[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1Duk33-0005RW-PQ@mercury.mandriva.com>
Date: Mon, 18 Jul 2005 22:49:41 -0600
From: Mandriva Security Team <security@...driva.com>
To: bugtraq@...urityfocus.com
Subject: MDKSA-2005:121 - Updated nss_ldap/pam_ldap packages fix vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Update Advisory
_______________________________________________________________________
Package name: nss_ldap
Advisory ID: MDKSA-2005:121
Date: July 18th, 2005
Affected versions: 10.0, 10.1, 10.2, Corporate 3.0,
Corporate Server 2.1,
Multi Network Firewall 2.0
______________________________________________________________________
Problem Description:
Rob Holland, of the Gentoo Security Audit Team, discovered that
pam_ldap and nss_ldap would not use TLS for referred connections if
they are referred to a master after connecting to a slave, regardless
of the "ssl start_tls" setting in ldap.conf.
As well, a bug in nss_ldap in Corporate Server and Mandrake 10.0
has been fixed that caused crond, and other applications, to crash as
a result of clients receiving a SIGPIPE signal when attempting to
issue a new search request to a directory server that is no longer
available.
The updated packages have been patched to address this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2069
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
914dcae90f53c038cfc011abe891ab4d 10.0/RPMS/nss_ldap-212-4.1.100mdk.i586.rpm
072543f7406517e0515d35d39e5f5f40 10.0/RPMS/pam_ldap-167-4.1.100mdk.i586.rpm
541c2b177143c43b743b8d3fe5509ea9 10.0/SRPMS/nss_ldap-212-4.1.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
5235319856a96b9a1ef18a2913f6adcf amd64/10.0/RPMS/nss_ldap-212-4.1.100mdk.amd64.rpm
20aa9281762673b4ff2a79e4c108faf8 amd64/10.0/RPMS/pam_ldap-167-4.1.100mdk.amd64.rpm
541c2b177143c43b743b8d3fe5509ea9 amd64/10.0/SRPMS/nss_ldap-212-4.1.100mdk.src.rpm
Mandrakelinux 10.1:
b0e26a28478136804d4aeb39d44c8d82 10.1/RPMS/nss_ldap-220-3.1.101mdk.i586.rpm
700a3f02f035626e93fe9de327df9d52 10.1/RPMS/pam_ldap-170-3.1.101mdk.i586.rpm
0292807cd0a28d55ca8e59489761bf25 10.1/SRPMS/nss_ldap-220-3.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
707a0491faf0022727255c56dc14c508 x86_64/10.1/RPMS/nss_ldap-220-3.1.101mdk.x86_64.rpm
066cfd679a2d6ccb8f2f04cc223c8cb9 x86_64/10.1/RPMS/pam_ldap-170-3.1.101mdk.x86_64.rpm
0292807cd0a28d55ca8e59489761bf25 x86_64/10.1/SRPMS/nss_ldap-220-3.1.101mdk.src.rpm
Mandrakelinux 10.2:
e51a248257f108f311a774d58f6c04fc 10.2/RPMS/nss_ldap-220-5.2.102mdk.i586.rpm
f8716c332eaa6a29013dc9e69c164f3d 10.2/RPMS/pam_ldap-170-5.2.102mdk.i586.rpm
9e638e127e5a8107ee23c0c1c9f76fd1 10.2/SRPMS/nss_ldap-220-5.2.102mdk.src.rpm
Mandrakelinux 10.2/X86_64:
a00d92227ecbd7ce25bd144c4a9d4ffe x86_64/10.2/RPMS/nss_ldap-220-5.2.102mdk.x86_64.rpm
87b5b7aac3a835d6e90d2ea916f0e530 x86_64/10.2/RPMS/pam_ldap-170-5.2.102mdk.x86_64.rpm
9e638e127e5a8107ee23c0c1c9f76fd1 x86_64/10.2/SRPMS/nss_ldap-220-5.2.102mdk.src.rpm
Multi Network Firewall 2.0:
bb3ebbd81508ff14425daaac2e6eb339 mnf/2.0/RPMS/nss_ldap-212-4.1.M20mdk.i586.rpm
b1ad2c72353d0e1213c9e0ae81c61ff9 mnf/2.0/RPMS/pam_ldap-167-4.1.M20mdk.i586.rpm
e240c07b08757410dbc411d2d6430e14 mnf/2.0/SRPMS/nss_ldap-212-4.1.M20mdk.src.rpm
Corporate Server 2.1:
2afb0b0dbd3b0ed51a2b62d8387f09f4 corporate/2.1/RPMS/nss_ldap-202-1.3.C21mdk.i586.rpm
bdec2ce99957b1018084b04a8d27b18d corporate/2.1/RPMS/pam_ldap-156-1.3.C21mdk.i586.rpm
b8b51a75d94c7fdbfce141f8eb634059 corporate/2.1/SRPMS/nss_ldap-202-1.3.C21mdk.src.rpm
Corporate Server 2.1/X86_64:
ce833d0b6359c54b8bd6337e65fb85fa x86_64/corporate/2.1/RPMS/nss_ldap-202-1.3.C21mdk.x86_64.rpm
6ed783d9f1581a9e736b09d3d8ceebeb x86_64/corporate/2.1/RPMS/pam_ldap-156-1.3.C21mdk.x86_64.rpm
b8b51a75d94c7fdbfce141f8eb634059 x86_64/corporate/2.1/SRPMS/nss_ldap-202-1.3.C21mdk.src.rpm
Corporate 3.0:
8916317b50c123371f31e97744c81b9c corporate/3.0/RPMS/nss_ldap-212-4.1.C30mdk.i586.rpm
7a62fb9be21fb245e9f66307f77b898e corporate/3.0/RPMS/pam_ldap-167-4.1.C30mdk.i586.rpm
bc3cde29ad21289d345c22ddda8fdb2a corporate/3.0/SRPMS/nss_ldap-212-4.1.C30mdk.src.rpm
Corporate 3.0/X86_64:
063b326df178942502a2be421891fdf1 x86_64/corporate/3.0/RPMS/nss_ldap-212-4.1.C30mdk.x86_64.rpm
be16dc6b6bb027a561d6415b46af19be x86_64/corporate/3.0/RPMS/pam_ldap-167-4.1.C30mdk.x86_64.rpm
bc3cde29ad21289d345c22ddda8fdb2a x86_64/corporate/3.0/SRPMS/nss_ldap-212-4.1.C30mdk.src.rpm
_______________________________________________________________________
Bug IDs fixed (see http://qa.mandriva.com for more information):
13271 - changing crontab crashes crond when using LDAP for authentication
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFC3IZlmqjQ0CJFipgRAkTGAKDkXx8EJb9v3mpvSaX/mPVeepZmpACghrZ0
ct6RX4vR+OyjBK9n/9lluqU=
=ioO9
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists