389-ds-base.git
11 months agoSecurity fix for CVE-2024-3657
Pierre Rogier [Wed, 17 Apr 2024 16:18:04 +0000 (18:18 +0200)]
Security fix for CVE-2024-3657

Description:
A flaw was found in the 389 Directory Server. A specially-crafted LDAP query
can potentially cause a failure on the directory server, leading to a denial
of service.

Fix Description:
The code was modified to avoid a buffer overflow when logging some requests
in the audit log.

References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-3657
- https://access.redhat.com/security/cve/CVE-2024-3657
- https://bugzilla.redhat.com/show_bug.cgi?id=2274401

Gbp-Pq: Name CVE-2024-3657.patch

11 months agoSecurity fix for CVE-2024-5953
Pierre Rogier [Fri, 14 Jun 2024 11:27:10 +0000 (13:27 +0200)]
Security fix for CVE-2024-5953

Description:
A denial of service vulnerability was found in the 389 Directory Server.
This issue may allow an authenticated user to cause a server denial
of service while attempting to log in with a user with a malformed hash
in their password.

Fix Description:
To prevent buffer overflow when a bind request is processed, the bind fails
if the hash size is not coherent without even attempting to process further
the hashed password.

References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-5953
- https://access.redhat.com/security/cve/CVE-2024-5953
- https://bugzilla.redhat.com/show_bug.cgi?id=2292104

Gbp-Pq: Name CVE-2024-5953.patch

11 months agoSecurity fix for CVE-2024-8445
Pierre Rogier [Mon, 23 Sep 2024 17:18:52 +0000 (19:18 +0200)]
Security fix for CVE-2024-8445

Description:
The fix for CVE-2024-2199 in 389-ds-base was insufficient to cover all
scenarios. In certain product versions, this issue may allow
an authenticated user to cause a server crash while modifying
`userPassword` using malformed input.

References:
- https://access.redhat.com/security/cve/CVE-2024-8445
- https://nvd.nist.gov/vuln/detail/cve-2024-8445
- https://bugzilla.redhat.com/show_bug.cgi?id=2310110
- https://nvd.nist.gov/vuln/detail/CVE-2024-2199
- https://access.redhat.com/security/cve/CVE-2024-2199
- https://bugzilla.redhat.com/show_bug.cgi?id=2267976

Gbp-Pq: Name CVE-2024-8445.patch

11 months agoSecurity fix for CVE-2024-2199
James Chapman [Wed, 1 May 2024 14:01:33 +0000 (15:01 +0100)]
Security fix for CVE-2024-2199

Description:
A denial of service vulnerability was found in the 389 Directory Server.
This issue may allow an authenticated user to cause a server crash while
modifying userPassword using malformed input.

Fix Description:
When doing a mod on userPassword we reset the pblock modifier after we
set the modified timestamp, ensuring the pblock data stays valid.

References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-2199
- https://access.redhat.com/security/cve/CVE-2024-2199
- https://bugzilla.redhat.com/show_bug.cgi?id=2267976

Gbp-Pq: Name CVE-2024-2199.patch

11 months agoallow-newer-crates
Debian FreeIPA Team [Thu, 16 Jan 2025 16:16:37 +0000 (17:16 +0100)]
allow-newer-crates

Gbp-Pq: Name allow-newer-crates.diff

11 months agouse-packaged-rust-registry
Debian FreeIPA Team [Thu, 16 Jan 2025 16:16:37 +0000 (17:16 +0100)]
use-packaged-rust-registry

Gbp-Pq: Name use-packaged-rust-registry.diff

11 months agodont-run-rpm
Debian FreeIPA Team [Thu, 16 Jan 2025 16:16:37 +0000 (17:16 +0100)]
dont-run-rpm

Gbp-Pq: Name dont-run-rpm.diff

11 months ago[PATCH] Issue #5610 - Build failure on Debian
Viktor Ashirov [Fri, 20 Jan 2023 14:46:53 +0000 (15:46 +0100)]
[PATCH] Issue #5610 - Build failure on Debian

Bug Description:
On Debian libslapd.so is not getting linked with libcrypto.so,
which results in `undefined reference` link errors.

Fix Description:
Move -lssl and -lcrypto for libslapd.so from LDFLAGS to LIBADD.

Fixes: https://github.com/389ds/389-ds-base/issues/5610
Reviewed by: ???

Gbp-Pq: Name 5610-fix-linking.diff

11 months agofix-saslpath
Debian FreeIPA Team [Thu, 16 Jan 2025 16:16:37 +0000 (17:16 +0100)]
fix-saslpath

Gbp-Pq: Name fix-saslpath.diff

11 months ago389-ds-base (2.3.1+dfsg1-1+deb12u1) bookworm; urgency=high
Andrej Shadura [Thu, 16 Jan 2025 16:16:37 +0000 (17:16 +0100)]
389-ds-base (2.3.1+dfsg1-1+deb12u1) bookworm; urgency=high

  * Non-maintainer upload.
  * Apply security patches from the upstream:
    - CVE-2024-2199 and CVE-2024-8445: Crash when modifying userPassword
      using malformed input (Closes: #1072531, #1082852).
    - CVE-2024-5953: Denial of service while attempting to log in with
      a user with a malformed hash in their password.
    - CVE-2024-3657: Failure on the directory server with specially-crafted
      LDAP query leading to denial of service.

[dgit import unpatched 389-ds-base 2.3.1+dfsg1-1+deb12u1]

11 months agoImport 389-ds-base_2.3.1+dfsg1-1+deb12u1.debian.tar.xz
Andrej Shadura [Thu, 16 Jan 2025 16:16:37 +0000 (17:16 +0100)]
Import 389-ds-base_2.3.1+dfsg1-1+deb12u1.debian.tar.xz

[dgit import tarball 389-ds-base 2.3.1+dfsg1-1+deb12u1 389-ds-base_2.3.1+dfsg1-1+deb12u1.debian.tar.xz]

2 years agoImport 389-ds-base_2.3.1+dfsg1.orig.tar.xz
Timo Aaltonen [Tue, 24 Jan 2023 11:21:19 +0000 (13:21 +0200)]
Import 389-ds-base_2.3.1+dfsg1.orig.tar.xz

[dgit import orig 389-ds-base_2.3.1+dfsg1.orig.tar.xz]