UbuntuUpdates.org

Package "slapd-smbk5pwd"

Name: slapd-smbk5pwd

Description:

Keeps Samba and Kerberos passwords in sync within slapd.

Latest version: 2.4.31-1+nmu2ubuntu8.5
Release: trusty (14.04)
Level: updates
Repository: universe
Head package: openldap
Homepage: http://www.openldap.org/

Links


Download "slapd-smbk5pwd"


Other versions of "slapd-smbk5pwd" in Trusty

Repository Area Version
base universe 2.4.31-1+nmu2ubuntu8
security universe 2.4.31-1+nmu2ubuntu8.4

Changelog

Version: 2.4.31-1+nmu2ubuntu8.5 2018-11-21 22:06:20 UTC

  openldap (2.4.31-1+nmu2ubuntu8.5) trusty; urgency=medium

  * d/apparmor-profile: update apparmor profile to allow reading of
    files needed when slapd is behaving as a kerberos/gssapi client
    and acquiring its own ticket. (LP: #1783183)

 -- Andreas Hasenack <email address hidden> Mon, 22 Oct 2018 09:49:38 -0300

Source diff to previous version
1783183 apparmor profile denied for kerberos client keytab and credential cache files

Version: 2.4.31-1+nmu2ubuntu8.4 2017-06-01 15:06:43 UTC

  openldap (2.4.31-1+nmu2ubuntu8.4) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service via search with page size of 0
    - debian/patches/CVE-2017-9287.patch: fix double-free in
      servers/slapd/back-mdb/search.c.
    - CVE-2017-9287

 -- Marc Deslauriers <email address hidden> Tue, 30 May 2017 15:24:10 -0400

Source diff to previous version
CVE-2017-9287 servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can cr

Version: 2.4.31-1+nmu2ubuntu8.3 2016-07-06 08:06:36 UTC

  openldap (2.4.31-1+nmu2ubuntu8.3) trusty; urgency=medium

  * Fix segfault issue in slap_bv2ad (LP: #1593378)
    - d/p/its-7941-fix-for-repeated-tags.patch: Cherry picked
    patch from upstream VCS.

 -- Eric Desrochers <email address hidden> Fri, 24 Jun 2016 11:05:23 +0200

Source diff to previous version
1593378 crash in slap_bv2ad using repeated tags

Version: 2.4.31-1+nmu2ubuntu8.2 2015-09-16 19:06:45 UTC

  openldap (2.4.31-1+nmu2ubuntu8.2) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service via crafted BER data
    - debian/patches/CVE-2015-6908.patch: remove obsolete assert in
      libraries/liblber/io.c.
    - CVE-2015-6908
  * SECURITY UPDATE: user impersonation via incorrect default permissions
    - debian/slapd.init.ldif: disallow modifying one's own entry by
      default.
    - CVE-2014-9713

 -- Marc Deslauriers Mon, 14 Sep 2015 10:36:46 -0400

Source diff to previous version
CVE-2015-6908 The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable as
CVE-2014-9713 The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's per

Version: 2.4.31-1+nmu2ubuntu8.1 2015-05-26 20:51:55 UTC

  openldap (2.4.31-1+nmu2ubuntu8.1) trusty-security; urgency=medium

  * SECURITY UPDATE: fix rwm overlay reference counting. (LP: #1446809)
    - debian/patches/CVE-2013-4449.patch: fix reference counting
    - CVE-2013-4449
  * SECURITY UPDATE: fix NULL pointer dereference in deref_parseCtrl()
    - debian/patches/CVE-2015-1545.patch: require non-empty AttributeList
    - CVE-2015-1545

 -- Felipe Reyes <email address hidden> Tue, 19 May 2015 13:00:21 -0300

1446809 [SRU] denial of service via an LDAP search query (CVE-2012-1164, CVE-2013-4449, CVE-2015-1545)
CVE-2013-4449 The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of servic
CVE-2015-1545 The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service



About   -   Send Feedback to @ubuntu_updates