Update for Botan, Botan.2802, DirectFB, DirectFB... security important

Security update for samba

This update fixes these security vulnerabilities:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2114: "server signing = mandatory" not enforced (bsc#973035).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks (bsc#973036).
- CVE-2016-2118: "Badlock" DCERPC impersonation of authenticated account were possible (bsc#971965).

The openSUSE 13.1 update also upgrades to samba 4.2.4 as 4.1.x versions
are no longer supported by upstream. As a side effect, libpdb0 package
was replaced by libsamba-passdb0.

Fixed bugs
VUL-0: CVE-2015-5370: samba: RPC crash in dcesrv_auth_bind_ack() due to a missing error check on the return value of dcerpc_pull_auth_trailer() could lead to a remote denial-of-service
VUL-0: CVE-2016-2118: samba: SAMR and LSA man in the middle attacks possible (aka "BADLOCK")
VUL-0: CVE-2016-2110: samba: NTLM-SSP auth. downgrade
VUL-0: CVE-2016-2111: samba: Microsofts NETLOGON spoofing
VUL-0: CVE-2016-2112: samba: The LDAP client and server dont enforce integrity protection
VUL-0: CVE-2016-2113: samba: Missing TLS certificate validation allows man in the middle attacks
VUL-0: CVE-2016-2114: samba: "server signing = mandatory" not enforced
VUL-0: CVE-2016-2115: samba: SMB client connections for IPC traffic are not integrity protected
VUL-0: CVE-2013-4408: samba: DCERPC frag_len not checked
VUL-0: CVE-2013-4496: samba: Password lockout not enforced for SAMR password changes
VUL-0: CVE-2012-6150: samba: winbind pam security problem
VUL-0: CVE-2015-0240: samba/talloc: talloc free on uninitialized stack pointer in netlogon server could lead to security vulnerability.
VUL-0: CVE-2015-5252: samba: Insufficient symlink verification (file access outside the share)
VUL-0: CVE-2015-5299: samba: Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2)
VUL-0: CVE-2015-5296: samba: No man in the middle protection when forcing smb encryption on the client side
VUL-0: CVE-2015-5330: samba: Remote read memory exploit in LDB
VUL-0: CVE-2015-7560: samba: Getting and setting Windows ACLs on symlinks can change permissions on link target.
Selected Binaries
openSUSE Build Service is sponsored by