[ubuntu/raring-proposed] freeipa 2.1.4-0ubuntu2 (Accepted)

Timo Aaltonen tjaalton at ubuntu.com
Sun Feb 10 22:35:16 UTC 2013


freeipa (2.1.4-0ubuntu2) raring; urgency=low

  * 0110-Upload-CA-cert-in-the-directory-on-install.patch
    0111-Update-plugin-to-upload-CA-certificate-to-LDAP.patch
    0112-Do-SSL-CA-verification-and-hostname-validation.patch
    0113-Use-secure-method-to-acquire-IPA-CA-certificate.patch:
    - CVE-2012-5484 - The client in FreeIPA 2.x and 3.x before 3.1.2 does
      not properly obtain the Certification Authority (CA) certificate
      from the server, which allows man-in-the-middle attackers to spoof
      a join procedure via a crafted certificate. (LP: #1104954)
  * check-through-all-ldap-servers.patch: Check through all LDAP servers
    in the domain during IPA discovery (ticket #1827). Patch from 2.2
    to aid in porting patch 0113.

Date: Mon, 11 Feb 2013 00:32:12 +0200
Changed-By: Timo Aaltonen <tjaalton at ubuntu.com>
Maintainer: Ubuntu FreeIPA <freeipa at lists.launchpad.net>
https://launchpad.net/ubuntu/raring/+source/freeipa/2.1.4-0ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 11 Feb 2013 00:32:12 +0200
Source: freeipa
Binary: freeipa-client python-freeipa
Architecture: source
Version: 2.1.4-0ubuntu2
Distribution: raring
Urgency: low
Maintainer: Ubuntu FreeIPA <freeipa at lists.launchpad.net>
Changed-By: Timo Aaltonen <tjaalton at ubuntu.com>
Description: 
 freeipa-client - FreeIPA centralized identity framework -- client
 python-freeipa - FreeIPA centralized identity framework -- python modules
Launchpad-Bugs-Fixed: 1104954
Changes: 
 freeipa (2.1.4-0ubuntu2) raring; urgency=low
 .
   * 0110-Upload-CA-cert-in-the-directory-on-install.patch
     0111-Update-plugin-to-upload-CA-certificate-to-LDAP.patch
     0112-Do-SSL-CA-verification-and-hostname-validation.patch
     0113-Use-secure-method-to-acquire-IPA-CA-certificate.patch:
     - CVE-2012-5484 - The client in FreeIPA 2.x and 3.x before 3.1.2 does
       not properly obtain the Certification Authority (CA) certificate
       from the server, which allows man-in-the-middle attackers to spoof
       a join procedure via a crafted certificate. (LP: #1104954)
   * check-through-all-ldap-servers.patch: Check through all LDAP servers
     in the domain during IPA discovery (ticket #1827). Patch from 2.2
     to aid in porting patch 0113.
Checksums-Sha1: 
 c8cc79354bfbfff670317bf6291589afc14f771b 2501 freeipa_2.1.4-0ubuntu2.dsc
 ec95b45bddf656dbfe7a070e2b3a910e44d77f1b 22053 freeipa_2.1.4-0ubuntu2.debian.tar.gz
Checksums-Sha256: 
 af0ec01c61f6112b4b9895fe96eed9e1ff96a8cf552cdd7b5638cc81e51e3311 2501 freeipa_2.1.4-0ubuntu2.dsc
 dbc46a66dd0176111d47f35f4700be9ee3695e59ff2adbe28829a2816028b13e 22053 freeipa_2.1.4-0ubuntu2.debian.tar.gz
Files: 
 d354afb3c43ed1edc452d973d32c9c6f 2501 net extra freeipa_2.1.4-0ubuntu2.dsc
 88ed09a07a5a5c4a18375f2870c42860 22053 net extra freeipa_2.1.4-0ubuntu2.debian.tar.gz
Original-Maintainer: Maintainer: Debian FreeIPA Team <pkg-freeipa-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=4Lsd
-----END PGP SIGNATURE-----


More information about the Raring-changes mailing list