Synopsis: Critical: samba security update Issue date: 2010-11-10 CVE Names: CVE-2010-3069 A missing array boundary checking flaw was found in the way Samba parsed the binary representation of Windows security identifiers (SIDs). A malicious client could send a specially-crafted SMB request to the Samba server, resulting in arbitrary code execution with the privileges of the Samba server (smbd). (CVE-2010-3069) After installing this update, the smb service will be restarted automatically. SL 6.x SRPMS: samba-3.5.4-68.el6_0.1.src.rpm i386: libsmbclient-3.5.4-68.el6_0.1.i686.rpm libsmbclient-devel-3.5.4-68.el6_0.1.i686.rpm samba-3.5.4-68.el6_0.1.i686.rpm samba-client-3.5.4-68.el6_0.1.i686.rpm samba-common-3.5.4-68.el6_0.1.i686.rpm samba-doc-3.5.4-68.el6_0.1.i686.rpm samba-domainjoin-gui-3.5.4-68.el6_0.1.i686.rpm samba-swat-3.5.4-68.el6_0.1.i686.rpm samba-winbind-3.5.4-68.el6_0.1.i686.rpm samba-winbind-clients-3.5.4-68.el6_0.1.i686.rpm samba-winbind-devel-3.5.4-68.el6_0.1.i686.rpm x86_64: libsmbclient-3.5.4-68.el6_0.1.i686.rpm libsmbclient-3.5.4-68.el6_0.1.x86_64.rpm libsmbclient-devel-3.5.4-68.el6_0.1.i686.rpm libsmbclient-devel-3.5.4-68.el6_0.1.x86_64.rpm samba-3.5.4-68.el6_0.1.x86_64.rpm samba-client-3.5.4-68.el6_0.1.x86_64.rpm samba-common-3.5.4-68.el6_0.1.i686.rpm samba-common-3.5.4-68.el6_0.1.x86_64.rpm samba-doc-3.5.4-68.el6_0.1.x86_64.rpm samba-domainjoin-gui-3.5.4-68.el6_0.1.x86_64.rpm samba-swat-3.5.4-68.el6_0.1.x86_64.rpm samba-winbind-3.5.4-68.el6_0.1.x86_64.rpm samba-winbind-clients-3.5.4-68.el6_0.1.i686.rpm samba-winbind-clients-3.5.4-68.el6_0.1.x86_64.rpm samba-winbind-devel-3.5.4-68.el6_0.1.i686.rpm samba-winbind-devel-3.5.4-68.el6_0.1.x86_64.rpm -Connie Sieh -Troy Dawson