Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2017:0494 - Security Advisory
Issued:
2017-03-23
Updated:
2017-03-23

RHSA-2017:0494 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Red Hat Gluster Storage 3.2.0 samba security, bug fixes and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for samba is now available for Red Hat Gluster Storage 3.2 for RHEL 6.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.

The following packages have been upgraded to a later upstream version: samba (4.4.6). (BZ#1382291)

Security Fix(es):

  • It was found that Samba always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users. (CVE-2016-2125)
  • A flaw was found in the way Samba handled PAC (Privilege Attribute Certificate) checksums. A remote, authenticated attacker could use this flaw to crash the winbindd process. (CVE-2016-2126)

Enhancement(s):

  • The gluster vfs plugin now supports more than one volfile server. Samba tries to connect to the next server on the list if one of the gluster servers is not reachable. (BZ#1330081)
  • This update provides stability and improvements in error handling and code maintainability in the shadow copy module. (BZ#1385663)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the smb service will be restarted automatically.

Affected Products

  • Red Hat Gluster Storage Server for On-premise 3 for RHEL 6 x86_64

Fixes

  • BZ - 1292781 - (RHEL6) CTDB: SELinux: ctdb disablescript fails to execute because of SELinux avc's
  • BZ - 1330081 - [RHEL6] [RFE] gluster vfs plugin should be able to make use of multiple volfile server feature of gfapi
  • BZ - 1379592 - [RHEL6] Bring content into empty distgit branch
  • BZ - 1382291 - [RHEL6] Rebase Samba to 4.4.6 for RHGS 3.2.0
  • BZ - 1385663 - [RHEL6] Back port changes in shadow copy module for VSS support from upstream
  • BZ - 1403114 - CVE-2016-2125 samba: Unconditional privilege delegation to Kerberos servers in trusted realms
  • BZ - 1403115 - CVE-2016-2126 samba: Flaws in Kerberos PAC validation can trigger privilege elevation
  • BZ - 1406287 - [RHEL6] [SAMBA-CTDB]IP failover with ctdb leads to smbd crash

CVEs

  • CVE-2016-2125
  • CVE-2016-2126

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Gluster Storage Server for On-premise 3 for RHEL 6

SRPM
samba-4.4.6-4.el6rhs.src.rpm SHA-256: c978d8ec76a987f1497015ed1882ade3f45baf7f22b54881141f6fb8a0bbf65e
x86_64
ctdb-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 57847c35e4f875d38cec3dee73aae1953b35569e08999e16e6243fa43e42fc9a
ctdb-tests-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 9b349abf1599f0a936b99d3e96b1d2ab35d73b63037a664d91dce993ea9319a9
libsmbclient-4.4.6-4.el6rhs.x86_64.rpm SHA-256: f404bf03af3451df30c58a12de71f4cc6458c2bf55aefeb777557a076369a7a9
libsmbclient-devel-4.4.6-4.el6rhs.x86_64.rpm SHA-256: f7ba95ad62bbddae2fe33eb86572a7c4115379ad70b854d2ce267c3734e40cc2
libwbclient-4.4.6-4.el6rhs.x86_64.rpm SHA-256: b8e65f9e5f96863313ff63a348b1b2f2a8709f813dc83cbfb2cd8640df6f4cfb
libwbclient-devel-4.4.6-4.el6rhs.x86_64.rpm SHA-256: f5161e3da934e0e529cf69c74000f037476093fcf1a0939d6a416a06a7b7f45d
samba-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 779102e3c237b1cc76b4cb05c52fcbe77240ce34c226dc015a09839f22c9b996
samba-client-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 7b4ed09fc94be900aea01bf9100816507b0974df7d84afb624d0240c626af79d
samba-client-libs-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 485665d8ee2b0015a0979815a68972babcd64a2482ae6207a8de83ae7eb6a492
samba-common-4.4.6-4.el6rhs.noarch.rpm SHA-256: 8deb5dbba16678a18e6cd35a5265dd41791ac5d506883b9b985422863ae49391
samba-common-libs-4.4.6-4.el6rhs.x86_64.rpm SHA-256: f37629b6da8afcfadc9bedc022f81c9120494d2ee1d43326a15c4ea4a9cf3c9c
samba-common-tools-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 1616a232c05b122842576f34ad90abf32dab96fc59edea84179193603ec93aef
samba-dc-4.4.6-4.el6rhs.x86_64.rpm SHA-256: b21aee6e8a831036f0b79853346eb3bfab1202779deb8b90ea2689e3f1559f5c
samba-dc-libs-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 88a66b5e13ed507031c3c34e97042f23aa746659fe83587ce5ba1c6ff44ed8e2
samba-debuginfo-4.4.6-4.el6rhs.x86_64.rpm SHA-256: ba011a073a5eb7144852cbcd9dc5e8a58cf39efe50904d2a794ed7a4f05fee5d
samba-devel-4.4.6-4.el6rhs.x86_64.rpm SHA-256: aa898516c6116550a51d6df39f97519712c4aa78e4a6f31c5c4c24bbcd069c27
samba-krb5-printing-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 376c08c4e71dc801e032db7b0fc0c6f699dbb3f33520e7a5ee571fd5b807d7e4
samba-libs-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 575ec823f9a5a3e24005040da81f0cc017f2aff0599b86eb704f737aaec6b3d9
samba-pidl-4.4.6-4.el6rhs.noarch.rpm SHA-256: 4bd4ca631066354855892ab037fc268c555cea88efb98917a35c72f5e3d96a57
samba-python-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 26ef91aed55b6f4c3b9f8d7f413dbdf9e45a3d307a12b3f381fe15fcc7b2b55a
samba-test-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 6f8e39a9c7fbfdae0b65e871db1c52c1bb9d1c4d2ce5b971c977bc64b1e3b75e
samba-test-libs-4.4.6-4.el6rhs.x86_64.rpm SHA-256: f5da831ca111eeb4b22e520c9c258883533947e7c136fceff68892ebeca0fdac
samba-vfs-glusterfs-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 0420fd9b1393f37496271682de4349353c2016b9f61c16a42ed850b3ed27d5d5
samba-winbind-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 718dd02aae62697bb191297ded1e1d3a975cb925ae3eea70947259fb608271ca
samba-winbind-clients-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 7e9dff845625dd764d558ba7fca4bf7eb1baf21360399a1fed7af0c5d4a211ad
samba-winbind-krb5-locator-4.4.6-4.el6rhs.x86_64.rpm SHA-256: 92d81533c481c0fbad64fd36b22d77f582018bcd7dfe8bc189e2e9a2cd0481f8
samba-winbind-modules-4.4.6-4.el6rhs.x86_64.rpm SHA-256: d948b33c8a67b6ce5026c772f9feb2c43bc5b9ab8fdea651ff6159e273ddb96e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility