[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#933507: marked as done (RFS: openldap/2.4.48+dfsg-1~bpo10+1)



Your message dated Thu, 1 Aug 2019 23:47:30 -0700
with message-id <20190802064730.GA1071@kiwi.nardis.ca>
and subject line Re: Bug#933507: RFS: openldap/2.4.48+dfsg-1~bpo10+1
has caused the Debian Bug report #933507,
regarding RFS: openldap/2.4.48+dfsg-1~bpo10+1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
933507: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=933507
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: normal

Dear mentors and backporters,

I am looking for a sponsor to perform the initial upload of openldap to buster-backports, since it will be NEW. I am DM for the package and can take care of future uploads myself.

Rationale for backporting: while the client library (libldap) is mature and stable, the OpenLDAP server (slapd) is more actively developed, so advanced slapd users often prefer to run the latest upstream version.

The backport is a simple rebuild; no changes are needed to build in buster at this time.

The package can be found on mentors.debian.net:

https://mentors.debian.net/package/openldap
https://mentors.debian.net/debian/pool/main/o/openldap/openldap_2.4.48+dfsg-1~bpo10+1.dsc

The changes since stable are:

openldap (2.4.48+dfsg-1~bpo10+1) buster-backports; urgency=medium
.
  * Rebuild for buster-backports.
.
openldap (2.4.48+dfsg-1) unstable; urgency=medium
.
  * New upstream release.
    - fixed slapd to restrict rootDN proxyauthz to its own databases
      (CVE-2019-13057) (ITS#9038) (Closes: #932997)
    - fixed slapd to enforce sasl_ssf ACL statement on every connection
      (CVE-2019-13565) (ITS#9052) (Closes: #932998)
    - added new openldap.h header with OpenLDAP specific libldap interfaces
      (ITS#8671)
    - updated lastbind overlay to support forwarding authTimestamp updates
      (ITS#7721) (Closes: #880656)
  * Update Standards-Version to 4.4.0.
  * Add a systemd drop-in to set RemainAfterExit=no on the slapd service, so
    that systemd marks the service as dead after it crashes or is killed.
    Thanks to Heitor Alves de Siqueira. (Closes: #926657, LP: #1821343)
  * Use more entropy for generating a random admin password, if none was set
    during initial configuration. Thanks to Judicael Courant.
    (Closes: #932270)
  * Replace debian/rules calls to dpkg-architecture and dpkg-parsechangelog
    with variables provided by dpkg-dev includes.
  * Declare R³: no.
  * Create a simple autopkgtest that tests installing slapd and connecting to
    it with an ldap tool.
  * Install the new openldap.h header in libldap2-dev.

Thank you,
Ryan

--- End Message ---
--- Begin Message ---
Thank you kilobyte for uploading this.

--- End Message ---

Reply to: