Change logs for openldap2.2 source package in Breezy

  • openldap2.2 (2.2.26-3ubuntu0.2) breezy-security; urgency=low
    
      * SECURITY UPDATE: Denial of service possible with a crafted remote
        LDAP BIND request due to an assert failure.
      * libraries/libldap/getdn.c: check for string end conditions, as done
        in upstream CVS.
      * References
        http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/getdn.c.diff?r1=1.133&r2=1.134
        CVE-2006-5779
    
     -- Kees Cook <email address hidden>   Mon, 20 Nov 2006 13:43:38 -0800
  • openldap2.2 (2.2.26-3ubuntu0.1) breezy-security; urgency=low
    
      * SECURITY UPDATE: Crash/arbitrary code execution with crafted host names.
      * servers/slurpd/st.c, St_read():
        - Do not sprintf arbitrarily long strings into fixed-size tbuf.
        - Patch ported from upstream CVS commit:
          http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?
          r1=1.21&r2=1.22&hideattic=1&sortbydate=0&f=u
        - CVE-2006-2754
    
     -- Martin Pitt <email address hidden>   Mon, 26 Jun 2006 12:04:39 +0000
  • openldap2.2 (2.2.26-3) unstable; urgency=low
    
    
      * [SECURITY] Applied the patch available at 
          http://bugzilla.padl.com/show_bug.cgi?id=210
        to force libldap to really use TLS when requested in /etc/ldap/ldap.conf
        (cf. CAN-2005-2069). Clients still will use libldap2 from openldap2
        source package so this is only to prepare unleashing the libraries of
        OpenLDAP 2.2 for unstable...
    
     -- Torsten Landschoff <email address hidden>  Sun,  3 Jul 2005 10:41:37 +0200