<<< Date Index >>>     <<< Thread Index >>>

MDKSA-2005:121 - Updated nss_ldap/pam_ldap packages fix vulnerabilities



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                Mandriva Linux Security Update Advisory
 _______________________________________________________________________

 Package name:           nss_ldap
 Advisory ID:            MDKSA-2005:121
 Date:                   July 18th, 2005

 Affected versions:      10.0, 10.1, 10.2, Corporate 3.0,
                         Corporate Server 2.1,
                         Multi Network Firewall 2.0
 ______________________________________________________________________

 Problem Description:

 Rob Holland, of the Gentoo Security Audit Team, discovered that
 pam_ldap and nss_ldap would not use TLS for referred connections if
 they are referred to a master after connecting to a slave, regardless
 of the "ssl start_tls" setting in ldap.conf.
 
 As well, a bug in nss_ldap in Corporate Server and Mandrake 10.0
 has been fixed that caused crond, and other applications, to crash as
 a result of clients receiving a SIGPIPE signal when attempting to
 issue a new search request to a directory server that is no longer
 available.
 
 The updated packages have been patched to address this issue.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2069
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 914dcae90f53c038cfc011abe891ab4d  10.0/RPMS/nss_ldap-212-4.1.100mdk.i586.rpm
 072543f7406517e0515d35d39e5f5f40  10.0/RPMS/pam_ldap-167-4.1.100mdk.i586.rpm
 541c2b177143c43b743b8d3fe5509ea9  10.0/SRPMS/nss_ldap-212-4.1.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 5235319856a96b9a1ef18a2913f6adcf  
amd64/10.0/RPMS/nss_ldap-212-4.1.100mdk.amd64.rpm
 20aa9281762673b4ff2a79e4c108faf8  
amd64/10.0/RPMS/pam_ldap-167-4.1.100mdk.amd64.rpm
 541c2b177143c43b743b8d3fe5509ea9  
amd64/10.0/SRPMS/nss_ldap-212-4.1.100mdk.src.rpm

 Mandrakelinux 10.1:
 b0e26a28478136804d4aeb39d44c8d82  10.1/RPMS/nss_ldap-220-3.1.101mdk.i586.rpm
 700a3f02f035626e93fe9de327df9d52  10.1/RPMS/pam_ldap-170-3.1.101mdk.i586.rpm
 0292807cd0a28d55ca8e59489761bf25  10.1/SRPMS/nss_ldap-220-3.1.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 707a0491faf0022727255c56dc14c508  
x86_64/10.1/RPMS/nss_ldap-220-3.1.101mdk.x86_64.rpm
 066cfd679a2d6ccb8f2f04cc223c8cb9  
x86_64/10.1/RPMS/pam_ldap-170-3.1.101mdk.x86_64.rpm
 0292807cd0a28d55ca8e59489761bf25  
x86_64/10.1/SRPMS/nss_ldap-220-3.1.101mdk.src.rpm

 Mandrakelinux 10.2:
 e51a248257f108f311a774d58f6c04fc  10.2/RPMS/nss_ldap-220-5.2.102mdk.i586.rpm
 f8716c332eaa6a29013dc9e69c164f3d  10.2/RPMS/pam_ldap-170-5.2.102mdk.i586.rpm
 9e638e127e5a8107ee23c0c1c9f76fd1  10.2/SRPMS/nss_ldap-220-5.2.102mdk.src.rpm

 Mandrakelinux 10.2/X86_64:
 a00d92227ecbd7ce25bd144c4a9d4ffe  
x86_64/10.2/RPMS/nss_ldap-220-5.2.102mdk.x86_64.rpm
 87b5b7aac3a835d6e90d2ea916f0e530  
x86_64/10.2/RPMS/pam_ldap-170-5.2.102mdk.x86_64.rpm
 9e638e127e5a8107ee23c0c1c9f76fd1  
x86_64/10.2/SRPMS/nss_ldap-220-5.2.102mdk.src.rpm

 Multi Network Firewall 2.0:
 bb3ebbd81508ff14425daaac2e6eb339  mnf/2.0/RPMS/nss_ldap-212-4.1.M20mdk.i586.rpm
 b1ad2c72353d0e1213c9e0ae81c61ff9  mnf/2.0/RPMS/pam_ldap-167-4.1.M20mdk.i586.rpm
 e240c07b08757410dbc411d2d6430e14  mnf/2.0/SRPMS/nss_ldap-212-4.1.M20mdk.src.rpm

 Corporate Server 2.1:
 2afb0b0dbd3b0ed51a2b62d8387f09f4  
corporate/2.1/RPMS/nss_ldap-202-1.3.C21mdk.i586.rpm
 bdec2ce99957b1018084b04a8d27b18d  
corporate/2.1/RPMS/pam_ldap-156-1.3.C21mdk.i586.rpm
 b8b51a75d94c7fdbfce141f8eb634059  
corporate/2.1/SRPMS/nss_ldap-202-1.3.C21mdk.src.rpm

 Corporate Server 2.1/X86_64:
 ce833d0b6359c54b8bd6337e65fb85fa  
x86_64/corporate/2.1/RPMS/nss_ldap-202-1.3.C21mdk.x86_64.rpm
 6ed783d9f1581a9e736b09d3d8ceebeb  
x86_64/corporate/2.1/RPMS/pam_ldap-156-1.3.C21mdk.x86_64.rpm
 b8b51a75d94c7fdbfce141f8eb634059  
x86_64/corporate/2.1/SRPMS/nss_ldap-202-1.3.C21mdk.src.rpm

 Corporate 3.0:
 8916317b50c123371f31e97744c81b9c  
corporate/3.0/RPMS/nss_ldap-212-4.1.C30mdk.i586.rpm
 7a62fb9be21fb245e9f66307f77b898e  
corporate/3.0/RPMS/pam_ldap-167-4.1.C30mdk.i586.rpm
 bc3cde29ad21289d345c22ddda8fdb2a  
corporate/3.0/SRPMS/nss_ldap-212-4.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 063b326df178942502a2be421891fdf1  
x86_64/corporate/3.0/RPMS/nss_ldap-212-4.1.C30mdk.x86_64.rpm
 be16dc6b6bb027a561d6415b46af19be  
x86_64/corporate/3.0/RPMS/pam_ldap-167-4.1.C30mdk.x86_64.rpm
 bc3cde29ad21289d345c22ddda8fdb2a  
x86_64/corporate/3.0/SRPMS/nss_ldap-212-4.1.C30mdk.src.rpm
 _______________________________________________________________________

 Bug IDs fixed (see http://qa.mandriva.com for more information):

  13271 - changing crontab crashes crond when using LDAP for authentication
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFC3IZlmqjQ0CJFipgRAkTGAKDkXx8EJb9v3mpvSaX/mPVeepZmpACghrZ0
ct6RX4vR+OyjBK9n/9lluqU=
=ioO9
-----END PGP SIGNATURE-----