389-ds-base.git
2 years agoMerge version 1.4.0.21-1+rpi1 and 1.4.0.21-1+deb10u1 to produce 1.4.0.21-1+rpi1+deb10u1 buster-staging archive/raspbian/1.4.0.21-1+rpi1+deb10u1 raspbian/1.4.0.21-1+rpi1+deb10u1
Raspbian automatic forward porter [Fri, 12 May 2023 09:12:30 +0000 (10:12 +0100)]
Merge version 1.4.0.21-1+rpi1 and 1.4.0.21-1+deb10u1 to produce 1.4.0.21-1+rpi1+deb10u1

2 years agoMerge 389-ds-base (1.4.0.21-1+deb10u1) import into refs/heads/workingbranch
Anton Gladky [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
Merge 389-ds-base (1.4.0.21-1+deb10u1) import into refs/heads/workingbranch

2 years agoTicket 50329 - Possible Security Issue: DOS due to ioblocktimeout not applying to TLS
Thierry Bordaz [Mon, 15 Apr 2019 16:11:37 +0000 (16:11 +0000)]
Ticket 50329 - Possible Security Issue: DOS due to ioblocktimeout not applying to TLS

Bug Description:
A secure socket is configured in blocking mode. If an event
is detected on a secure socket a worker, tries to read the request.
The read can hang indefinitely if there is nothing to read.
As a consequence ioblocktimeout is not enforced when reading secure socket

Fix Description:
The fix is specific to secure socket read.
Before reading it polls the socket for a read. The socket is poll
(with a 0.1s timeout) until read is possible or sum of poll timeout
is greater than ioblocktimeout.

https://pagure.io/389-ds-base/issue/50329

Reviewed by: Mark Reynolds

Platforms tested: F28

Flag Day: no

Doc impact: no

Gbp-Pq: Name CVE-2019-3883.patch

2 years agoTicket 50251 - clear text passwords visable in CLI verbose mode logging
Mark Reynolds [Thu, 16 May 2019 00:16:42 +0000 (00:16 +0000)]
Ticket 50251 - clear text passwords visable in CLI verbose mode logging

Bug Description:  If you run any of the CLI tools using "-v", and set a password,
                  that password will be displayed in clear text in the console.

Fix Description:  Create an internal list of sensitive attributes to filter, and
                  mask them in the operation debug logging.  But still allow the
                  password to be seen if you set the env variable DEBUGGING=true

                  We also still print the root DN password if it is a container
                  installation.

https://pagure.io/389-ds-base/issue/50251

Reviewed by: spichugi, firstyear, and mhonek (Thanks!!!)

Gbp-Pq: Name CVE-2019-10224.patch

2 years ago[PATCH] Issue 50716 - CVE-2019-14824 (BZ#1748199) - deref plugin displays restricted...
Mark Reynolds [Wed, 13 Nov 2019 17:34:54 +0000 (12:34 -0500)]
[PATCH] Issue 50716 - CVE-2019-14824 (BZ#1748199) - deref plugin displays restricted attributes

Bug Description:  If there is an ACI that allows "search" access to an attribute,
                  the deref plugin access control checks sees this is a "read"
                  privilege and returns the attribute's value.

Fix description:  For deref plugin we are only concerned with "read" access, not
                  "search" access.  Removed the SLAPI_ACL_SEARCH right flag when
                  checking access for an attribute.

relates: https://pagure.io/389-ds-base/issue/50716

Reviewed by: lkrispen & tbordaz(Thanks!)

Gbp-Pq: Name CVE-2019-14824.patch

2 years ago[PATCH] Issue 4711 - SIGSEV with sync_repl (#4738)
tbordaz [Tue, 27 Apr 2021 07:29:32 +0000 (09:29 +0200)]
[PATCH] Issue 4711 - SIGSEV with sync_repl (#4738)

Bug description:
sync_repl sends back entries identified with a unique
identifier that is 'nsuniqueid'. If 'nsuniqueid' is
missing, then it may crash

Fix description:
Check a nsuniqueid is available else returns OP_ERR

relates: https://github.com/389ds/389-ds-base/issues/4711

Reviewed by: Pierre Rogier, James Chapman, William Brown (Thanks!)

Platforms tested:  F33

Gbp-Pq: Name CVE-2021-3514.patch

2 years ago[PATCH] Issue 4817 - BUG - locked crypt accounts on import may allow all passwords...
Firstyear [Fri, 9 Jul 2021 01:53:35 +0000 (11:53 +1000)]
[PATCH] Issue 4817 - BUG - locked crypt accounts on import may allow all passwords (#4819)

Bug Description: Due to mishanding of short dbpwd hashes, the
crypt_r algorithm was misused and was only comparing salts
in some cases, rather than checking the actual content
of the password.

Fix Description: Stricter checks on dbpwd lengths to ensure
that content passed to crypt_r has at least 2 salt bytes and
1 hash byte, as well as stricter checks on ct_memcmp to ensure
that compared values are the same length, rather than potentially
allowing overruns/short comparisons.

fixes: https://github.com/389ds/389-ds-base/issues/4817

Author: William Brown <william@blackhats.net.au>

Review by: @mreynolds389

Gbp-Pq: Name CVE-2021-3652.patch

2 years ago[PATCH] Issue 5418 - Sync_repl may crash while managing invalid cookie (#5420)
Thierry Bordaz [Thu, 18 Aug 2022 11:37:47 +0000 (13:37 +0200)]
[PATCH] Issue 5418 - Sync_repl may crash while managing invalid cookie (#5420)

Bug description:
        If the servers receives an invalid cookie without separator '#',
        it parses it into an empty cookie (Sync_Cookie) instead of a NULL
        cookie (failure).
        Later it sigsegv when using the empty cookie.

Fix description:
        If the parsing fails return NULL

relates: #5418

Reviewed by: Viktor Ashirov, Mark Reynolds, William Brown, Simon Pichugin (thanks !)

Gbp-Pq: Name CVE-2022-2850.patch

2 years ago[PATCH] Issue 5221 - User with expired password can still login with full privledges
Mark Reynolds [Thu, 3 Mar 2022 21:29:41 +0000 (16:29 -0500)]
[PATCH] Issue 5221 - User with expired password can still login with full privledges

Bug Description:

A user with an expired password can still login and perform operations
with its typical access perimssions.  But an expired password means the
account should be considered anonymous.

Fix Description:

Clear the bind credentials if the password is expired

relates: https://github.com/389ds/389-ds-base/issues/5221

Reviewed by: progier(Thanks!)

Gbp-Pq: Name CVE-2022-0996.patch

2 years ago[PATCH] Issue 5242- Craft message may crash the server (#5243)
tbordaz [Wed, 30 Mar 2022 16:07:23 +0000 (18:07 +0200)]
[PATCH] Issue 5242- Craft message may crash the server (#5243)

Bug description:
A craft request can result in DoS

Fix description:
If the server fails to decode the ber value
then return an Error

relates: 5242

Reviewed by: Pierre Rogier, Mark Reynolds (thanks !)

Platforms tested:  F34

Gbp-Pq: Name CVE-2022-0918.patch

2 years ago[PATCH] Issue 5218 - double-free of the virtual attribute context in persistent searc...
tbordaz [Mon, 21 Mar 2022 13:24:12 +0000 (14:24 +0100)]
[PATCH] Issue 5218 - double-free of the virtual attribute context in persistent search (#5219)

description:
A search is processed by a worker using a private pblock.
If the search is persistent, the worker spawn a thread
and kind of duplicate its private pblock so that the spawn
        thread continue to process the persistent search.
Then worker ends the initial search, reinit (free) its private pblock,
        and returns monitoring the wait_queue.
When the persistent search completes, it frees the duplicated
pblock.
The problem is that private pblock and duplicated pblock
        are referring to a same structure (pb_vattr_context).
        That can lead to a double free

Fix:
When cloning the pblock (slapi_pblock_clone) make sure
to transfert the references inside the original (private)
pblock to the target (cloned) one
        That includes pb_vattr_context pointer.

Reviewed by: Mark Reynolds, James Chapman, Pierre Rogier (Thanks !)

Co-authored-by: Mark Reynolds <mreynolds@redhat.com>
Gbp-Pq: Name CVE-2021-4091.patch

2 years agofix-nss-path
Debian FreeIPA Team [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
fix-nss-path

Gbp-Pq: Name fix-nss-path.diff

2 years agoUse pkg-config to detect icu, since icu-config is deprecated
Hugh McMaster [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
Use pkg-config to detect icu, since icu-config is deprecated

Bug: https://pagure.io/389-ds-base/issue/50067
Bug-Debian: https://bugs.debian.org/916115
Forwarded: https://pagure.io/389-ds-base/pull-request/50111
Last-Update: 2018-12-28

and will be removed from Debian

Gbp-Pq: Name icu_pkg-config.patch

2 years agoperl-use-move-instead-of-rename
Debian FreeIPA Team [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
perl-use-move-instead-of-rename

Gbp-Pq: Name perl-use-move-instead-of-rename.diff

2 years ago[PATCH] Ticket bz1525628 - invalid password migration causes unauth bind
William Brown [Thu, 18 Jan 2018 01:27:58 +0000 (11:27 +1000)]
[PATCH] Ticket bz1525628 - invalid password migration causes unauth bind

Bug Description:  Slapi_ct_memcmp expects both inputs to be
at LEAST size n. If they are not, we only compared UP to n.

Invalid migrations of passwords (IE {CRYPT}XX) would create
a pw which is just salt and no hash. ct_memcmp would then
only verify the salt bits and would allow the authentication.

This relies on an administrative mistake both of allowing
password migration (nsslapd-allow-hashed-passwords) and then
subsequently migrating an INVALID password to the server.

Fix Description:  slapi_ct_memcmp now access n1, n2 size
and will FAIL if they are not the same, but will still compare
n bytes, where n is the "longest" memory, to the first byte
of the other to prevent length disclosure of the shorter
value (generally the mis-migrated password)

https://bugzilla.redhat.com/show_bug.cgi?id=1525628

Author: wibrown

Review by: ???

Gbp-Pq: Name CVE-2017-15135.patch

2 years agoFix the path to systemctl binary
Timo Aaltonen [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
Fix the path to systemctl binary

Gbp-Pq: Name fix-systemctl-path.diff

2 years agofix-saslpath
Debian FreeIPA Team [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
fix-saslpath

Gbp-Pq: Name fix-saslpath.diff

2 years agofix-obsolete-target
Debian FreeIPA Team [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
fix-obsolete-target

Gbp-Pq: Name fix-obsolete-target.diff

2 years agorename-online-scripts
Debian FreeIPA Team [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
rename-online-scripts

Gbp-Pq: Name rename-online-scripts.diff

2 years agouse-bash-instead-of-sh
Debian FreeIPA Team [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
use-bash-instead-of-sh

Gbp-Pq: Name use-bash-instead-of-sh.diff

2 years ago389-ds-base (1.4.0.21-1+deb10u1) buster-security; urgency=medium
Anton Gladky [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
389-ds-base (1.4.0.21-1+deb10u1) buster-security; urgency=medium

  * Non-maintainer upload by the LTS Security Team.
  * CVE-2021-4091: double free of the virtual attribute context in
                   persistent search.
  * CVE-2022-0918: an unauthenticated attacker with network access to
                   the LDAP port
                   can cause a denial of service.
  * CVE-2022-0996: expired password was still allowed to access the database.
  * CVE-2022-2850: possible NULL pointer dereference leading to a denial of
                   service.
  * CVE-2021-3652: importing an asterisk as password hashes enables successful
                   authentication with any password, allowing attackers to
                   access accounts with disabled passwords.
  * CVE-2021-3514: an authenticated attacker can crash 389-ds-base using a
                   specially crafted query in sync_repl client, due to a NULL
                   pointer dereference.
  * CVE-2019-14824:deref plugin vulnerability lets authenticated attackers
                   access private attributes, like password hashes, using the
                   'search' permission.
  * CVE-2019-10224:vulnerability that may disclose sensitive information,
                   including the Directory Manager password, when executing
                   dscreate and dsconf commands in verbose mode.and dsconf
                   commands in verbose mode and recording the terminal standard
                   error output.
  * CVE-2019-3883: SSL/TLS requests do not enforce ioblocktimeout limit, leading
                   to DoS vulnerability by hanging all workers with hanging LDAP
                   requests.

[dgit import unpatched 389-ds-base 1.4.0.21-1+deb10u1]

2 years agoImport 389-ds-base_1.4.0.21-1+deb10u1.debian.tar.xz
Anton Gladky [Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)]
Import 389-ds-base_1.4.0.21-1+deb10u1.debian.tar.xz

[dgit import tarball 389-ds-base 1.4.0.21-1+deb10u1 389-ds-base_1.4.0.21-1+deb10u1.debian.tar.xz]

6 years agoMerge version 1.4.0.20-3+rpi1 and 1.4.0.21-1 to produce 1.4.0.21-1+rpi1 archive/raspbian/1.4.0.21-1+rpi1 raspbian/1.4.0.21-1+rpi1
Raspbian automatic forward porter [Mon, 25 Feb 2019 22:23:39 +0000 (22:23 +0000)]
Merge version 1.4.0.20-3+rpi1 and 1.4.0.21-1 to produce 1.4.0.21-1+rpi1

6 years agoMerge 389-ds-base (1.4.0.21-1) import into refs/heads/workingbranch
Timo Aaltonen [Tue, 12 Feb 2019 14:28:15 +0000 (14:28 +0000)]
Merge 389-ds-base (1.4.0.21-1) import into refs/heads/workingbranch

6 years agoImport 389-ds-base_1.4.0.21.orig.tar.bz2
Timo Aaltonen [Tue, 12 Feb 2019 14:28:15 +0000 (14:28 +0000)]
Import 389-ds-base_1.4.0.21.orig.tar.bz2

[dgit import orig 389-ds-base_1.4.0.21.orig.tar.bz2]

6 years agofix-nss-path
Debian FreeIPA Team [Tue, 12 Feb 2019 14:28:15 +0000 (14:28 +0000)]
fix-nss-path

Gbp-Pq: Name fix-nss-path.diff

6 years agoicu_pkg-config
Debian FreeIPA Team [Tue, 12 Feb 2019 14:28:15 +0000 (14:28 +0000)]
icu_pkg-config

Gbp-Pq: Name icu_pkg-config.patch

6 years agoperl-use-move-instead-of-rename
Debian FreeIPA Team [Tue, 12 Feb 2019 14:28:15 +0000 (14:28 +0000)]
perl-use-move-instead-of-rename

Gbp-Pq: Name perl-use-move-instead-of-rename.diff

6 years agoTicket bz1525628 - invalid password migration causes unauth bind
William Brown [Thu, 18 Jan 2018 01:27:58 +0000 (11:27 +1000)]
Ticket bz1525628 - invalid password migration causes unauth bind

Bug Description:  Slapi_ct_memcmp expects both inputs to be
at LEAST size n. If they are not, we only compared UP to n.

Invalid migrations of passwords (IE {CRYPT}XX) would create
a pw which is just salt and no hash. ct_memcmp would then
only verify the salt bits and would allow the authentication.

This relies on an administrative mistake both of allowing
password migration (nsslapd-allow-hashed-passwords) and then
subsequently migrating an INVALID password to the server.

Fix Description:  slapi_ct_memcmp now access n1, n2 size
and will FAIL if they are not the same, but will still compare
n bytes, where n is the "longest" memory, to the first byte
of the other to prevent length disclosure of the shorter
value (generally the mis-migrated password)

https://bugzilla.redhat.com/show_bug.cgi?id=1525628

Author: wibrown

Review by: ???

Gbp-Pq: Name CVE-2017-15135.patch

6 years agofix-systemctl-path
Debian FreeIPA Team [Tue, 12 Feb 2019 14:28:15 +0000 (14:28 +0000)]
fix-systemctl-path

Gbp-Pq: Name fix-systemctl-path.diff

6 years agofix-saslpath
Debian FreeIPA Team [Tue, 12 Feb 2019 14:28:15 +0000 (14:28 +0000)]
fix-saslpath

Gbp-Pq: Name fix-saslpath.diff

6 years agofix-obsolete-target
Debian FreeIPA Team [Tue, 12 Feb 2019 14:28:15 +0000 (14:28 +0000)]
fix-obsolete-target

Gbp-Pq: Name fix-obsolete-target.diff

6 years agorename-online-scripts
Debian FreeIPA Team [Tue, 12 Feb 2019 14:28:15 +0000 (14:28 +0000)]
rename-online-scripts

Gbp-Pq: Name rename-online-scripts.diff

6 years agouse-bash-instead-of-sh
Debian FreeIPA Team [Tue, 12 Feb 2019 14:28:15 +0000 (14:28 +0000)]
use-bash-instead-of-sh

Gbp-Pq: Name use-bash-instead-of-sh.diff

6 years ago389-ds-base (1.4.0.21-1) unstable; urgency=medium
Timo Aaltonen [Tue, 12 Feb 2019 14:28:15 +0000 (14:28 +0000)]
389-ds-base (1.4.0.21-1) unstable; urgency=medium

  * New upstream release.
  * Run offline upgrade only when upgrading from versions below 1.4.0.9,
    ns-slapd itself handles upgrades in newer versions.
  * rules: Actually install the minified javascript files. (Closes:
    #913820)

[dgit import unpatched 389-ds-base 1.4.0.21-1]

6 years agoImport 389-ds-base_1.4.0.21-1.debian.tar.xz
Timo Aaltonen [Tue, 12 Feb 2019 14:28:15 +0000 (14:28 +0000)]
Import 389-ds-base_1.4.0.21-1.debian.tar.xz

[dgit import tarball 389-ds-base 1.4.0.21-1 389-ds-base_1.4.0.21-1.debian.tar.xz]

6 years agoMerge version 1.4.0.19-3+rpi1 and 1.4.0.20-3 to produce 1.4.0.20-3+rpi1 archive/raspbian/1.4.0.20-3+rpi1 raspbian/1.4.0.20-3+rpi1
Raspbian automatic forward porter [Fri, 18 Jan 2019 13:51:34 +0000 (13:51 +0000)]
Merge version 1.4.0.19-3+rpi1 and 1.4.0.20-3 to produce 1.4.0.20-3+rpi1

6 years agoMerge 389-ds-base (1.4.0.20-3) import into refs/heads/workingbranch
Timo Aaltonen [Wed, 16 Jan 2019 09:30:51 +0000 (09:30 +0000)]
Merge 389-ds-base (1.4.0.20-3) import into refs/heads/workingbranch

6 years agofix-nss-path
Debian FreeIPA Team [Wed, 16 Jan 2019 09:30:51 +0000 (09:30 +0000)]
fix-nss-path

Gbp-Pq: Name fix-nss-path.diff

6 years agoicu_pkg-config
Debian FreeIPA Team [Wed, 16 Jan 2019 09:30:51 +0000 (09:30 +0000)]
icu_pkg-config

Gbp-Pq: Name icu_pkg-config.patch

6 years agoperl-use-move-instead-of-rename
Debian FreeIPA Team [Wed, 16 Jan 2019 09:30:51 +0000 (09:30 +0000)]
perl-use-move-instead-of-rename

Gbp-Pq: Name perl-use-move-instead-of-rename.diff

6 years agoTicket bz1525628 - invalid password migration causes unauth bind
William Brown [Thu, 18 Jan 2018 01:27:58 +0000 (11:27 +1000)]
Ticket bz1525628 - invalid password migration causes unauth bind

Bug Description:  Slapi_ct_memcmp expects both inputs to be
at LEAST size n. If they are not, we only compared UP to n.

Invalid migrations of passwords (IE {CRYPT}XX) would create
a pw which is just salt and no hash. ct_memcmp would then
only verify the salt bits and would allow the authentication.

This relies on an administrative mistake both of allowing
password migration (nsslapd-allow-hashed-passwords) and then
subsequently migrating an INVALID password to the server.

Fix Description:  slapi_ct_memcmp now access n1, n2 size
and will FAIL if they are not the same, but will still compare
n bytes, where n is the "longest" memory, to the first byte
of the other to prevent length disclosure of the shorter
value (generally the mis-migrated password)

https://bugzilla.redhat.com/show_bug.cgi?id=1525628

Author: wibrown

Review by: ???

Gbp-Pq: Name CVE-2017-15135.patch

6 years agofix-systemctl-path
Debian FreeIPA Team [Wed, 16 Jan 2019 09:30:51 +0000 (09:30 +0000)]
fix-systemctl-path

Gbp-Pq: Name fix-systemctl-path.diff

6 years agofix-saslpath
Debian FreeIPA Team [Wed, 16 Jan 2019 09:30:51 +0000 (09:30 +0000)]
fix-saslpath

Gbp-Pq: Name fix-saslpath.diff

6 years agofix-obsolete-target
Debian FreeIPA Team [Wed, 16 Jan 2019 09:30:51 +0000 (09:30 +0000)]
fix-obsolete-target

Gbp-Pq: Name fix-obsolete-target.diff

6 years agorename-online-scripts
Debian FreeIPA Team [Wed, 16 Jan 2019 09:30:51 +0000 (09:30 +0000)]
rename-online-scripts

Gbp-Pq: Name rename-online-scripts.diff

6 years agouse-bash-instead-of-sh
Debian FreeIPA Team [Wed, 16 Jan 2019 09:30:51 +0000 (09:30 +0000)]
use-bash-instead-of-sh

Gbp-Pq: Name use-bash-instead-of-sh.diff

6 years ago389-ds-base (1.4.0.20-3) unstable; urgency=medium
Timo Aaltonen [Wed, 16 Jan 2019 09:30:51 +0000 (09:30 +0000)]
389-ds-base (1.4.0.20-3) unstable; urgency=medium

  * control: 389-ds-base should depend on the legacy tools for now.
    (Closes: #919420)

[dgit import unpatched 389-ds-base 1.4.0.20-3]

6 years agoImport 389-ds-base_1.4.0.20-3.debian.tar.xz
Timo Aaltonen [Wed, 16 Jan 2019 09:30:51 +0000 (09:30 +0000)]
Import 389-ds-base_1.4.0.20-3.debian.tar.xz

[dgit import tarball 389-ds-base 1.4.0.20-3 389-ds-base_1.4.0.20-3.debian.tar.xz]

6 years agoImport 389-ds-base_1.4.0.20.orig.tar.bz2
Timo Aaltonen [Sun, 13 Jan 2019 19:13:22 +0000 (19:13 +0000)]
Import 389-ds-base_1.4.0.20.orig.tar.bz2

[dgit import orig 389-ds-base_1.4.0.20.orig.tar.bz2]

6 years agoMerge version 1.4.0.19-2+rpi1 and 1.4.0.19-3 to produce 1.4.0.19-3+rpi1 archive/raspbian/1.4.0.19-3+rpi1 raspbian/1.4.0.19-3+rpi1
Raspbian automatic forward porter [Thu, 10 Jan 2019 17:31:04 +0000 (17:31 +0000)]
Merge version 1.4.0.19-2+rpi1 and 1.4.0.19-3 to produce 1.4.0.19-3+rpi1

6 years agoMerge 389-ds-base (1.4.0.19-3) import into refs/heads/workingbranch
Timo Aaltonen [Wed, 2 Jan 2019 10:43:23 +0000 (10:43 +0000)]
Merge 389-ds-base (1.4.0.19-3) import into refs/heads/workingbranch

6 years agoicu_pkg-config
Debian FreeIPA Team [Wed, 2 Jan 2019 10:43:23 +0000 (10:43 +0000)]
icu_pkg-config

Gbp-Pq: Name icu_pkg-config.patch

6 years agoperl-use-move-instead-of-rename
Debian FreeIPA Team [Wed, 2 Jan 2019 10:43:23 +0000 (10:43 +0000)]
perl-use-move-instead-of-rename

Gbp-Pq: Name perl-use-move-instead-of-rename.diff

6 years agodont-build-new-manpages
Debian FreeIPA Team [Wed, 2 Jan 2019 10:43:23 +0000 (10:43 +0000)]
dont-build-new-manpages

Gbp-Pq: Name dont-build-new-manpages.diff

6 years agoTicket bz1525628 - invalid password migration causes unauth bind
William Brown [Thu, 18 Jan 2018 01:27:58 +0000 (11:27 +1000)]
Ticket bz1525628 - invalid password migration causes unauth bind

Bug Description:  Slapi_ct_memcmp expects both inputs to be
at LEAST size n. If they are not, we only compared UP to n.

Invalid migrations of passwords (IE {CRYPT}XX) would create
a pw which is just salt and no hash. ct_memcmp would then
only verify the salt bits and would allow the authentication.

This relies on an administrative mistake both of allowing
password migration (nsslapd-allow-hashed-passwords) and then
subsequently migrating an INVALID password to the server.

Fix Description:  slapi_ct_memcmp now access n1, n2 size
and will FAIL if they are not the same, but will still compare
n bytes, where n is the "longest" memory, to the first byte
of the other to prevent length disclosure of the shorter
value (generally the mis-migrated password)

https://bugzilla.redhat.com/show_bug.cgi?id=1525628

Author: wibrown

Review by: ???

Gbp-Pq: Name CVE-2017-15135.patch

6 years agofix-systemctl-path
Debian FreeIPA Team [Wed, 2 Jan 2019 10:43:23 +0000 (10:43 +0000)]
fix-systemctl-path

Gbp-Pq: Name fix-systemctl-path.diff

6 years agofix-saslpath
Debian FreeIPA Team [Wed, 2 Jan 2019 10:43:23 +0000 (10:43 +0000)]
fix-saslpath

Gbp-Pq: Name fix-saslpath.diff

6 years agofix-obsolete-target
Debian FreeIPA Team [Wed, 2 Jan 2019 10:43:23 +0000 (10:43 +0000)]
fix-obsolete-target

Gbp-Pq: Name fix-obsolete-target.diff

6 years agorename-online-scripts
Debian FreeIPA Team [Wed, 2 Jan 2019 10:43:23 +0000 (10:43 +0000)]
rename-online-scripts

Gbp-Pq: Name rename-online-scripts.diff

6 years agouse-bash-instead-of-sh
Debian FreeIPA Team [Wed, 2 Jan 2019 10:43:23 +0000 (10:43 +0000)]
use-bash-instead-of-sh

Gbp-Pq: Name use-bash-instead-of-sh.diff

6 years ago389-ds-base (1.4.0.19-3) unstable; urgency=medium
Timo Aaltonen [Wed, 2 Jan 2019 10:43:23 +0000 (10:43 +0000)]
389-ds-base (1.4.0.19-3) unstable; urgency=medium

  [ Jelmer Vernooij ]
  * Use secure copyright file specification URI.
  * Trim trailing whitespace.
  * Use secure URI in Vcs control header.

  [ Hugh McMaster ]
  * control: Mark 389-ds-base-libs{,-dev} M-A: same, cockpit-389-ds M-A:
    foreign and arch:all. (Closes: #916118)
  * Use pkg-config to detect icu. (Closes: #916115)

[dgit import unpatched 389-ds-base 1.4.0.19-3]

6 years agoImport 389-ds-base_1.4.0.19-3.debian.tar.xz
Timo Aaltonen [Wed, 2 Jan 2019 10:43:23 +0000 (10:43 +0000)]
Import 389-ds-base_1.4.0.19-3.debian.tar.xz

[dgit import tarball 389-ds-base 1.4.0.19-3 389-ds-base_1.4.0.19-3.debian.tar.xz]

6 years agoMerge 389-ds-base (1.4.0.19-2+rpi1) import into refs/heads/workingbranch
Peter Michael Green [Thu, 27 Dec 2018 01:27:25 +0000 (01:27 +0000)]
Merge 389-ds-base (1.4.0.19-2+rpi1) import into refs/heads/workingbranch

6 years agoperl-use-move-instead-of-rename
Debian FreeIPA Team [Thu, 27 Dec 2018 01:27:25 +0000 (01:27 +0000)]
perl-use-move-instead-of-rename

Gbp-Pq: Name perl-use-move-instead-of-rename.diff

6 years agodont-build-new-manpages
Debian FreeIPA Team [Thu, 27 Dec 2018 01:27:25 +0000 (01:27 +0000)]
dont-build-new-manpages

Gbp-Pq: Name dont-build-new-manpages.diff

6 years agoTicket bz1525628 - invalid password migration causes unauth bind
William Brown [Thu, 18 Jan 2018 01:27:58 +0000 (11:27 +1000)]
Ticket bz1525628 - invalid password migration causes unauth bind

Bug Description:  Slapi_ct_memcmp expects both inputs to be
at LEAST size n. If they are not, we only compared UP to n.

Invalid migrations of passwords (IE {CRYPT}XX) would create
a pw which is just salt and no hash. ct_memcmp would then
only verify the salt bits and would allow the authentication.

This relies on an administrative mistake both of allowing
password migration (nsslapd-allow-hashed-passwords) and then
subsequently migrating an INVALID password to the server.

Fix Description:  slapi_ct_memcmp now access n1, n2 size
and will FAIL if they are not the same, but will still compare
n bytes, where n is the "longest" memory, to the first byte
of the other to prevent length disclosure of the shorter
value (generally the mis-migrated password)

https://bugzilla.redhat.com/show_bug.cgi?id=1525628

Author: wibrown

Review by: ???

Gbp-Pq: Name CVE-2017-15135.patch

6 years agofix-systemctl-path
Debian FreeIPA Team [Thu, 27 Dec 2018 01:27:25 +0000 (01:27 +0000)]
fix-systemctl-path

Gbp-Pq: Name fix-systemctl-path.diff

6 years agofix-saslpath
Debian FreeIPA Team [Thu, 27 Dec 2018 01:27:25 +0000 (01:27 +0000)]
fix-saslpath

Gbp-Pq: Name fix-saslpath.diff

6 years agofix-obsolete-target
Debian FreeIPA Team [Thu, 27 Dec 2018 01:27:25 +0000 (01:27 +0000)]
fix-obsolete-target

Gbp-Pq: Name fix-obsolete-target.diff

6 years agorename-online-scripts
Debian FreeIPA Team [Thu, 27 Dec 2018 01:27:25 +0000 (01:27 +0000)]
rename-online-scripts

Gbp-Pq: Name rename-online-scripts.diff

6 years agouse-bash-instead-of-sh
Debian FreeIPA Team [Thu, 27 Dec 2018 01:27:25 +0000 (01:27 +0000)]
use-bash-instead-of-sh

Gbp-Pq: Name use-bash-instead-of-sh.diff

6 years ago389-ds-base (1.4.0.19-2+rpi1) buster-staging; urgency=medium
Peter Michael Green [Thu, 27 Dec 2018 01:27:25 +0000 (01:27 +0000)]
389-ds-base (1.4.0.19-2+rpi1) buster-staging; urgency=medium

  * Add -latomic to LDFLAGS on armhf too.

[dgit import unpatched 389-ds-base 1.4.0.19-2+rpi1]

6 years agoImport 389-ds-base_1.4.0.19-2+rpi1.debian.tar.xz
Peter Michael Green [Thu, 27 Dec 2018 01:27:25 +0000 (01:27 +0000)]
Import 389-ds-base_1.4.0.19-2+rpi1.debian.tar.xz

[dgit import tarball 389-ds-base 1.4.0.19-2+rpi1 389-ds-base_1.4.0.19-2+rpi1.debian.tar.xz]

7 years agoMerge 389-ds-base (1.4.0.19-2) import into refs/heads/workingbranch
Timo Aaltonen [Wed, 5 Dec 2018 23:06:37 +0000 (23:06 +0000)]
Merge 389-ds-base (1.4.0.19-2) import into refs/heads/workingbranch

7 years agoperl-use-move-instead-of-rename
Debian FreeIPA Team [Wed, 5 Dec 2018 23:06:37 +0000 (23:06 +0000)]
perl-use-move-instead-of-rename

Gbp-Pq: Name perl-use-move-instead-of-rename.diff

7 years agodont-build-new-manpages
Debian FreeIPA Team [Wed, 5 Dec 2018 23:06:37 +0000 (23:06 +0000)]
dont-build-new-manpages

Gbp-Pq: Name dont-build-new-manpages.diff

7 years agoTicket bz1525628 - invalid password migration causes unauth bind
William Brown [Thu, 18 Jan 2018 01:27:58 +0000 (11:27 +1000)]
Ticket bz1525628 - invalid password migration causes unauth bind

Bug Description:  Slapi_ct_memcmp expects both inputs to be
at LEAST size n. If they are not, we only compared UP to n.

Invalid migrations of passwords (IE {CRYPT}XX) would create
a pw which is just salt and no hash. ct_memcmp would then
only verify the salt bits and would allow the authentication.

This relies on an administrative mistake both of allowing
password migration (nsslapd-allow-hashed-passwords) and then
subsequently migrating an INVALID password to the server.

Fix Description:  slapi_ct_memcmp now access n1, n2 size
and will FAIL if they are not the same, but will still compare
n bytes, where n is the "longest" memory, to the first byte
of the other to prevent length disclosure of the shorter
value (generally the mis-migrated password)

https://bugzilla.redhat.com/show_bug.cgi?id=1525628

Author: wibrown

Review by: ???

Gbp-Pq: Name CVE-2017-15135.patch

7 years agofix-systemctl-path
Debian FreeIPA Team [Wed, 5 Dec 2018 23:06:37 +0000 (23:06 +0000)]
fix-systemctl-path

Gbp-Pq: Name fix-systemctl-path.diff

7 years agofix-saslpath
Debian FreeIPA Team [Wed, 5 Dec 2018 23:06:37 +0000 (23:06 +0000)]
fix-saslpath

Gbp-Pq: Name fix-saslpath.diff

7 years agofix-obsolete-target
Debian FreeIPA Team [Wed, 5 Dec 2018 23:06:37 +0000 (23:06 +0000)]
fix-obsolete-target

Gbp-Pq: Name fix-obsolete-target.diff

7 years agorename-online-scripts
Debian FreeIPA Team [Wed, 5 Dec 2018 23:06:37 +0000 (23:06 +0000)]
rename-online-scripts

Gbp-Pq: Name rename-online-scripts.diff

7 years agouse-bash-instead-of-sh
Debian FreeIPA Team [Wed, 5 Dec 2018 23:06:37 +0000 (23:06 +0000)]
use-bash-instead-of-sh

Gbp-Pq: Name use-bash-instead-of-sh.diff

7 years ago389-ds-base (1.4.0.19-2) unstable; urgency=medium
Timo Aaltonen [Wed, 5 Dec 2018 23:06:37 +0000 (23:06 +0000)]
389-ds-base (1.4.0.19-2) unstable; urgency=medium

  * rules: Add -latomic to LDFLAGS on archs failing to build. (Closes:
    #910982)

[dgit import unpatched 389-ds-base 1.4.0.19-2]

7 years agoImport 389-ds-base_1.4.0.19-2.debian.tar.xz
Timo Aaltonen [Wed, 5 Dec 2018 23:06:37 +0000 (23:06 +0000)]
Import 389-ds-base_1.4.0.19-2.debian.tar.xz

[dgit import tarball 389-ds-base 1.4.0.19-2 389-ds-base_1.4.0.19-2.debian.tar.xz]

7 years agoImport 389-ds-base_1.4.0.19.orig.tar.bz2
Timo Aaltonen [Mon, 3 Dec 2018 13:56:40 +0000 (13:56 +0000)]
Import 389-ds-base_1.4.0.19.orig.tar.bz2

[dgit import orig 389-ds-base_1.4.0.19.orig.tar.bz2]

8 years agofix-upstream-49245
Debian 389ds Team [Wed, 10 May 2017 06:25:03 +0000 (07:25 +0100)]
fix-upstream-49245

Gbp-Pq: Name fix-upstream-49245.diff

8 years agofix-48986-cve-2017-2591
Debian 389ds Team [Wed, 10 May 2017 06:25:03 +0000 (07:25 +0100)]
fix-48986-cve-2017-2591

commit ffda694dd622b31277da07be76d3469fad86150f
Author: William Brown <william@blackhats.net.au>
Date:   Wed Sep 28 10:46:21 2016 +1000

    Ticket 48986 - 47808 triggers overflow in uiduniq.c

    Bug Description:  Certain configurations of uiduniq.c would cause an overflow
    when running with Address Sanitiser

    Fix Description:  Increase the size of the allocation to tmp_config->attrs.

    https://fedorahosted.org/389/ticket/48986

    Author: nhosoi

    Reviewed by: wibrown

Gbp-Pq: Name fix-48986-cve-2017-2591.diff

8 years agofix-systemctl-path
Debian 389ds Team [Wed, 10 May 2017 06:25:03 +0000 (07:25 +0100)]
fix-systemctl-path

Gbp-Pq: Name fix-systemctl-path.diff

8 years agoreproducible-build
Debian 389ds Team [Wed, 10 May 2017 06:25:03 +0000 (07:25 +0100)]
reproducible-build

Gbp-Pq: Name reproducible-build.diff

8 years agofix-saslpath
Debian 389ds Team [Wed, 10 May 2017 06:25:03 +0000 (07:25 +0100)]
fix-saslpath

Gbp-Pq: Name fix-saslpath.diff

8 years agofix-obsolete-target
Debian 389ds Team [Wed, 10 May 2017 06:25:03 +0000 (07:25 +0100)]
fix-obsolete-target

Gbp-Pq: Name fix-obsolete-target.diff

8 years agosupport-kfreebsd
Debian 389ds Team [Wed, 10 May 2017 06:25:03 +0000 (07:25 +0100)]
support-kfreebsd

Gbp-Pq: Name support-kfreebsd.patch

8 years agofix-bsd
Debian 389ds Team [Wed, 10 May 2017 06:25:03 +0000 (07:25 +0100)]
fix-bsd

Gbp-Pq: Name fix-bsd.patch

8 years agoftbs_lsoftotkn3
Debian 389ds Team [Wed, 10 May 2017 06:25:03 +0000 (07:25 +0100)]
ftbs_lsoftotkn3

Gbp-Pq: Name ftbs_lsoftotkn3.diff

8 years agorename-online-scripts
Debian 389ds Team [Wed, 10 May 2017 06:25:03 +0000 (07:25 +0100)]
rename-online-scripts

Gbp-Pq: Name rename-online-scripts.diff

8 years agouse-bash-instead-of-sh
Debian 389ds Team [Wed, 10 May 2017 06:25:03 +0000 (07:25 +0100)]
use-bash-instead-of-sh

Gbp-Pq: Name use-bash-instead-of-sh.diff

8 years ago389-ds-base (1.3.5.17-2) unstable; urgency=medium
Timo Aaltonen [Wed, 10 May 2017 06:25:03 +0000 (07:25 +0100)]
389-ds-base (1.3.5.17-2) unstable; urgency=medium

  * fix-upstream-49245.diff: Pull commits from upstream 1.3.5.x, which
    remove rest of the asm code. (Closes: #862194)

[dgit import unpatched 389-ds-base 1.3.5.17-2]

8 years agoImport 389-ds-base_1.3.5.17-2.debian.tar.xz
Timo Aaltonen [Wed, 10 May 2017 06:25:03 +0000 (07:25 +0100)]
Import 389-ds-base_1.3.5.17-2.debian.tar.xz

[dgit import tarball 389-ds-base 1.3.5.17-2 389-ds-base_1.3.5.17-2.debian.tar.xz]

8 years agoImport 389-ds-base_1.3.5.17.orig.tar.bz2
Timo Aaltonen [Tue, 9 May 2017 08:06:14 +0000 (09:06 +0100)]
Import 389-ds-base_1.3.5.17.orig.tar.bz2

[dgit import orig 389-ds-base_1.3.5.17.orig.tar.bz2]