Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2016:0015 - Security Advisory
Issued:
2016-01-08
Updated:
2016-01-08

RHSA-2016:0015 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: samba security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated samba packages that fix multiple security issues are now available
for Red Hat Gluster Storage 3.1 for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

Samba is an open-source implementation of the Server Message Block (SMB) or
Common Internet File System (CIFS) protocol, which allows PC-compatible
machines to share files, printers, and other information.

A man-in-the-middle vulnerability was found in the way "connection signing"
was implemented by Samba. A remote attacker could use this flaw to
downgrade an existing Samba client connection and force the use of plain
text. (CVE-2015-5296)

A missing access control flaw was found in Samba. A remote, authenticated
attacker could use this flaw to view the current snapshot on a Samba share,
despite not having DIRECTORY_LIST access rights. (CVE-2015-5299)

Multiple buffer over-read flaws were found in the way Samba handled
malformed inputs in certain encodings. An authenticated, remote attacker
could possibly use these flaws to disclose portions of the server memory.
(CVE-2015-5330)

A denial of service flaw was found in the LDAP server provided by the AD DC
in the Samba process daemon. A remote attacker could exploit this flaw by
sending a specially crafted packet, which could cause the server to consume
an excessive amount of memory and crash. (CVE-2015-7540)

An access flaw was found in the way Samba verified symbolic links when
creating new files on a Samba share. A remote attacker could exploit this
flaw to gain access to files outside of Samba's share path. (CVE-2015-5252)

Red Hat would like to thank the Samba project for reporting these issues.
Upstream acknowledges Stefan Metzmacher of the Samba Team and Sernet.de as
the original reporters of CVE-2015-5296, partha@exablox.com as the original
reporter of CVE-2015-5299, Jan "Yenya" Kasprzak and the Computer Systems
Unit team at Faculty of Informatics, Masaryk University as the original
reporters of CVE-2015-5252 flaws, and Douglas Bagnall as the original
reporter of CVE-2015-5330.

All samba users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing this
update, the smb service will be restarted automatically.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Gluster Storage Server for On-premise 3 for RHEL 6 x86_64

Fixes

  • BZ - 1276126 - CVE-2015-5299 Samba: Missing access control check in shadow copy code
  • BZ - 1281326 - CVE-2015-5330 samba, libldb: remote memory read in the Samba LDAP server
  • BZ - 1288451 - CVE-2015-7540 samba: DoS to AD-DC due to insufficient checking of asn1 memory allocation
  • BZ - 1290288 - CVE-2015-5252 samba: Insufficient symlink verification in smbd
  • BZ - 1290292 - CVE-2015-5296 samba: client requesting encryption vulnerable to downgrade attack

CVEs

  • CVE-2015-5252
  • CVE-2015-5296
  • CVE-2015-5299
  • CVE-2015-5330
  • CVE-2015-7540

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Gluster Storage Server for On-premise 3 for RHEL 6

SRPM
samba-4.1.17-16.el6rhs.src.rpm SHA-256: b1c9ece09c66ddd018f8589f6c3f9cbdef062ce4797329928ce1ef5e8f0bd1af
x86_64
libsmbclient-4.1.17-16.el6rhs.x86_64.rpm SHA-256: dc0ae29c2eab3943cf73de1152d0fe87a5c5cd7a70689d0afafcccc2ba36f455
libsmbclient-devel-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 69537349b917c64b9f156372398e1cf4b27673dbec9c134323275bfbb289983c
libwbclient-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 541d841c0bc2e8f0c9a18ebcaa32fdd4ad596fbcc0a2f3a96dc05eccdf6a0287
libwbclient-devel-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 6db3bc7f13295ca7a4f046ceff13a4328d4a1b2d29cf760d6ef21d615ec267c5
samba-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 344da82bdb9c577a7df4dd7ad1907991cf1b91244c244a84ff7849fc16bb113f
samba-client-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 4e245f629d7f9952d2f6c41dddc2622254711b2be5c443bacca034d5dd9a2279
samba-common-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 4c4e6648e8ee849859f706f43c6b5ff2c37a099548d8e770a362f825232fd7e0
samba-dc-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 69bb1291b1fb17961fdd96955e1e69787447a926a6aacce0e9df8e2f82554b6b
samba-dc-libs-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 0f79dc693b6f41d7336d5ad4ef3141351318236429f05dc940363ffddeadba28
samba-debuginfo-4.1.17-16.el6rhs.x86_64.rpm SHA-256: c8d3b821a4562f23d0d471826992f1d2f3e577c2c4b0f8586850f8212495e850
samba-devel-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 9d797904382a161ed68ac46b694675fced17251e21dc6e4e10710e744cce549e
samba-libs-4.1.17-16.el6rhs.x86_64.rpm SHA-256: b60947ca6535e676fd621228074e4863f6d35c7042f3192cb0ce678f6c0b4d4e
samba-pidl-4.1.17-16.el6rhs.noarch.rpm SHA-256: 0518d8a02e4b323f51e28536bb461890c9bf4c37bf02d63f914b5d0d2c5ba53f
samba-python-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 37b65f67916a775245652f564b9aae8b6aeff49ddfee082635449d80bd6ecf54
samba-test-4.1.17-16.el6rhs.x86_64.rpm SHA-256: a410370382dba6b46ce74a5101de5707c991f9df3f7c62a26b6937b096fa5861
samba-test-devel-4.1.17-16.el6rhs.x86_64.rpm SHA-256: e2d86c807005b998d7fccb3001d4619023fbbdd81f29811e22b8fa0f132a886d
samba-test-libs-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 8c1786cac0b3a5ee5b8c9ff541b4bd98a2371f7ab1afb7f5db191aeff3670d5c
samba-vfs-glusterfs-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 2a131043c75f91ce2174b0c0425d8fb3012de707d968c9beb92eab50d8379705
samba-winbind-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 6db2602799fb3308228b0b02f1d2c896cd714ee6d08aed6b8d242e3d4ae21648
samba-winbind-clients-4.1.17-16.el6rhs.x86_64.rpm SHA-256: faa0e5bc8afb2097061e18653ecf2709cff82f987299e21d27e30062e89db2a2
samba-winbind-krb5-locator-4.1.17-16.el6rhs.x86_64.rpm SHA-256: f2663df9515305f87ec119e74f86e0b406a9f4ac615d7c52e7daa88df0e5708f
samba-winbind-modules-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 94cc9718882292d4f2d4fd21fdc5e7d073505a3b8ee4c70c9aeb11836410e182

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility