OpenLDAP 2.4.19 released on October 6, 2009. Follow URL to learn release notes for 2.4.18 and 2.4.19. Reproducible: Always Steps to Reproduce:
CVE-2009-3767 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3767): libraries/libldap/tls_o.c in OpenLDAP, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
2.4.19 added to CVS now, go for stabilization.
Arches, please test and mark stable: =net-nds/openldap-2.4.19 Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86"
x86 stable
Stable for HPPA.
amd64 stable
arm stable, all arches done.
(In reply to comment #7) > arm stable, all arches done. > not quite ;o
Stable on alpha.
ia64/s390/sh/sparc stable
ppc64 done
ppc stable
security: all arches are done. When you issue the GLSA, please use 2.4.19-r1 as the version. It contains an additional compile-fix and an upgrade safety check over 2.4.19-r0.
GLSA vote: no.
I vote YES.
YES too, request filed.
This issue was resolved and addressed in GLSA 201406-36 at http://security.gentoo.org/glsa/glsa-201406-36.xml by GLSA coordinator Yury German (BlueKnight).