- -----BEGIN PGP SIGNED MESSAGE-----
Here's another holiday release in time to be wrapped up for
This is the latest stable release of Samba. This is the version
that all production Samba servers should be running for all
It has been confirmed that previous versions of Samba 3.0 are
susceptible to a password initialization bug that could grant
an attacker unauthorized access to a user account created by
the mksmbpasswd.sh shell script.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2004-0082 to this issue.
Samba administrators not wishing to upgrade to the current
version should download the 3.0.2 release, build the pdbedit
tool, and run
~ root# pdbedit-3.0.2 --force-initialized-passwords
This will disable all accounts not possessing a valid password
(e.g. the password field has been set a string of X's).
Samba servers running 3.0.2 are not vulnerable to this bug
regardless of whether or not pdbedit has been used to sanitize
the passdb backend.
Additionally, some of the more visible bugs in 3.0.1 addressed
in the 3.0.2 release include:
~ o Joining a Samba domain from Pre-SP2 Windows 2000 clients.
~ o Logging onto a Samba domain from Windows XP clients.
~ o Problems with the %U and %u smb.conf variables in relation
~ to Windows 9x/ME clients.
~ o Kerberos failures due to an invalid in memory keytab
~ detection test.
~ o Updates to the ntlm_auth tool.
~ o Fixes for various SMB signing errors.
~ o Better separation of WINS and DNS queries for domain
~ o Issues with nss_winbind FreeBSD and Solaris.
~ o Several crash bugs in smbd and winbindd.
~ o Output formatting fixes for smbclient for better
~ compatibility with scripts based on the 2.2 version.
The source code can be downloaded from :
The uncompressed tarball and patch file have been signed
using GnuPG. The Samba public key is available at
Binary packages are available at
A simplified version of the CVS log of updates since 3.0.1
can be found in the the download directory under the name
ChangeLog-3.0.1-3.0.2. The release notes are also available
As always, all bugs (https://bugzilla.samba.org/) are our