diffstat of debian/ for ldb_1.1.16-1 ldb_1.1.24-0ubuntu0.14.04.2 changelog | 38 +++++++++++++++++ control | 7 +-- libldb1.symbols | 10 ++++ patches/01_exclude_symbols | 24 ---------- patches/CVE-2019-3824-1.patch | 92 ++++++++++++++++++++++++++++++++++++++++++ patches/CVE-2019-3824-2.patch | 56 +++++++++++++++++++++++++ patches/CVE-2019-3824-3.patch | 34 +++++++++++++++ patches/CVE-2019-3824-4.patch | 31 ++++++++++++++ patches/CVE-2019-3824-5.patch | 37 ++++++++++++++++ patches/CVE-2019-3824-6.patch | 34 +++++++++++++++ patches/series | 6 ++ python-ldb.symbols | 8 +++ rules | 4 - 13 files changed, 352 insertions(+), 29 deletions(-) diff -Nru ldb-1.1.16/debian/changelog ldb-1.1.24/debian/changelog --- ldb-1.1.16/debian/changelog 2013-08-11 15:50:12.000000000 +0000 +++ ldb-1.1.24/debian/changelog 2019-02-25 13:27:10.000000000 +0000 @@ -1,3 +1,41 @@ +ldb (1:1.1.24-0ubuntu0.14.04.2) trusty-security; urgency=medium + + * SECURITY UPDATE: Out of bound read in ldb_wildcard_compare + - debian/patches/CVE-2019-3824-1.patch: fix length. + - debian/patches/CVE-2019-3824-2.patch: add extra comments. + - debian/patches/CVE-2019-3824-3.patch: improve code style. + - debian/patches/CVE-2019-3824-4.patch: use talloc_zero. + - debian/patches/CVE-2019-3824-5.patch: check tree operation. + - debian/patches/CVE-2019-3824-6.patch: fix end of data check. + - CVE-2019-3824 + + -- Marc Deslauriers Mon, 25 Feb 2019 08:27:10 -0500 + +ldb (1:1.1.24-0ubuntu0.14.04.1) trusty-security; urgency=medium + + * Updated to upstream 1.1.24 as required by Samba security update. + - debian/patches/01_exclude_symbols: removed, upstream. + - debian/patches/CVE-2015-3223.patch: removed, upstream. + - debian/patches/CVE-2015-5330.patch: removed, upstream. + - debian/rules: adjusted location of files to be cleaned. + - debian/*.symbols: updated for new version. + - debian/control: bump tdb Build-Depends. + + -- Marc Deslauriers Tue, 05 Apr 2016 13:14:18 -0400 + +ldb (1:1.1.16-1ubuntu0.1) trusty-security; urgency=medium + + * SECURITY UPDATE: denial of service in ldb_wildcard_compare function + - debian/patches/CVE-2015-3223.patch: handle empty strings and + embedded zeros in lib/ldb/common/ldb_match.c. + - CVE-2015-3223 + * SECURITY UPDATE: information leak via incorrect string length handling + - debian/patches/CVE-2015-5330.patch: fix string length handling in + lib/ldb/common/ldb_dn.c. + - CVE-2015-5330 + + -- Marc Deslauriers Mon, 04 Jan 2016 10:14:35 -0500 + ldb (1:1.1.16-1) unstable; urgency=low [ Andrew Bartlett ] diff -Nru ldb-1.1.16/debian/control ldb-1.1.24/debian/control --- ldb-1.1.16/debian/control 2013-08-11 15:50:12.000000000 +0000 +++ ldb-1.1.24/debian/control 2016-04-05 17:15:51.000000000 +0000 @@ -1,21 +1,22 @@ Source: ldb Section: devel Priority: optional -Maintainer: Jelmer Vernooij +Maintainer: Ubuntu Developers +XSBC-Original-Maintainer: Jelmer Vernooij Build-Depends: