Security update for samba

This update for samba fixes the following issues:

Security issues fixed:

- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441).
- CVE-2016-2126: Denial of service due to a client triggered crash in the winbindd
parent process. (bsc#1014442).
- CVE-2016-2123: Heap-based Buffer Overflow Remote Code Execution Vulnerability. (bsc#1014437).
The component affected is not built in our packages.

Non security issues fixed:

- s3/client: obey 'disable netbios' smb.conf param, don't connect via NBT port; (bsc#1009085)
- Add doc changes for net ads --no-dns-updates switch; (bsc#991564)
- Include vfstest in samba-test; (bsc#1001203).
- s3/winbindd: using default domain with user@domain.com format fails (bsc#997833).
- Fix illegal memory access after memory has been deleted (bsc#975299).
- Fix bug in tevent poll backend causing winbind to loop tightly (bsc#994500).
- Various fixes for spnego/ntlm (bsc#986675).
This update was imported from the SUSE:SLE-12-SP1:Update update project.

Fixed bugs
bnc#975299
Segfault from smbtorture in opendir
bnc#986675
L3: SUSE-12-SP1-2016-604 - breaks NTLM passthrough in Mozilla Firefox
bnc#1014442
VUL-0: EMBARGOED: CVE-2016-2126: samba: denial of service due to a client triggered crash in the winbindd parent
bnc#1014441
VUL-0: EMBARGOED: CVE-2016-2125: samba: don't send delegated credentials to all servers
bnc#1009085
SMBCLIENT tries netbios over port 139 even after "disable netbios" parameter is used.
bnc#994500
After updating to SLES 12 SP1 from SLES 11 SP4 Winbind is causing high utilization.
bnc#991564
samba won't stop doing dns updates (even with allow dns updates = disabled)
bnc#997833
Login to smb with and without domain
bnc#1014437
VUL-0: EMBARGOED: CVE-2016-2123: samba: Samba NDR Parsing ndr_pull_dnsp_name Heap-based Buffer Overflow Remote Code Execution Vulnera
bnc#1001203
Include vfstest in samba-test
Selected Binaries
openSUSE Build Service is sponsored by