[ubuntu/raring-proposed] freeipa 2.1.4-0ubuntu2 (Accepted)
Timo Aaltonen
tjaalton at ubuntu.com
Sun Feb 10 22:35:16 UTC 2013
freeipa (2.1.4-0ubuntu2) raring; urgency=low
* 0110-Upload-CA-cert-in-the-directory-on-install.patch
0111-Update-plugin-to-upload-CA-certificate-to-LDAP.patch
0112-Do-SSL-CA-verification-and-hostname-validation.patch
0113-Use-secure-method-to-acquire-IPA-CA-certificate.patch:
- CVE-2012-5484 - The client in FreeIPA 2.x and 3.x before 3.1.2 does
not properly obtain the Certification Authority (CA) certificate
from the server, which allows man-in-the-middle attackers to spoof
a join procedure via a crafted certificate. (LP: #1104954)
* check-through-all-ldap-servers.patch: Check through all LDAP servers
in the domain during IPA discovery (ticket #1827). Patch from 2.2
to aid in porting patch 0113.
Date: Mon, 11 Feb 2013 00:32:12 +0200
Changed-By: Timo Aaltonen <tjaalton at ubuntu.com>
Maintainer: Ubuntu FreeIPA <freeipa at lists.launchpad.net>
https://launchpad.net/ubuntu/raring/+source/freeipa/2.1.4-0ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Mon, 11 Feb 2013 00:32:12 +0200
Source: freeipa
Binary: freeipa-client python-freeipa
Architecture: source
Version: 2.1.4-0ubuntu2
Distribution: raring
Urgency: low
Maintainer: Ubuntu FreeIPA <freeipa at lists.launchpad.net>
Changed-By: Timo Aaltonen <tjaalton at ubuntu.com>
Description:
freeipa-client - FreeIPA centralized identity framework -- client
python-freeipa - FreeIPA centralized identity framework -- python modules
Launchpad-Bugs-Fixed: 1104954
Changes:
freeipa (2.1.4-0ubuntu2) raring; urgency=low
.
* 0110-Upload-CA-cert-in-the-directory-on-install.patch
0111-Update-plugin-to-upload-CA-certificate-to-LDAP.patch
0112-Do-SSL-CA-verification-and-hostname-validation.patch
0113-Use-secure-method-to-acquire-IPA-CA-certificate.patch:
- CVE-2012-5484 - The client in FreeIPA 2.x and 3.x before 3.1.2 does
not properly obtain the Certification Authority (CA) certificate
from the server, which allows man-in-the-middle attackers to spoof
a join procedure via a crafted certificate. (LP: #1104954)
* check-through-all-ldap-servers.patch: Check through all LDAP servers
in the domain during IPA discovery (ticket #1827). Patch from 2.2
to aid in porting patch 0113.
Checksums-Sha1:
c8cc79354bfbfff670317bf6291589afc14f771b 2501 freeipa_2.1.4-0ubuntu2.dsc
ec95b45bddf656dbfe7a070e2b3a910e44d77f1b 22053 freeipa_2.1.4-0ubuntu2.debian.tar.gz
Checksums-Sha256:
af0ec01c61f6112b4b9895fe96eed9e1ff96a8cf552cdd7b5638cc81e51e3311 2501 freeipa_2.1.4-0ubuntu2.dsc
dbc46a66dd0176111d47f35f4700be9ee3695e59ff2adbe28829a2816028b13e 22053 freeipa_2.1.4-0ubuntu2.debian.tar.gz
Files:
d354afb3c43ed1edc452d973d32c9c6f 2501 net extra freeipa_2.1.4-0ubuntu2.dsc
88ed09a07a5a5c4a18375f2870c42860 22053 net extra freeipa_2.1.4-0ubuntu2.debian.tar.gz
Original-Maintainer: Maintainer: Debian FreeIPA Team <pkg-freeipa-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)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=4Lsd
-----END PGP SIGNATURE-----
More information about the Raring-changes
mailing list