Skip to navigation

Security Advisory Moderate: samba security update

Advisory: RHSA-2007:0061-2
Type: Security Advisory
Severity: Moderate
Issued on: 2007-03-14
Last updated on: 2007-03-14
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2007-0452

Details

Updated samba packages that fix a denial of service vulnerability are now
available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Samba provides file and printer sharing services to SMB/CIFS clients.

A denial of service flaw was found in Samba's smbd daemon process. An
authenticated user could send a specially crafted request which would cause
a smbd child process to enter an infinite loop condition. By opening
multiple CIFS sessions, an attacker could exhaust system resources
(CVE-2007-0452).

Users of Samba should update to these packages, which contain a
backported patch to correct this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
samba-3.0.23c-2.el5.2.src.rpm
File outdated by:  RHSA-2014:0305
    MD5: b9f0c930e596610146f3f4d22461cf2e
 
IA-32:
samba-3.0.23c-2.el5.2.i386.rpm
File outdated by:  RHSA-2014:0305
    MD5: 4376969ef05a38386a8a86b1bc6b07b3
samba-client-3.0.23c-2.el5.2.i386.rpm
File outdated by:  RHSA-2014:0305
    MD5: 1454b468e11fc429da90d704a7c5f791
samba-common-3.0.23c-2.el5.2.i386.rpm
File outdated by:  RHSA-2014:0305
    MD5: 16a459ee79fe73edacad0c98d12a14d2
samba-swat-3.0.23c-2.el5.2.i386.rpm
File outdated by:  RHSA-2014:0305
    MD5: 8e078f1407f14fa52780d8ef488726be
 
IA-64:
samba-3.0.23c-2.el5.2.ia64.rpm
File outdated by:  RHSA-2014:0305
    MD5: f19aecd0327538f56455e54cdb3ccf20
samba-client-3.0.23c-2.el5.2.ia64.rpm
File outdated by:  RHSA-2014:0305
    MD5: bccc097f869bc43b91fa4eb35e1e9249
samba-common-3.0.23c-2.el5.2.ia64.rpm
File outdated by:  RHSA-2014:0305
    MD5: 95d95f23f1384a5410bf54465399b022
samba-swat-3.0.23c-2.el5.2.ia64.rpm
File outdated by:  RHSA-2014:0305
    MD5: 7afd29addffd0835eb8d893832a3036a
 
PPC:
samba-3.0.23c-2.el5.2.ppc.rpm
File outdated by:  RHSA-2014:0305
    MD5: df4ca6d488bc7ed247f2a4a12b6e193a
samba-client-3.0.23c-2.el5.2.ppc.rpm
File outdated by:  RHSA-2014:0305
    MD5: 8a8f2df3bd72b7abd7439125c924b296
samba-common-3.0.23c-2.el5.2.ppc.rpm
File outdated by:  RHSA-2014:0305
    MD5: 66f5bc534bc003dc901495b6ea83052a
samba-common-3.0.23c-2.el5.2.ppc64.rpm
File outdated by:  RHSA-2014:0305
    MD5: 633739582b5e6310bb6fb96aa2469552
samba-swat-3.0.23c-2.el5.2.ppc.rpm
File outdated by:  RHSA-2014:0305
    MD5: f2a619484d20fd94a0cf4414228216cc
 
s390x:
samba-3.0.23c-2.el5.2.s390x.rpm
File outdated by:  RHSA-2014:0305
    MD5: 251635f6d0f5cbde27aa105289e38b7d
samba-client-3.0.23c-2.el5.2.s390x.rpm
File outdated by:  RHSA-2014:0305
    MD5: d24679151bfa4ee38dd34dacf64f739a
samba-common-3.0.23c-2.el5.2.s390.rpm
File outdated by:  RHSA-2014:0305
    MD5: c8c0e08334f306279a7133ad1f126190
samba-common-3.0.23c-2.el5.2.s390x.rpm
File outdated by:  RHSA-2014:0305
    MD5: 1a0c32a0758814818dccd46162925c2f
samba-swat-3.0.23c-2.el5.2.s390x.rpm
File outdated by:  RHSA-2014:0305
    MD5: 0e2b6e82f64c5d77eb769fafa58dc7b9
 
x86_64:
samba-3.0.23c-2.el5.2.x86_64.rpm
File outdated by:  RHSA-2014:0305
    MD5: 901320e342fd069aa87098c0e5dc3b2b
samba-client-3.0.23c-2.el5.2.x86_64.rpm
File outdated by:  RHSA-2014:0305
    MD5: ed4f873bcd6c85e5bd96f4dab7403a1f
samba-common-3.0.23c-2.el5.2.i386.rpm
File outdated by:  RHSA-2014:0305
    MD5: 16a459ee79fe73edacad0c98d12a14d2
samba-common-3.0.23c-2.el5.2.x86_64.rpm
File outdated by:  RHSA-2014:0305
    MD5: 28dcc7b44ccce83118aac405a37e2a13
samba-swat-3.0.23c-2.el5.2.x86_64.rpm
File outdated by:  RHSA-2014:0305
    MD5: 25eb4104ac88c7db7eed56f08987cd70
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
samba-3.0.23c-2.el5.2.src.rpm
File outdated by:  RHSA-2014:0305
    MD5: b9f0c930e596610146f3f4d22461cf2e
 
IA-32:
samba-3.0.23c-2.el5.2.i386.rpm
File outdated by:  RHSA-2014:0305
    MD5: 4376969ef05a38386a8a86b1bc6b07b3
samba-client-3.0.23c-2.el5.2.i386.rpm
File outdated by:  RHSA-2014:0305
    MD5: 1454b468e11fc429da90d704a7c5f791
samba-common-3.0.23c-2.el5.2.i386.rpm
File outdated by:  RHSA-2014:0305
    MD5: 16a459ee79fe73edacad0c98d12a14d2
samba-swat-3.0.23c-2.el5.2.i386.rpm
File outdated by:  RHSA-2014:0305
    MD5: 8e078f1407f14fa52780d8ef488726be
 
x86_64:
samba-3.0.23c-2.el5.2.x86_64.rpm
File outdated by:  RHSA-2014:0305
    MD5: 901320e342fd069aa87098c0e5dc3b2b
samba-client-3.0.23c-2.el5.2.x86_64.rpm
File outdated by:  RHSA-2014:0305
    MD5: ed4f873bcd6c85e5bd96f4dab7403a1f
samba-common-3.0.23c-2.el5.2.i386.rpm
File outdated by:  RHSA-2014:0305
    MD5: 16a459ee79fe73edacad0c98d12a14d2
samba-common-3.0.23c-2.el5.2.x86_64.rpm
File outdated by:  RHSA-2014:0305
    MD5: 28dcc7b44ccce83118aac405a37e2a13
samba-swat-3.0.23c-2.el5.2.x86_64.rpm
File outdated by:  RHSA-2014:0305
    MD5: 25eb4104ac88c7db7eed56f08987cd70
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

225519 - CVE-2007-0452 Samba smbd denial of service


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/