File _patchinfo of Package patchinfo.3824
<patchinfo incident="3824">
<issue id="1014442" tracker="bnc">VUL-0: EMBARGOED: CVE-2016-2126: samba: denial of service due to a client triggered crash in the winbindd parent</issue>
<issue id="1014441" tracker="bnc">VUL-0: EMBARGOED: CVE-2016-2125: samba: don't send delegated credentials to all servers</issue>
<issue id="1009085" tracker="bnc">SMBCLIENT tries netbios over port 139 even after "disable netbios" parameter is used.</issue>
<issue id="1014437" tracker="bnc">VUL-0: EMBARGOED: CVE-2016-2123: samba: Samba NDR Parsing ndr_pull_dnsp_name Heap-based Buffer Overflow Remote Code Execution Vulnera</issue>
<issue id="2016-2125" tracker="cve" />
<issue id="2016-2126" tracker="cve" />
<issue id="2016-2123" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>jmcdough</packager>
<description>
This update for samba fixes the following issues:
Security issues fixed:
- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441).
- CVE-2016-2126: Denial of service due to a client triggered crash in the winbindd
parent process. (bsc#1014442).
- CVE-2016-2123: Heap-based Buffer Overflow Remote Code Execution Vulnerability. (bsc#1014437).
This component is not built into our packages, so we are not affected.
Non security issues fixed:
- s3/client: obey 'disable netbios' smb.conf param, don't connect via NBT port; (bsc#1009085)
</description>
<summary>Security update for samba</summary>
</patchinfo>