OpenLDAP 2.4.19 released on October 6, 2009. Follow URL to learn release notes for 2.4.18 and 2.4.19.
Steps to Reproduce:
libraries/libldap/tls_o.c in OpenLDAP, when OpenSSL is used, does not
properly handle a '\0' character in a domain name in the subject's
Common Name (CN) field of an X.509 certificate, which allows
man-in-the-middle attackers to spoof arbitrary SSL servers via a
crafted certificate issued by a legitimate Certification Authority, a
related issue to CVE-2009-2408.
2.4.19 added to CVS now, go for stabilization.
Arches, please test and mark stable:
Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86"
Stable for HPPA.
arm stable, all arches done.
(In reply to comment #7)
> arm stable, all arches done.
not quite ;o
Stable on alpha.
security: all arches are done. When you issue the GLSA, please use 2.4.19-r1 as the version. It contains an additional compile-fix and an upgrade safety check over 2.4.19-r0.
GLSA vote: no.
I vote YES.
YES too, request filed.
This issue was resolved and addressed in
GLSA 201406-36 at http://security.gentoo.org/glsa/glsa-201406-36.xml
by GLSA coordinator Yury German (BlueKnight).