--On Tuesday, December 13, 2016 10:44 AM +0000 hyc(a)symas.com wrote:
> he(a)NetBSD.org wrote:
>> Full_Name: Havard Eidnes
>> Version: 2.4.44
>> OS: NetBSD
>> URL:
>> Submission from: (NULL) (2001:700:1:0:eeb1:d7ff:fe59:fbaa)
>>
>>
>> Hi,
>>
>> CVE-2015-3276 appears to be unfixed in 2.4.44, and from several
>> attempts at finding the bug reported in your mailing list archive
>> I came up empty. So ... The best I've found from this CVE is
>> RedHat's bugzilla entry at
>>
>> https://bugzilla.redhat.com/show_bug.cgi?id=3D1238322
>>
>> which contains a (suggested) patch.
>
> We can integrate a suggested fix if the patch author submits their patch =
> to=20
> our ITS directly. Due to IPR concerns we don't accept or act on 3rd party=
> =20
> patch submissions.
I would also note that MozNSS is not an officially supported TLS library
for OpenLDAP, and the hack that was added for 2.4 will be removed in the
future (likely OpenLDAP 2.5 and later). End administrators should
generally avoid MozNSS entirely.
Regards,
Quanah
--
Quanah Gibson-Mount
Product Architect
Symas Corporation
Packaged, certified, and supported LDAP solutions powered by OpenLDAP:
<http://www.symas.com>
Full_Name: Andreas Schulze
Version: git
OS: linux
URL: ftp://ftp.openldap.org/incoming/andreas-schulze-161213.patch
Submission from: (NULL) (2001:a60:f0b4:e502::152)
I uploaded a patch to polish some manpages.
All changes are suggested by debian lintian
- phrase "allows one to" instead of "allows to"
- some occurences of -foo have to be written as \-foo in a manpage
Andreas
he(a)NetBSD.org wrote:
> Full_Name: Havard Eidnes
> Version: 2.4.44
> OS: NetBSD
> URL:
> Submission from: (NULL) (2001:700:1:0:eeb1:d7ff:fe59:fbaa)
>
>
> Hi,
>
> CVE-2015-3276 appears to be unfixed in 2.4.44, and from several
> attempts at finding the bug reported in your mailing list archive
> I came up empty. So ... The best I've found from this CVE is
> RedHat's bugzilla entry at
>
> https://bugzilla.redhat.com/show_bug.cgi?id=3D1238322
>
> which contains a (suggested) patch.
We can integrate a suggested fix if the patch author submits their patch =
to=20
our ITS directly. Due to IPR concerns we don't accept or act on 3rd party=
=20
patch submissions.
>
> Summarized:
>
> The openldap (for NSS) emulation of the openssl cipherstring parsing=
code
> incorrectly implements the multi-keyword mode.
> As a consequence anyone using a combination like:
>
> ECDH+SHA
>
> will not get the expected set of ciphers [...]
>
> (I'm somewhat dismayed that this was apparently not reported upstream
> earlier...)
>
> Best regards,
>
> - H=C3=A5vard
>
>
>
--=20
-- Howard Chu
CTO, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
Full_Name: Havard Eidnes
Version: 2.4.44
OS: NetBSD
URL:
Submission from: (NULL) (2001:700:1:0:eeb1:d7ff:fe59:fbaa)
Hi,
CVE-2015-3276 appears to be unfixed in 2.4.44, and from several
attempts at finding the bug reported in your mailing list archive
I came up empty. So ... The best I've found from this CVE is
RedHat's bugzilla entry at
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
which contains a (suggested) patch.
Summarized:
The openldap (for NSS) emulation of the openssl cipherstring parsing code
incorrectly implements the multi-keyword mode.
As a consequence anyone using a combination like:
ECDH+SHA
will not get the expected set of ciphers [...]
(I'm somewhat dismayed that this was apparently not reported upstream
earlier...)
Best regards,
- Håvard
Full_Name: Hallvard B Furuseth
Version: LMDB_0.9.18
OS:
URL: ftp://ftp.openldap.org/incoming/Hallvard-Furuseth-161210.c
Submission from: (NULL) (81.191.45.31)
Submitted by: hallvard
...because mdb_dbi_open() does not track its cursor. Demo enclosed.
Fix: Put the mdb_cursor_put() in WITH_CURSOR_TRACKING(mc, ...).
I do wonder why failing to track one cursor apparently breaks another
cursor, instead of the un-tracked one. Though maybe the un-tracked
cursor is broken, and writing through it goes to the wrong place.
Full_Name: Quanah Gibson-Mount
Version: HEAD
OS: Linux
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (47.208.148.26)
When running test062, it sometimes core dumps in syncprov abandon. I will
directly email the backtrace as the ITS software breaks them horribly.
Full_Name: Quanah Gibson-Mount
Version: 2.4.44
OS: N/A
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (47.208.148.26)
The test suite should be expanded to have SSL related test. To do this, we'll
need a CA cert, server cert for "localhost", and a couple of user certs (for
babs and/or bjorn).
Test can then validate startTLS, ldaps, and client cert auth, using both an
exact matching DN for one user and one requiring an authz-regexp map.
Tests only run if SSL was enabled for the build.