write_data: write
failure in writing to client" were logged to the Samba log file.

As well, the winbind component has been updated, which provides support
for offline logins, and multiple IDMAP back-ends.

These updated packages upgrade Samba to version 3.0.28. For a full list of
bug fixes and enhancements, refer to the Samba release notes:
http://us3.samba.org/samba/history/samba-3.0.28a.html

Users of samba are advised to upgrade to these updated packages, which
resolve these issues and add this enhancement.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 291501 - update samba to 3.0.26a or later
  • BZ - 383351 - samba returns success during posix unlink of symlinks, but doesn't remove the link
  • BZ - 407091 - Critical Regression caused by CVE-2007-4572
  • BZ - 425996 - Some minor Kerberos related Windows Vista fixes
  • BZ - 426244 - Serveral Problems with samba 3.0.25b
  • BZ - 426623 - Typo in smb.conf: Netwrok
  • BZ - 429003 - smbd and nmbd allows ports higher than 65536.
  • BZ - 429024 - After establish trust with AD, wbinfo -u does not work
  • BZ - 431243 - Adding a user to an ACL via Windows XP GUI gives away read access for owning group
  • BZ - 435316 - copy to/from samba share fails with "The specified network name is no longer available"

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
samba-3.0.28-0.el5.8.src.rpm SHA-256: 34366edff5b2127051d3300c34540889c63d1cb309ac126c60e1eb44126958cc
x86_64
samba-3.0.28-0.el5.8.x86_64.rpm SHA-256: 4d3ea0ff320c6c16dbcb980a8de4822439fa8cd8fdbfa34e0880940b9bd05ac9
samba-client-3.0.28-0.el5.8.x86_64.rpm SHA-256: 0edcf932b957ed611a777798705e6e4b07989d875b228a00e88f7c9ac167dcfd
samba-common-3.0.28-0.el5.8.i386.rpm SHA-256: 2a34850b400362a75b45cef31cf274d0b0d9e744fe69fc65a8a987d65ca75010
samba-common-3.0.28-0.el5.8.x86_64.rpm SHA-256: 1cda6158406ddca8f970c169da116e89c21b71667076ccae4483d5e2b5b279c5
samba-swat-3.0.28-0.el5.8.x86_64.rpm SHA-256: d3f04fffba53e06230015224968c02c8132efecfa2eaf3434bfb80f156767f78
ia64
samba-3.0.28-0.el5.8.ia64.rpm SHA-256: 33b1eebcc6f0149dcaf3e7e0f73a3f0fab635eddc4ef6c66c5cdc27ae4fbf72a
samba-client-3.0.28-0.el5.8.ia64.rpm SHA-256: b4ea17cfa5ba02f2e2ce91153c1079b19ca3bf69d1ef145266250524510b8f61
samba-common-3.0.28-0.el5.8.ia64.rpm SHA-256: 3804fb9cf7439c5252884c87f178b00cc2b76dcb6e5897afaa6cb20b104be3dd
samba-swat-3.0.28-0.el5.8.ia64.rpm SHA-256: 90ce296907b1c294f8a4cdc144bf3c603b7f23fb1ac3d1e2f5920035753a77ed
i386
samba-3.0.28-0.el5.8.i386.rpm SHA-256: 707eecf0d34a52d4d19b4a56fa293d01478e1099650622ae942d23f4c7d1a7f3
samba-client-3.0.28-0.el5.8.i386.rpm SHA-256: 496a0f88f5b8dddb10787e47bf35440e1f72c6c0996a7b8615aa7621f056a80c
samba-common-3.0.28-0.el5.8.i386.rpm SHA-256: 2a34850b400362a75b45cef31cf274d0b0d9e744fe69fc65a8a987d65ca75010
samba-swat-3.0.28-0.el5.8.i386.rpm SHA-256: 8a0b8b614062301c413fbf8a364ff8e6117252c599011600a5152c8dc3ebaaa6

