mirror of
https://github.com/godotengine/buildroot.git
synced 2026-01-04 06:10:16 +03:00
Fixes the following security issues:
- CVE-2020-36221: An integer underflow was discovered in OpenLDAP before
2.4.57 leading to slapd crashes in the Certificate Exact Assertion
processing, resulting in denial of service (schema_init.c
serialNumberAndIssuerCheck).
- CVE-2020-36222: A flaw was discovered in OpenLDAP before 2.4.57 leading to
an assertion failure in slapd in the saslAuthzTo validation, resulting in
denial of service.
- CVE-2020-36223: A flaw was discovered in OpenLDAP before 2.4.57 leading to
a slapd crash in the Values Return Filter control handling, resulting in
denial of service (double free and out-of-bounds read).
- CVE-2020-36224: A flaw was discovered in OpenLDAP before 2.4.57 leading to
an invalid pointer free and slapd crash in the saslAuthzTo processing,
resulting in denial of service.
- CVE-2020-36225: A flaw was discovered in OpenLDAP before 2.4.57 leading to
a double free and slapd crash in the saslAuthzTo processing, resulting in
denial of service.
- CVE-2020-36226: A flaw was discovered in OpenLDAP before 2.4.57 leading to
a memch->bv_len miscalculation and slapd crash in the saslAuthzTo
processing, resulting in denial of service.
- CVE-2020-36227: A flaw was discovered in OpenLDAP before 2.4.57 leading to
an infinite loop in slapd with the cancel_extop Cancel operation,
resulting in denial of service.
- CVE-2020-36228: An integer underflow was discovered in OpenLDAP before
2.4.57 leading to a slapd crash in the Certificate List Exact Assertion
processing, resulting in denial of service.
- CVE-2020-36229: A flaw was discovered in ldap_X509dn2bv in OpenLDAP before
2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring,
resulting in denial of service.
- CVE-2020-36230: A flaw was discovered in OpenLDAP before 2.4.57 leading in
an assertion failure in slapd in the X.509 DN parsing in decode.c
ber_next_element, resulting in denial of service.
https://www.openldap.org/software/release/changes.html
Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 46c4c9684d)
[Peter: mark as security bump, add CVE info]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
73 lines
2.1 KiB
Makefile
73 lines
2.1 KiB
Makefile
################################################################################
|
|
#
|
|
# openldap
|
|
#
|
|
################################################################################
|
|
|
|
OPENLDAP_VERSION = 2.4.57
|
|
OPENLDAP_SOURCE = openldap-$(OPENLDAP_VERSION).tgz
|
|
OPENLDAP_SITE = https://www.openldap.org/software/download/OpenLDAP/openldap-release
|
|
OPENLDAP_LICENSE = OpenLDAP Public License
|
|
OPENLDAP_LICENSE_FILES = LICENSE
|
|
OPENLDAP_INSTALL_STAGING = YES
|
|
OPENLDAP_DEPENDENCIES = host-pkgconf
|
|
|
|
ifeq ($(BR2_PACKAGE_OPENSSL),y)
|
|
OPENLDAP_TLS = openssl
|
|
OPENLDAP_DEPENDENCIES += openssl
|
|
else ifeq ($(BR2_PACKAGE_GNUTLS),y)
|
|
OPENLDAP_TLS = gnutls
|
|
OPENLDAP_DEPENDENCIES += gnutls
|
|
else ifeq ($(BR2_PACKAGE_LIBNSS),y)
|
|
OPENLDAP_TLS = moznss
|
|
OPENLDAP_DEPENDENCIES += libnss
|
|
OPENLDAP_CPPFLAGS = \
|
|
-I$(STAGING_DIR)/usr/include/nss \
|
|
-I$(STAGING_DIR)/usr/include/nspr
|
|
else
|
|
OPENLDAP_TLS = no
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_OPENSSL),y)
|
|
OPENLDAP_MP = bignum
|
|
OPENLDAP_DEPENDENCIES += openssl
|
|
OPENLDAP_CONF_ENV = LIBS="`$(PKG_CONFIG_HOST_BINARY) --libs libssl libcrypto`"
|
|
else ifeq ($(BR2_PACKAGE_GMP),y)
|
|
OPENLDAP_MP = gmp
|
|
OPENLDAP_DEPENDENCIES += gmp
|
|
else
|
|
OPENLDAP_MP = longlong
|
|
endif
|
|
|
|
OPENLDAP_CONF_ENV += ac_cv_func_memcmp_working=yes
|
|
|
|
OPENLDAP_CONF_OPTS += \
|
|
--enable-syslog \
|
|
--disable-proctitle \
|
|
--disable-slapd \
|
|
--with-yielding-select \
|
|
--sysconfdir=/etc \
|
|
--enable-dynamic=$(if $(BR2_STATIC_LIBS),no,yes) \
|
|
--with-tls=$(OPENLDAP_TLS) \
|
|
--with-mp=$(OPENLDAP_MP) \
|
|
CPPFLAGS="$(TARGET_CPPFLAGS) $(OPENLDAP_CPPFLAGS)"
|
|
|
|
# Somehow, ${STRIP} does not percolates through to the shtool script
|
|
# used to install the executables; thus, that script tries to run the
|
|
# executable it is supposed to install, resulting in an error.
|
|
OPENLDAP_MAKE_ENV = STRIP="$(TARGET_STRIP)"
|
|
|
|
ifeq ($(BR2_PACKAGE_OPENLDAP_CLIENTS),)
|
|
OPENLDAP_CLIENTS = \
|
|
ldapurl ldapexop ldapcompare ldapwhoami \
|
|
ldappasswd ldapmodrdn ldapdelete ldapmodify \
|
|
ldapsearch
|
|
define OPENLDAP_REMOVE_CLIENTS
|
|
$(RM) -f $(foreach p,$(OPENLDAP_CLIENTS),$(TARGET_DIR)/usr/bin/$(p))
|
|
$(RM) -rf $(TARGET_DIR)/etc/openldap
|
|
endef
|
|
OPENLDAP_POST_INSTALL_TARGET_HOOKS += OPENLDAP_REMOVE_CLIENTS
|
|
endif
|
|
|
|
$(eval $(autotools-package))
|