-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDKSA-2006:208-1 http://www.mandriva.com/security/ _______________________________________________________________________ Package : openldap Date : November 21, 2006 Affected: Corporate 4.0 _______________________________________________________________________ Problem Description: An unspecified vulnerability in OpenLDAP allows remote attackers to cause a denial of service (daemon crash) via a certain combination of SASL Bind requests that triggers an assertion failure in libldap. Packages have been patched to correct this issue. Update: Packages for Corp4 were built from the wrong src.rpm, breaking Heimdal Kerboros and possibly other support. Updated packages are being provided to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5779 _______________________________________________________________________ Updated Packages: Corporate 4.0: 272efe4fb9ea4dfd82bdf9dc396544f2 corporate/4.0/i586/libldap2.3_0-2.3.27-1.2.20060mlcs4.i586.rpm c938570eaa2f35720e51c10f0229f046 corporate/4.0/i586/libldap2.3_0-devel-2.3.27-1.2.20060mlcs4.i586.rpm 725ae4b4369e685db80a05a98d25ce34 corporate/4.0/i586/libldap2.3_0-static-devel-2.3.27-1.2.20060mlcs4.i586.rpm 8f3ae006488a7f239c544e99cc32ff54 corporate/4.0/i586/openldap-2.3.27-1.2.20060mlcs4.i586.rpm aff2fcffa4e1fdf341954531273a24b5 corporate/4.0/i586/openldap-clients-2.3.27-1.2.20060mlcs4.i586.rpm 30025ae0794372d1cf0b8f690d2437c0 corporate/4.0/i586/openldap-doc-2.3.27-1.2.20060mlcs4.i586.rpm 2caf9b165be747d47379de69cabb6c85 corporate/4.0/i586/openldap-servers-2.3.27-1.2.20060mlcs4.i586.rpm a743b7e2980cc647a03c0b164d919056 corporate/4.0/SRPMS/openldap-2.3.27-1.2.20060mlcs4.src.rpm Corporate 4.0/X86_64: e0e14d15ac3d5e3289741b7d9cdaf49b corporate/4.0/x86_64/lib64ldap2.3_0-2.3.27-1.2.20060mlcs4.x86_64.rpm cf663a417761ba7164459eaedfd9e70e corporate/4.0/x86_64/lib64ldap2.3_0-devel-2.3.27-1.2.20060mlcs4.x86_64.rpm ed535216119821e63473f6f0f349ba1a corporate/4.0/x86_64/lib64ldap2.3_0-static-devel-2.3.27-1.2.20060mlcs4.x86_64.rpm 153411b3f4f39e77dd7e5c37de79217b corporate/4.0/x86_64/openldap-2.3.27-1.2.20060mlcs4.x86_64.rpm de2dbf35e5dd78ddcd4f9c38e3c2093a corporate/4.0/x86_64/openldap-clients-2.3.27-1.2.20060mlcs4.x86_64.rpm 344c24cb39357180d333da9615862c16 corporate/4.0/x86_64/openldap-doc-2.3.27-1.2.20060mlcs4.x86_64.rpm eb89fcde11209131b7eb0031aaabc5c2 corporate/4.0/x86_64/openldap-servers-2.3.27-1.2.20060mlcs4.x86_64.rpm a743b7e2980cc647a03c0b164d919056 corporate/4.0/SRPMS/openldap-2.3.27-1.2.20060mlcs4.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFFY2oHmqjQ0CJFipgRAs7GAJwOK5Z1LX8KlT4Aqrq87+27b1XXAwCfaoDS PmOLFc0kpSWFWKSO5enGyHw= =OPVz -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/