Red Hat Enterprise Linux Workstation 5

SRPM
samba-3.0.28-0.el5.8.src.rpm SHA-256: 34366edff5b2127051d3300c34540889c63d1cb309ac126c60e1eb44126958cc
x86_64
samba-3.0.28-0.el5.8.x86_64.rpm SHA-256: 4d3ea0ff320c6c16dbcb980a8de4822439fa8cd8fdbfa34e0880940b9bd05ac9
samba-client-3.0.28-0.el5.8.x86_64.rpm SHA-256: 0edcf932b957ed611a777798705e6e4b07989d875b228a00e88f7c9ac167dcfd
samba-common-3.0.28-0.el5.8.i386.rpm SHA-256: 2a34850b400362a75b45cef31cf274d0b0d9e744fe69fc65a8a987d65ca75010
samba-common-3.0.28-0.el5.8.x86_64.rpm SHA-256: 1cda6158406ddca8f970c169da116e89c21b71667076ccae4483d5e2b5b279c5
samba-swat-3.0.28-0.el5.8.x86_64.rpm SHA-256: d3f04fffba53e06230015224968c02c8132efecfa2eaf3434bfb80f156767f78
i386
samba-3.0.28-0.el5.8.i386.rpm SHA-256: 707eecf0d34a52d4d19b4a56fa293d01478e1099650622ae942d23f4c7d1a7f3
samba-client-3.0.28-0.el5.8.i386.rpm SHA-256: 496a0f88f5b8dddb10787e47bf35440e1f72c6c0996a7b8615aa7621f056a80c
samba-common-3.0.28-0.el5.8.i386.rpm SHA-256: 2a34850b400362a75b45cef31cf274d0b0d9e744fe69fc65a8a987d65ca75010
samba-swat-3.0.28-0.el5.8.i386.rpm SHA-256: 8a0b8b614062301c413fbf8a364ff8e6117252c599011600a5152c8dc3ebaaa6

Red Hat Enterprise Linux Desktop 5

SRPM
samba-3.0.28-0.el5.8.src.rpm SHA-256: 34366edff5b2127051d3300c34540889c63d1cb309ac126c60e1eb44126958cc
x86_64
samba-3.0.28-0.el5.8.x86_64.rpm SHA-256: 4d3ea0ff320c6c16dbcb980a8de4822439fa8cd8fdbfa34e0880940b9bd05ac9
samba-client-3.0.28-0.el5.8.x86_64.rpm SHA-256: 0edcf932b957ed611a777798705e6e4b07989d875b228a00e88f7c9ac167dcfd
samba-common-3.0.28-0.el5.8.i386.rpm SHA-256: 2a34850b400362a75b45cef31cf274d0b0d9e744fe69fc65a8a987d65ca75010
samba-common-3.0.28-0.el5.8.x86_64.rpm SHA-256: 1cda6158406ddca8f970c169da116e89c21b71667076ccae4483d5e2b5b279c5
samba-swat-3.0.28-0.el5.8.x86_64.rpm SHA-256: d3f04fffba53e06230015224968c02c8132efecfa2eaf3434bfb80f156767f78
i386
samba-3.0.28-0.el5.8.i386.rpm SHA-256: 707eecf0d34a52d4d19b4a56fa293d01478e1099650622ae942d23f4c7d1a7f3
samba-client-3.0.28-0.el5.8.i386.rpm SHA-256: 496a0f88f5b8dddb10787e47bf35440e1f72c6c0996a7b8615aa7621f056a80c
samba-common-3.0.28-0.el5.8.i386.rpm SHA-256: 2a34850b400362a75b45cef31cf274d0b0d9e744fe69fc65a8a987d65ca75010
samba-swat-3.0.28-0.el5.8.i386.rpm SHA-256: 8a0b8b614062301c413fbf8a364ff8e6117252c599011600a5152c8dc3ebaaa6

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
samba-3.0.28-0.el5.8.src.rpm SHA-256: 34366edff5b2127051d3300c34540889c63d1cb309ac126c60e1eb44126958cc
s390x
samba-3.0.28-0.el5.8.s390x.rpm SHA-256: a2ef2b026eb4e3a2ec4a1ee9d1fa27c503ce776fa406aa72683977e9bf40ba25
samba-client-3.0.28-0.el5.8.s390x.rpm SHA-256: 88d6d08f4293e73c6aa512a0df9d8a2cc94ec743ef5933fb5b208b34686febb8
samba-common-3.0.28-0.el5.8.s390.rpm SHA-256: 8f78121ff5539e5bcdfbc0f53ee9310101070a38f95190107f0f7e15e945e834
samba-common-3.0.28-0.el5.8.s390x.rpm SHA-256: bbfdd1c5d00e34ba5c4908bb35175dfcaefd2e8d62060a8584a9cfa13aa417d5
samba-swat-3.0.28-0.el5.8.s390x.rpm SHA-256: 75a38eadea07a20b49f3c6b617b8d8cd5c2b82189bb9e4db068058f97048ae85

Red Hat Enterprise Linux for Power, big endian 5

SRPM
samba-3.0.28-0.el5.8.src.rpm SHA-256: 34366edff5b2127051d3300c34540889c63d1cb309ac126c60e1eb44126958cc
ppc
samba-3.0.28-0.el5.8.ppc.rpm SHA-256: f5b29548ed432e8185db2fad260c095955e930a85f3ea310daa58a37b425da02
samba-client-3.0.28-0.el5.8.ppc.rpm SHA-256: fa41c594b39a64c8ea4de4ae3adae5ff935dce326c801aaea001c3e173c7cfc9
samba-common-3.0.28-0.el5.8.ppc.rpm SHA-256: 73405ebc05b3a4875162295f56e863dc445391ef82abaa9930f6b35c7ed0f553
samba-common-3.0.28-0.el5.8.ppc64.rpm SHA-256: b66bdc30717032ddd18203370f000ea20a1eef5d3fa7a2afb7a449a9fdfec6c2
samba-swat-3.0.28-0.el5.8.ppc.rpm SHA-256: 0b57031a5a33397af6d36c13a4d45589fd2fc10fd92f39d219735f625fd630ea

Red Hat Enterprise Linux Server from RHUI 5

SRPM
samba-3.0.28-0.el5.8.src.rpm SHA-256: 34366edff5b2127051d3300c34540889c63d1cb309ac126c60e1eb44126958cc
x86_64
samba-3.0.28-0.el5.8.x86_64.rpm SHA-256: 4d3ea0ff320c6c16dbcb980a8de4822439fa8cd8fdbfa34e0880940b9bd05ac9
samba-client-3.0.28-0.el5.8.x86_64.rpm SHA-256: 0edcf932b957ed611a777798705e6e4b07989d875b228a00e88f7c9ac167dcfd
samba-common-3.0.28-0.el5.8.i386.rpm SHA-256: 2a34850b400362a75b45cef31cf274d0b0d9e744fe69fc65a8a987d65ca75010
samba-common-3.0.28-0.el5.8.x86_64.rpm SHA-256: 1cda6158406ddca8f970c169da116e89c21b71667076ccae4483d5e2b5b279c5
samba-swat-3.0.28-0.el5.8.x86_64.rpm SHA-256: d3f04fffba53e06230015224968c02c8132efecfa2eaf3434bfb80f156767f78
i386
samba-3.0.28-0.el5.8.i386.rpm SHA-256: 707eecf0d34a52d4d19b4a56fa293d01478e1099650622ae942d23f4c7d1a7f3
samba-client-3.0.28-0.el5.8.i386.rpm SHA-256: 496a0f88f5b8dddb10787e47bf35440e1f72c6c0996a7b8615aa7621f056a80c
samba-common-3.0.28-0.el5.8.i386.rpm SHA-256: 2a34850b400362a75b45cef31cf274d0b0d9e744fe69fc65a8a987d65ca75010
samba-swat-3.0.28-0.el5.8.i386.rpm SHA-256: 8a0b8b614062301c413fbf8a364ff8e6117252c599011600a5152c8dc3ebaaa6

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility