Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2016:0015 - Security Advisory
Issued:
2016-01-08
Updated:
2016-01-08

RHSA-2016:0015 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: samba security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated samba packages that fix multiple security issues are now available
for Red Hat Gluster Storage 3.1 for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

Samba is an open-source implementation of the Server Message Block (SMB) or
Common Internet File System (CIFS) protocol, which allows PC-compatible
machines to share files, printers, and other information.

A man-in-the-middle vulnerability was found in the way "connection signing"
was implemented by Samba. A remote attacker could use this flaw to
downgrade an existing Samba client connection and force the use of plain
text. (CVE-2015-5296)

A missing access control flaw was found in Samba. A remote, authenticated
attacker could use this flaw to view the current snapshot on a Samba share,
despite not having DIRECTORY_LIST access rights. (CVE-2015-5299)

Multiple buffer over-read flaws were found in the way Samba handled
malformed inputs in certain encodings. An authenticated, remote attacker
could possibly use these flaws to disclose portions of the server memory.
(CVE-2015-5330)

A denial of service flaw was found in the LDAP server provided by the AD DC
in the Samba process daemon. A remote attacker could exploit this flaw by
sending a specially crafted packet, which could cause the server to consume
an excessive amount of memory and crash. (CVE-2015-7540)

An access flaw was found in the way Samba verified symbolic links when
creating new files on a Samba share. A remote attacker could exploit this
flaw to gain access to files outside of Samba's share path. (CVE-2015-5252)

Red Hat would like to thank the Samba project for reporting these issues.
Upstream acknowledges Stefan Metzmacher of the Samba Team and Sernet.de as
the original reporters of CVE-2015-5296, partha@exablox.com as the original
reporter of CVE-2015-5299, Jan "Yenya" Kasprzak and the Computer Systems
Unit team at Faculty of Informatics, Masaryk University as the original
reporters of CVE-2015-5252 flaws, and Douglas Bagnall as the original
reporter of CVE-2015-5330.

All samba users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing this
update, the smb service will be restarted automatically.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Gluster Storage Server for On-premise 3 for RHEL 6 x86_64

Fixes

  • BZ - 1276126 - CVE-2015-5299 Samba: Missing access control check in shadow copy code
  • BZ - 1281326 - CVE-2015-5330 samba, libldb: remote memory read in the Samba LDAP server
  • BZ - 1288451 - CVE-2015-7540 samba: DoS to AD-DC due to insufficient checking of asn1 memory allocation
  • BZ - 1290288 - CVE-2015-5252 samba: Insufficient symlink verification in smbd
  • BZ - 1290292 - CVE-2015-5296 samba: client requesting encryption vulnerable to downgrade attack

CVEs

  • CVE-2015-5252
  • CVE-2015-5296
  • CVE-2015-5299
  • CVE-2015-5330
  • CVE-2015-7540

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Gluster Storage Server for On-premise 3 for RHEL 6

SRPM
samba-4.1.17-16.el6rhs.src.rpm SHA-256: b1c9ece09c66ddd018f8589f6c3f9cbdef062ce4797329928ce1ef5e8f0bd1af
x86_64
libsmbclient-4.1.17-16.el6rhs.x86_64.rpm SHA-256: dc0ae29c2eab3943cf73de1152d0fe87a5c5cd7a70689d0afafcccc2ba36f455
libsmbclient-devel-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 69537349b917c64b9f156372398e1cf4b27673dbec9c134323275bfbb289983c
libwbclient-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 541d841c0bc2e8f0c9a18ebcaa32fdd4ad596fbcc0a2f3a96dc05eccdf6a0287
libwbclient-devel-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 6db3bc7f13295ca7a4f046ceff13a4328d4a1b2d29cf760d6ef21d615ec267c5
samba-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 344da82bdb9c577a7df4dd7ad1907991cf1b91244c244a84ff7849fc16bb113f
samba-client-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 4e245f629d7f9952d2f6c41dddc2622254711b2be5c443bacca034d5dd9a2279
samba-common-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 4c4e6648e8ee849859f706f43c6b5ff2c37a099548d8e770a362f825232fd7e0
samba-dc-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 69bb1291b1fb17961fdd96955e1e69787447a926a6aacce0e9df8e2f82554b6b
samba-dc-libs-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 0f79dc693b6f41d7336d5ad4ef3141351318236429f05dc940363ffddeadba28
samba-debuginfo-4.1.17-16.el6rhs.x86_64.rpm SHA-256: c8d3b821a4562f23d0d471826992f1d2f3e577c2c4b0f8586850f8212495e850
samba-devel-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 9d797904382a161ed68ac46b694675fced17251e21dc6e4e10710e744cce549e
samba-libs-4.1.17-16.el6rhs.x86_64.rpm SHA-256: b60947ca6535e676fd621228074e4863f6d35c7042f3192cb0ce678f6c0b4d4e
samba-pidl-4.1.17-16.el6rhs.noarch.rpm SHA-256: 0518d8a02e4b323f51e28536bb461890c9bf4c37bf02d63f914b5d0d2c5ba53f
samba-python-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 37b65f67916a775245652f564b9aae8b6aeff49ddfee082635449d80bd6ecf54
samba-test-4.1.17-16.el6rhs.x86_64.rpm SHA-256: a410370382dba6b46ce74a5101de5707c991f9df3f7c62a26b6937b096fa5861
samba-test-devel-4.1.17-16.el6rhs.x86_64.rpm SHA-256: e2d86c807005b998d7fccb3001d4619023fbbdd81f29811e22b8fa0f132a886d
samba-test-libs-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 8c1786cac0b3a5ee5b8c9ff541b4bd98a2371f7ab1afb7f5db191aeff3670d5c
samba-vfs-glusterfs-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 2a131043c75f91ce2174b0c0425d8fb3012de707d968c9beb92eab50d8379705
samba-winbind-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 6db2602799fb3308228b0b02f1d2c896cd714ee6d08aed6b8d242e3d4ae21648
samba-winbind-clients-4.1.17-16.el6rhs.x86_64.rpm SHA-256: faa0e5bc8afb2097061e18653ecf2709cff82f987299e21d27e30062e89db2a2
samba-winbind-krb5-locator-4.1.17-16.el6rhs.x86_64.rpm SHA-256: f2663df9515305f87ec119e74f86e0b406a9f4ac615d7c52e7daa88df0e5708f
samba-winbind-modules-4.1.17-16.el6rhs.x86_64.rpm SHA-256: 94cc9718882292d4f2d4fd21fdc5e7d073505a3b8ee4c70c9aeb11836410e182

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our <a href='http://www.redhat.com/en/about/privacy-policy' class='privacy-policy'>Privacy Statement</a> effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter