-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: samba3x security update
Advisory ID:       RHSA-2017:1272-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2017:1272
Issue date:        2017-05-24
CVE Names:         CVE-2017-7494 
====================================================================
1. Summary:

An update for samba3x is now available for Red Hat Enterprise Linux 5
Extended Lifecycle Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server (v. 5 ELS) - i386, s390x, x86_64

3. Description:

Samba is an open-source implementation of the Server Message Block (SMB) or
Common Internet File System (CIFS) protocol, which allows PC-compatible
machines to share files, printers, and other information.

Security Fix(es):

* A remote code execution flaw was found in Samba. A malicious
authenticated samba client, having write access to the samba share, could
use this flaw to execute arbitrary code as root. (CVE-2017-7494)

Red Hat would like to thank the Samba project for reporting this issue.
Upstream acknowledges steelo as the original reporter.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the smb service will be restarted
automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1450347 - CVE-2017-7494 samba: Loading shared modules from any path in the system leading to RCE

6. Package List:

Red Hat Enterprise Linux Server (v. 5 ELS):

Source:
samba3x-3.6.23-14.el5_11.src.rpm

i386:
samba3x-3.6.23-14.el5_11.i386.rpm
samba3x-client-3.6.23-14.el5_11.i386.rpm
samba3x-common-3.6.23-14.el5_11.i386.rpm
samba3x-debuginfo-3.6.23-14.el5_11.i386.rpm
samba3x-doc-3.6.23-14.el5_11.i386.rpm
samba3x-domainjoin-gui-3.6.23-14.el5_11.i386.rpm
samba3x-swat-3.6.23-14.el5_11.i386.rpm
samba3x-winbind-3.6.23-14.el5_11.i386.rpm
samba3x-winbind-devel-3.6.23-14.el5_11.i386.rpm

s390x:
samba3x-3.6.23-14.el5_11.s390x.rpm
samba3x-client-3.6.23-14.el5_11.s390x.rpm
samba3x-common-3.6.23-14.el5_11.s390x.rpm
samba3x-debuginfo-3.6.23-14.el5_11.s390.rpm
samba3x-debuginfo-3.6.23-14.el5_11.s390x.rpm
samba3x-doc-3.6.23-14.el5_11.s390x.rpm
samba3x-domainjoin-gui-3.6.23-14.el5_11.s390x.rpm
samba3x-swat-3.6.23-14.el5_11.s390x.rpm
samba3x-winbind-3.6.23-14.el5_11.s390.rpm
samba3x-winbind-3.6.23-14.el5_11.s390x.rpm
samba3x-winbind-devel-3.6.23-14.el5_11.s390.rpm
samba3x-winbind-devel-3.6.23-14.el5_11.s390x.rpm

x86_64:
samba3x-3.6.23-14.el5_11.x86_64.rpm
samba3x-client-3.6.23-14.el5_11.x86_64.rpm
samba3x-common-3.6.23-14.el5_11.x86_64.rpm
samba3x-debuginfo-3.6.23-14.el5_11.i386.rpm
samba3x-debuginfo-3.6.23-14.el5_11.x86_64.rpm
samba3x-doc-3.6.23-14.el5_11.x86_64.rpm
samba3x-domainjoin-gui-3.6.23-14.el5_11.x86_64.rpm
samba3x-swat-3.6.23-14.el5_11.x86_64.rpm
samba3x-winbind-3.6.23-14.el5_11.i386.rpm
samba3x-winbind-3.6.23-14.el5_11.x86_64.rpm
samba3x-winbind-devel-3.6.23-14.el5_11.i386.rpm
samba3x-winbind-devel-3.6.23-14.el5_11.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2017-7494
https://access.redhat.com/security/updates/classification/#important
https://www.samba.org/samba/security/CVE-2017-7494.html
https://access.redhat.com/security/vulnerabilities/3034621

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFZJXsvXlSAg2UNWIIRAoAuAJ9Wes7v2YpTfCI2EZoIy+75DEYjRQCeJ6MY
uM5BG8IMm9bFtCwhTvcxrI8=/9qH
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

RedHat: RHSA-2017-1272:01 Important: samba3x security update

An update for samba3x is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support

Summary

Samba is an open-source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information.
Security Fix(es):
* A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root. (CVE-2017-7494)
Red Hat would like to thank the Samba project for reporting this issue. Upstream acknowledges steelo as the original reporter.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the smb service will be restarted automatically.

References

https://access.redhat.com/security/cve/CVE-2017-7494 https://access.redhat.com/security/updates/classification/#important https://www.samba.org/samba/security/CVE-2017-7494.html https://access.redhat.com/security/vulnerabilities/3034621

Package List

Red Hat Enterprise Linux Server (v. 5 ELS):
Source: samba3x-3.6.23-14.el5_11.src.rpm
i386: samba3x-3.6.23-14.el5_11.i386.rpm samba3x-client-3.6.23-14.el5_11.i386.rpm samba3x-common-3.6.23-14.el5_11.i386.rpm samba3x-debuginfo-3.6.23-14.el5_11.i386.rpm samba3x-doc-3.6.23-14.el5_11.i386.rpm samba3x-domainjoin-gui-3.6.23-14.el5_11.i386.rpm samba3x-swat-3.6.23-14.el5_11.i386.rpm samba3x-winbind-3.6.23-14.el5_11.i386.rpm samba3x-winbind-devel-3.6.23-14.el5_11.i386.rpm
s390x: samba3x-3.6.23-14.el5_11.s390x.rpm samba3x-client-3.6.23-14.el5_11.s390x.rpm samba3x-common-3.6.23-14.el5_11.s390x.rpm samba3x-debuginfo-3.6.23-14.el5_11.s390.rpm samba3x-debuginfo-3.6.23-14.el5_11.s390x.rpm samba3x-doc-3.6.23-14.el5_11.s390x.rpm samba3x-domainjoin-gui-3.6.23-14.el5_11.s390x.rpm samba3x-swat-3.6.23-14.el5_11.s390x.rpm samba3x-winbind-3.6.23-14.el5_11.s390.rpm samba3x-winbind-3.6.23-14.el5_11.s390x.rpm samba3x-winbind-devel-3.6.23-14.el5_11.s390.rpm samba3x-winbind-devel-3.6.23-14.el5_11.s390x.rpm
x86_64: samba3x-3.6.23-14.el5_11.x86_64.rpm samba3x-client-3.6.23-14.el5_11.x86_64.rpm samba3x-common-3.6.23-14.el5_11.x86_64.rpm samba3x-debuginfo-3.6.23-14.el5_11.i386.rpm samba3x-debuginfo-3.6.23-14.el5_11.x86_64.rpm samba3x-doc-3.6.23-14.el5_11.x86_64.rpm samba3x-domainjoin-gui-3.6.23-14.el5_11.x86_64.rpm samba3x-swat-3.6.23-14.el5_11.x86_64.rpm samba3x-winbind-3.6.23-14.el5_11.i386.rpm samba3x-winbind-3.6.23-14.el5_11.x86_64.rpm samba3x-winbind-devel-3.6.23-14.el5_11.i386.rpm samba3x-winbind-devel-3.6.23-14.el5_11.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2017:1272-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2017:1272
Issued Date: : 2017-05-24
CVE Names: CVE-2017-7494

Topic

An update for samba3x is now available for Red Hat Enterprise Linux 5Extended Lifecycle Support.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux Server (v. 5 ELS) - i386, s390x, x86_64


Bugs Fixed

1450347 - CVE-2017-7494 samba: Loading shared modules from any path in the system leading to RCE


Related News