Updated samba packages that fix one security issue are now available forRed Hat Storage 3.Red Hat Product Security has rated this update as having Critical securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section.

Samba is an open-source implementation of the Server Message Block (SMB) orCommon Internet File System (CIFS) protocol, which allows PC-compatiblemachines to share files, printers, and other information.An uninitialized pointer use flaw was found in the Samba daemon (smbd).A malicious Samba client could send specially crafted netlogon packetsthat, when processed by smbd, could potentially lead to arbitrary codeexecution with the privileges of the user running smbd (by default, theroot user). (CVE-2015-0240)For additional information about this flaw, see the Knowledgebase articleat https://access.redhat.com/articles/1346913Red Hat would like to thank the Samba project for reporting this issue.Upstream acknowledges Richard van Eeden of Microsoft Vulnerability Researchas the original reporter of this issue.All Samba users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. After installing thisupdate, the smb service will be restarted automatically.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Storage Server 3.0

SRPMS:
samba-3.6.509-169.6.el6rhs.src.rpm
    MD5: 97be126d2f768c74695b8307b722637cSHA-256: 027fd5666d6d3d79ce32359ce951da7951893fdd4763a7aeba4184f039668304
 
x86_64:
libsmbclient-3.6.509-169.6.el6rhs.x86_64.rpm
    MD5: 59a80e0cab66e59f0ee280be781ec17eSHA-256: eb9ec6432873f5a14a7d65dfbdff2619c09e783fee8d033e5bec11b870b05128
libsmbclient-devel-3.6.509-169.6.el6rhs.x86_64.rpm
    MD5: 8b490e67b58bf28eee197e628916df13SHA-256: 7c830852c548c4478770856d5404bdc3b1c5dbaaaa9cea5b70f2fa1822d83afc
samba-3.6.509-169.6.el6rhs.x86_64.rpm
    MD5: 5088baa1d8dd50eacdd6fcf7f10a2c4fSHA-256: feca88d96024d5f9fad301aec5432556326ac169983da12d266aa45d99a870e6
samba-client-3.6.509-169.6.el6rhs.x86_64.rpm
    MD5: 9881c4797370963f224832dd2a5bad4aSHA-256: 9a0612521fc0cd9c01f45ee3ce4d66be5f4cfb36bdfd54bd71723f7e4fcf6ebf
samba-common-3.6.509-169.6.el6rhs.x86_64.rpm
    MD5: c208baa4ca62752bee038286823891e2SHA-256: 64d4f43b039828471aa810b661553dc976dd61863e96fc5ac562939b297acfa9
samba-doc-3.6.509-169.6.el6rhs.x86_64.rpm
    MD5: 624f35b276c263dda8468e45103cea81SHA-256: 388ade4fb7e1209a3c8f903859bf63068ddce987057fbddaea7b6daeb7bc0ec0
samba-domainjoin-gui-3.6.509-169.6.el6rhs.x86_64.rpm
    MD5: 0c81fb33513acf18554a13557a398e10SHA-256: dcbd349a2b46b7fb014d26892a2c5183175ba9b52b03b374db55b68c504af649
samba-glusterfs-3.6.509-169.6.el6rhs.x86_64.rpm
    MD5: b226a211969c567a339c1b2f3f590592SHA-256: 2f7217f70c92b6997e25e21d217aeb72a74ad2a5fbb38d7874a8269df4cac7da
samba-swat-3.6.509-169.6.el6rhs.x86_64.rpm
    MD5: 69ef14bf4a9d6ba77f3ade52611dcf17SHA-256: 125b121f07e87a216236d2633d20dbc76d2653f7b45671c9454855d57c96465e
samba-winbind-3.6.509-169.6.el6rhs.x86_64.rpm
    MD5: 891be6baf93f0642bac2c491289bc257SHA-256: 3d51f20358904133a171f94cfa0b98d19fd1653ee62f807d700ae6777fb06222
samba-winbind-clients-3.6.509-169.6.el6rhs.x86_64.rpm
    MD5: 5d19b5654a93f04b6f64175abc5642a0SHA-256: 1388ce2342d808773d9c0a4754bf9b8229f0bb21b08905d5d0aafa97eb2b3686
samba-winbind-devel-3.6.509-169.6.el6rhs.x86_64.rpm
    MD5: 40f0339a93f57782d893e2fb2724e373SHA-256: f1b2b6a1e21a14715c3a322063c98d0e444fc355c3a0ad6b418c7daea25fe22a
samba-winbind-krb5-locator-3.6.509-169.6.el6rhs.x86_64.rpm
    MD5: 644df7cb3bad34cf484e574307d3b3c3SHA-256: 5b9d197022e08328ce049b0429af1a4e8668ec281d064f600ab8b6f777982fd7
 
(The unlinked packages above are only available from the Red Hat Network)
1191325 – CVE-2015-0240 samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply