Samba is a suite of programs used by machines to share files, printers, andother information.A denial of service flaw was found in the Samba smbd daemon. Anauthenticated, remote user could send a specially-crafted response thatwould cause an smbd child process to enter an infinite loop. Anauthenticated, remote user could use this flaw to exhaust system resourcesby opening multiple CIFS sessions. (CVE-2009-2906)An uninitialized data access flaw was discovered in the smbd daemon whenusing the non-default "dos filemode" configuration option in "smb.conf". Anauthenticated, remote user with write access to a file could possibly usethis flaw to change an access control list for that file, even when suchaccess should have been denied. (CVE-2009-1888)A flaw was discovered in the way Samba handled users without a homedirectory set in the back-end password database (e.g. "/etc/passwd"). If ashare for the home directory of such a user was created (e.g. using theautomated "[homes]" share), any user able to access that share could seethe whole file system, possibly bypassing intended access restrictions.(CVE-2009-2813)The mount.cifs program printed CIFS passwords as part of its debug outputwhen running in verbose mode. When mount.cifs had the setuid bit set, alocal, unprivileged user could use this flaw to disclose passwords from afile that would otherwise be inaccessible to that user. Note: mount.cifsfrom the samba packages distributed by Red Hat does not have the setuid bitset. This flaw only affected systems where the setuid bit was manually setby an administrator. (CVE-2009-2948)Users of Samba should upgrade to these updated packages, which containbackported patches to correct these issues. After installing this update,the smb service will be restarted automatically.