lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1WDYjQ-0001hf-Mw@titan.mandriva.com>
Date: Wed, 12 Feb 2014 13:16:00 +0100
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2014:026 ] openldap

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2014:026
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : openldap
 Date    : February 12, 2014
 Affected: Business Server 1.0, Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability has been discovered and corrected in openldap:
 
 The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not
 properly count references, which allows remote attackers to cause
 a denial of service (slapd crash) by unbinding immediately after a
 search request, which triggers rwm_conn_destroy to free the session
 context while it is being used by rwm_op_search (CVE-2013-4449).
 
 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4449
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 f6f47a0a0de36f77454b42b7d67cad11  mes5/i586/libldap2.4_2-2.4.11-3.6mdvmes5.2.i586.rpm
 6ef1ee5fae026d70c3a940b597c2899c  mes5/i586/libldap2.4_2-devel-2.4.11-3.6mdvmes5.2.i586.rpm
 cff64c1d004f5dcadf58893f54bd2b79  mes5/i586/libldap2.4_2-static-devel-2.4.11-3.6mdvmes5.2.i586.rpm
 4bc668febb73c0ce41d928f6bc66aead  mes5/i586/openldap-2.4.11-3.6mdvmes5.2.i586.rpm
 3c22bef679a50ecaf3ea705089b3b787  mes5/i586/openldap-clients-2.4.11-3.6mdvmes5.2.i586.rpm
 5bda4d05eb3c630b915aebde7c80410c  mes5/i586/openldap-doc-2.4.11-3.6mdvmes5.2.i586.rpm
 95e6338873c0b3643cf0983bcd82a933  mes5/i586/openldap-servers-2.4.11-3.6mdvmes5.2.i586.rpm
 dea70a29075de07ca438417e5b775856  mes5/i586/openldap-testprogs-2.4.11-3.6mdvmes5.2.i586.rpm
 0ad5f08372fb554fff145b9f202f8845  mes5/i586/openldap-tests-2.4.11-3.6mdvmes5.2.i586.rpm 
 8358868a61a01b5204d032d9674e5728  mes5/SRPMS/openldap-2.4.11-3.6mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 9ac984f57b49bcac9c244dcb2ea25f82  mes5/x86_64/lib64ldap2.4_2-2.4.11-3.6mdvmes5.2.x86_64.rpm
 ad204d57a8e77c683b18fb57db9df223  mes5/x86_64/lib64ldap2.4_2-devel-2.4.11-3.6mdvmes5.2.x86_64.rpm
 0101675decfd5db7f4bcdd2e205e5533  mes5/x86_64/lib64ldap2.4_2-static-devel-2.4.11-3.6mdvmes5.2.x86_64.rpm
 924c8eb8dce5616f72cfd1c74ec3ffc0  mes5/x86_64/openldap-2.4.11-3.6mdvmes5.2.x86_64.rpm
 b5483d5352e88095541aa4289c3f762b  mes5/x86_64/openldap-clients-2.4.11-3.6mdvmes5.2.x86_64.rpm
 b2067967b6d3b3eb1a4536b76e8b2052  mes5/x86_64/openldap-doc-2.4.11-3.6mdvmes5.2.x86_64.rpm
 6b328f09e078fbcdf8138f60eeb0c3c1  mes5/x86_64/openldap-servers-2.4.11-3.6mdvmes5.2.x86_64.rpm
 9517f66ee97e0db3099135fff5c07a19  mes5/x86_64/openldap-testprogs-2.4.11-3.6mdvmes5.2.x86_64.rpm
 70b08cd0c8d45322bba7bfbdba2cf202  mes5/x86_64/openldap-tests-2.4.11-3.6mdvmes5.2.x86_64.rpm 
 8358868a61a01b5204d032d9674e5728  mes5/SRPMS/openldap-2.4.11-3.6mdvmes5.2.src.rpm

 Mandriva Business Server 1/X86_64:
 1fbea4ddae49067310f9d52862186f12  mbs1/x86_64/lib64ldap2.4_2-2.4.33-2.1.mbs1.x86_64.rpm
 3bed34f442d7d99ca6770a0aa334bf0e  mbs1/x86_64/lib64ldap2.4_2-devel-2.4.33-2.1.mbs1.x86_64.rpm
 a10e56dc0d771e8da27059c0d84966fe  mbs1/x86_64/lib64ldap2.4_2-static-devel-2.4.33-2.1.mbs1.x86_64.rpm
 df4a9a4436890707a76fe41c16999800  mbs1/x86_64/openldap-2.4.33-2.1.mbs1.x86_64.rpm
 32fd4c412cf89d78e0887734bce10d36  mbs1/x86_64/openldap-clients-2.4.33-2.1.mbs1.x86_64.rpm
 958f98530f1119e48d8f6f224d01ca6a  mbs1/x86_64/openldap-doc-2.4.33-2.1.mbs1.x86_64.rpm
 b75dca39829dbca00adc0884e2ca6fbf  mbs1/x86_64/openldap-servers-2.4.33-2.1.mbs1.x86_64.rpm
 8c4e2d2ef7e480d05ebcf9655adf2a94  mbs1/x86_64/openldap-testprogs-2.4.33-2.1.mbs1.x86_64.rpm
 193e318abe419a0689144bf7af70ade6  mbs1/x86_64/openldap-tests-2.4.33-2.1.mbs1.x86_64.rpm 
 4ebfb4dcbb423c34c48e03e61c96507a  mbs1/SRPMS/openldap-2.4.33-2.1.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFS+zntmqjQ0CJFipgRAs5lAJ4wB5uIoWCjIemdoHE+ckHo0sCITgCfQTN+
5nYyzgdu8tu5hQKop4wVlTo=
=VJPx
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