Hi,
attached is a patch for an NMU fixing this bug.
It will be also archived on:
http://people.debian.org/~nion/nmu-diff/openldap2.3-2.4.7-6_2.4.7-6.1.patch

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
diff -u openldap2.3-2.4.7/debian/patches/series openldap2.3-2.4.7/debian/patches/series
--- openldap2.3-2.4.7/debian/patches/series
+++ openldap2.3-2.4.7/debian/patches/series
@@ -15,0 +16 @@
+CVE-2008-0658
diff -u openldap2.3-2.4.7/debian/changelog openldap2.3-2.4.7/debian/changelog
--- openldap2.3-2.4.7/debian/changelog
+++ openldap2.3-2.4.7/debian/changelog
@@ -1,3 +1,12 @@
+openldap2.3 (2.4.7-6.1) unstable; urgency=high
+
+  * Non-maintainer upload by security team.
+  * Fix possible remote denial of service vulnerability in the BDB backend
+    via a modrdn operation with a NOOP control
+    (CVE-2008-0658; Closes: #465875).
+
+ -- Nico Golde <[EMAIL PROTECTED]>  Tue, 04 Mar 2008 14:34:44 +0100
+
 openldap2.3 (2.4.7-6) unstable; urgency=low
 
   [ Updated debconf translations ]
only in patch2:
unchanged:
--- openldap2.3-2.4.7.orig/debian/patches/CVE-2008-0658
+++ openldap2.3-2.4.7/debian/patches/CVE-2008-0658
@@ -0,0 +1,12 @@
+diff -Nurad openldap2.3-2.4.7.orig/servers/slapd/back-bdb/modrdn.c openldap2.3-2.4.7/servers/slapd/back-bdb/modrdn.c
+--- openldap2.3-2.4.7.orig/servers/slapd/back-bdb/modrdn.c	2008-03-04 14:32:49.000000000 +0100
++++ openldap2.3-2.4.7/servers/slapd/back-bdb/modrdn.c	2008-03-04 14:33:25.000000000 +0100
+@@ -737,6 +737,8 @@
+ 		} else {
+ 			rs->sr_err = LDAP_X_NO_OPERATION;
+ 			ltid = NULL;
++			/* Only free attrs if they were dup'd.  */
++			if ( dummy.e_attrs == e->e_attrs ) dummy.e_attrs = NULL;
+ 			goto return_results;
+ 		}
+ 

Attachment: pgpqb5XKSdI4A.pgp
Description: PGP signature

Reply via email to