Synopsis:	Critical: samba security update
Issue date:	2010-11-10
CVE Names:	CVE-2010-3069

A missing array boundary checking flaw was found in the way Samba parsed
the binary representation of Windows security identifiers (SIDs). A
malicious client could send a specially-crafted SMB request to the Samba
server, resulting in arbitrary code execution with the privileges of the
Samba server (smbd). (CVE-2010-3069)

After installing this update, the smb service will be restarted 
automatically.

SL 6.x

      SRPMS:
samba-3.5.4-68.el6_0.1.src.rpm
      i386:
libsmbclient-3.5.4-68.el6_0.1.i686.rpm
libsmbclient-devel-3.5.4-68.el6_0.1.i686.rpm
samba-3.5.4-68.el6_0.1.i686.rpm
samba-client-3.5.4-68.el6_0.1.i686.rpm
samba-common-3.5.4-68.el6_0.1.i686.rpm
samba-doc-3.5.4-68.el6_0.1.i686.rpm
samba-domainjoin-gui-3.5.4-68.el6_0.1.i686.rpm
samba-swat-3.5.4-68.el6_0.1.i686.rpm
samba-winbind-3.5.4-68.el6_0.1.i686.rpm
samba-winbind-clients-3.5.4-68.el6_0.1.i686.rpm
samba-winbind-devel-3.5.4-68.el6_0.1.i686.rpm
      x86_64:
libsmbclient-3.5.4-68.el6_0.1.i686.rpm
libsmbclient-3.5.4-68.el6_0.1.x86_64.rpm
libsmbclient-devel-3.5.4-68.el6_0.1.i686.rpm
libsmbclient-devel-3.5.4-68.el6_0.1.x86_64.rpm
samba-3.5.4-68.el6_0.1.x86_64.rpm
samba-client-3.5.4-68.el6_0.1.x86_64.rpm
samba-common-3.5.4-68.el6_0.1.i686.rpm
samba-common-3.5.4-68.el6_0.1.x86_64.rpm
samba-doc-3.5.4-68.el6_0.1.x86_64.rpm
samba-domainjoin-gui-3.5.4-68.el6_0.1.x86_64.rpm
samba-swat-3.5.4-68.el6_0.1.x86_64.rpm
samba-winbind-3.5.4-68.el6_0.1.x86_64.rpm
samba-winbind-clients-3.5.4-68.el6_0.1.i686.rpm
samba-winbind-clients-3.5.4-68.el6_0.1.x86_64.rpm
samba-winbind-devel-3.5.4-68.el6_0.1.i686.rpm
samba-winbind-devel-3.5.4-68.el6_0.1.x86_64.rpm

-Connie Sieh
-Troy Dawson