389-ds-base.git
2 years ago[PATCH] Issue 5218 - double-free of the virtual attribute context in persistent searc...
tbordaz [Mon, 21 Mar 2022 13:24:12 +0000 (14:24 +0100)]
[PATCH] Issue 5218 - double-free of the virtual attribute context in persistent search (#5219)

description:
A search is processed by a worker using a private pblock.
If the search is persistent, the worker spawn a thread
and kind of duplicate its private pblock so that the spawn
        thread continue to process the persistent search.
Then worker ends the initial search, reinit (free) its private pblock,
        and returns monitoring the wait_queue.
When the persistent search completes, it frees the duplicated
pblock.
The problem is that private pblock and duplicated pblock
        are referring to a same structure (pb_vattr_context).
        That can lead to a double free

Fix:
When cloning the pblock (slapi_pblock_clone) make sure
to transfert the references inside the original (private)
pblock to the target (cloned) one
        That includes pb_vattr_context pointer.

Reviewed by: Mark Reynolds, James Chapman, Pierre Rogier (Thanks !)

Co-authored-by: Mark Reynolds <mreynolds@redhat.com>
Gbp-Pq: Name CVE-2021-4091.patch

2 years agofix-nss-path
Debian FreeIPA Team [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
fix-nss-path

Gbp-Pq: Name fix-nss-path.diff

2 years agoUse pkg-config to detect icu, since icu-config is deprecated
Hugh McMaster [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
Use pkg-config to detect icu, since icu-config is deprecated

Bug: https://pagure.io/389-ds-base/issue/50067
Bug-Debian: https://bugs.debian.org/916115
Forwarded: https://pagure.io/389-ds-base/pull-request/50111
Last-Update: 2018-12-28

and will be removed from Debian

Gbp-Pq: Name icu_pkg-config.patch

2 years agoperl-use-move-instead-of-rename
Debian FreeIPA Team [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
perl-use-move-instead-of-rename

Gbp-Pq: Name perl-use-move-instead-of-rename.diff

2 years ago[PATCH] Ticket bz1525628 - invalid password migration causes unauth bind
William Brown [Thu, 18 Jan 2018 01:27:58 +0000 (11:27 +1000)]
[PATCH] Ticket bz1525628 - invalid password migration causes unauth bind

Bug Description:  Slapi_ct_memcmp expects both inputs to be
at LEAST size n. If they are not, we only compared UP to n.

Invalid migrations of passwords (IE {CRYPT}XX) would create
a pw which is just salt and no hash. ct_memcmp would then
only verify the salt bits and would allow the authentication.

This relies on an administrative mistake both of allowing
password migration (nsslapd-allow-hashed-passwords) and then
subsequently migrating an INVALID password to the server.

Fix Description:  slapi_ct_memcmp now access n1, n2 size
and will FAIL if they are not the same, but will still compare
n bytes, where n is the "longest" memory, to the first byte
of the other to prevent length disclosure of the shorter
value (generally the mis-migrated password)

https://bugzilla.redhat.com/show_bug.cgi?id=1525628

Author: wibrown

Review by: ???

Gbp-Pq: Name CVE-2017-15135.patch

2 years agoFix the path to systemctl binary
Timo Aaltonen [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
Fix the path to systemctl binary

Gbp-Pq: Name fix-systemctl-path.diff

2 years agofix-saslpath
Debian FreeIPA Team [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
fix-saslpath

Gbp-Pq: Name fix-saslpath.diff

2 years agofix-obsolete-target
Debian FreeIPA Team [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
fix-obsolete-target

Gbp-Pq: Name fix-obsolete-target.diff

2 years agorename-online-scripts
Debian FreeIPA Team [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
rename-online-scripts

Gbp-Pq: Name rename-online-scripts.diff

2 years agouse-bash-instead-of-sh
Debian FreeIPA Team [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
use-bash-instead-of-sh

Gbp-Pq: Name use-bash-instead-of-sh.diff

2 years ago389-ds-base (1.4.0.21-1+deb10u1) buster-security; urgency=medium
Anton Gladky [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
389-ds-base (1.4.0.21-1+deb10u1) buster-security; urgency=medium

  * Non-maintainer upload by the LTS Security Team.
  * CVE-2021-4091: double free of the virtual attribute context in
                   persistent search.
  * CVE-2022-0918: an unauthenticated attacker with network access to
                   the LDAP port
                   can cause a denial of service.
  * CVE-2022-0996: expired password was still allowed to access the database.
  * CVE-2022-2850: possible NULL pointer dereference leading to a denial of
                   service.
  * CVE-2021-3652: importing an asterisk as password hashes enables successful
                   authentication with any password, allowing attackers to
                   access accounts with disabled passwords.
  * CVE-2021-3514: an authenticated attacker can crash 389-ds-base using a
                   specially crafted query in sync_repl client, due to a NULL
                   pointer dereference.
  * CVE-2019-14824:deref plugin vulnerability lets authenticated attackers
                   access private attributes, like password hashes, using the
                   'search' permission.
  * CVE-2019-10224:vulnerability that may disclose sensitive information,
                   including the Directory Manager password, when executing
                   dscreate and dsconf commands in verbose mode.and dsconf
                   commands in verbose mode and recording the terminal standard
                   error output.
  * CVE-2019-3883: SSL/TLS requests do not enforce ioblocktimeout limit, leading
                   to DoS vulnerability by hanging all workers with hanging LDAP
                   requests.

[dgit import unpatched 389-ds-base 1.4.0.21-1+deb10u1]

2 years agoImport 389-ds-base_1.4.0.21-1+deb10u1.debian.tar.xz
Anton Gladky [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
Import 389-ds-base_1.4.0.21-1+deb10u1.debian.tar.xz

[dgit import tarball 389-ds-base 1.4.0.21-1+deb10u1 389-ds-base_1.4.0.21-1+deb10u1.debian.tar.xz]

6 years agoImport 389-ds-base_1.4.0.21.orig.tar.bz2
Timo Aaltonen [Tue, 12 Feb 2019 14:28:15 +0000 (14:28 +0000)]
Import 389-ds-base_1.4.0.21.orig.tar.bz2

[dgit import orig 389-ds-base_1.4.0.21.orig.tar.bz2]