samba (SL6)

Synopsis: Critical: samba security update
Advisory ID: SLSA-2015:0251-1
Issue Date: 2015-02-23
CVE Numbers: CVE-2015-0240

An uninitialized pointer use flaw was found in the Samba daemon (smbd). A
malicious Samba client could send specially crafted netlogon packets that,
when processed by smbd, could potentially lead to arbitrary code execution
with the privileges of the user running smbd (by default, the root user).
(CVE-2015-0240)

After installing this update, the smb service will be restarted
automatically.

SL6
i386
libsmbclient-3.6.23-14.el6_6.i686.rpm
libsmbclient-devel-3.6.23-14.el6_6.i686.rpm
samba-3.6.23-14.el6_6.i686.rpm
samba-client-3.6.23-14.el6_6.i686.rpm
samba-common-3.6.23-14.el6_6.i686.rpm
samba-debuginfo-3.6.23-14.el6_6.i686.rpm
samba-doc-3.6.23-14.el6_6.i686.rpm
samba-domainjoin-gui-3.6.23-14.el6_6.i686.rpm
samba-swat-3.6.23-14.el6_6.i686.rpm
samba-winbind-3.6.23-14.el6_6.i686.rpm
samba-winbind-clients-3.6.23-14.el6_6.i686.rpm
samba-winbind-devel-3.6.23-14.el6_6.i686.rpm
samba-winbind-krb5-locator-3.6.23-14.el6_6.i686.rpm
SL7
x86_64
libsmbclient-3.6.23-14.el6_6.i686.rpm
libsmbclient-3.6.23-14.el6_6.x86_64.rpm
libsmbclient-devel-3.6.23-14.el6_6.i686.rpm
libsmbclient-devel-3.6.23-14.el6_6.x86_64.rpm
samba-3.6.23-14.el6_6.x86_64.rpm
samba-client-3.6.23-14.el6_6.x86_64.rpm
samba-common-3.6.23-14.el6_6.i686.rpm
samba-common-3.6.23-14.el6_6.x86_64.rpm
samba-debuginfo-3.6.23-14.el6_6.i686.rpm
samba-debuginfo-3.6.23-14.el6_6.x86_64.rpm
samba-doc-3.6.23-14.el6_6.x86_64.rpm
samba-domainjoin-gui-3.6.23-14.el6_6.x86_64.rpm
samba-glusterfs-3.6.23-14.el6_6.x86_64.rpm
samba-swat-3.6.23-14.el6_6.x86_64.rpm
samba-winbind-3.6.23-14.el6_6.x86_64.rpm
samba-winbind-clients-3.6.23-14.el6_6.i686.rpm
samba-winbind-clients-3.6.23-14.el6_6.x86_64.rpm
samba-winbind-devel-3.6.23-14.el6_6.i686.rpm
samba-winbind-devel-3.6.23-14.el6_6.x86_64.rpm
samba-winbind-krb5-locator-3.6.23-14.el6_6.x86_64.rpm

– Scientific Linux Development Team