debhelper (>> 8.1.3), docbook-xml, docbook-xsl, libldap2-dev, libpopt-dev, libtalloc-dev (>= 2.0.8~), - libtdb-dev (>= 1.2.12~), + libtdb-dev (>= 1.3.2~), libtevent-dev (>= 0.9.18~), pkg-config, python (>= 2.6.6-3), python-all-dbg (>= 2.6.6-3), python-all-dev (>= 2.6.6-3), python-talloc-dev (>= 2.0.8~), - python-tdb (>= 1.2.12~), + python-tdb (>= 1.3.2~), xsltproc Homepage: http://ldb.samba.org/ Standards-Version: 3.9.4 diff -Nru ldb-1.1.16/debian/libldb1.symbols ldb-1.1.24/debian/libldb1.symbols --- ldb-1.1.16/debian/libldb1.symbols 2013-08-11 15:50:12.000000000 +0000 +++ ldb-1.1.24/debian/libldb1.symbols 2016-04-05 17:27:36.000000000 +0000 @@ -30,6 +30,14 @@ LDB_1.1.14@LDB_1.1.14 1:1.1.15 LDB_1.1.15@LDB_1.1.15 1:1.1.15 LDB_1.1.16@LDB_1.1.16 1:1.1.16 + LDB_1.1.17@LDB_1.1.17 1:1.1.17 + LDB_1.1.18@LDB_1.1.18 1:1.1.18 + LDB_1.1.19@LDB_1.1.19 1:1.1.19 + LDB_1.1.20@LDB_1.1.20 1:1.1.20 + LDB_1.1.21@LDB_1.1.21 1:1.1.21 + LDB_1.1.22@LDB_1.1.22 1:1.1.22 + LDB_1.1.23@LDB_1.1.23 1:1.1.23 + LDB_1.1.24@LDB_1.1.24 1:1.1.24 ldb_check_critical_controls@LDB_0.9.22 0.9.22 ldb_controls_except_specified@LDB_0.9.22 0.9.22 ldb_control_to_string@LDB_1.0.2 1.0.2~git20110403 @@ -89,6 +97,7 @@ ldb_dn_get_extended_comp_num@LDB_0.9.23 0.9.23 ldb_dn_get_extended_component@LDB_0.9.10 0.9.21 ldb_dn_get_extended_linearized@LDB_0.9.10 0.9.21 + ldb_dn_get_ldb_context@LDB_1.1.22 1:1.1.23 ldb_dn_get_linearized@LDB_0.9.10 0.9.21 ldb_dn_get_parent@LDB_0.9.10 0.9.21 ldb_dn_get_rdn_name@LDB_0.9.10 0.9.21 @@ -228,6 +237,7 @@ ldb_parse_tree_walk@LDB_1.1.2 1.1.2~ ldb_qsort@LDB_0.9.10 0.9.21 ldb_register_backend@LDB_0.9.10 0.9.21 + ldb_register_extended_match_rule@LDB_1.1.19 1:1.1.20 ldb_register_hook@LDB_0.9.18 0.9.21 ldb_register_module@LDB_0.9.10 0.9.21 ldb_rename@LDB_0.9.10 0.9.21 diff -Nru ldb-1.1.16/debian/patches/01_exclude_symbols ldb-1.1.24/debian/patches/01_exclude_symbols --- ldb-1.1.16/debian/patches/01_exclude_symbols 2013-08-11 15:50:12.000000000 +0000 +++ ldb-1.1.24/debian/patches/01_exclude_symbols 1970-01-01 00:00:00.000000000 +0000 @@ -1,24 +0,0 @@ -Description: Properly hide private symbols in libldb1 -Author: Jelmer Vernooij -Bug: https://bugzilla.samba.org/show_bug.cgi?id=9357 -Status: submitted upstream - -diff -ur ldb-1.1.13/buildtools/wafsamba/samba_abi.py ldb-1.1.13-fixd/buildtools/wafsamba/samba_abi.py ---- ldb-1.1.13/buildtools/wafsamba/samba_abi.py 2012-09-07 16:47:16.000000000 +0200 -+++ ldb-1.1.13-fixd/buildtools/wafsamba/samba_abi.py 2012-11-05 19:23:40.010206344 +0100 -@@ -190,12 +190,12 @@ - f.write("\t\t%s;\n" % x) - else: - f.write("\t\t*;\n") -- if len(local_abi) > 0: -+ if abi_match != ["*"]: - f.write("\tlocal:\n") - for x in local_abi: - f.write("\t\t%s;\n" % x[1:]) -- elif abi_match != ["*"]: -- f.write("\tlocal: *;\n") -+ if len(global_abi) > 0: -+ f.write("\t\t*;\n") - f.write("};\n") - f.close() - diff -Nru ldb-1.1.16/debian/patches/CVE-2019-3824-1.patch ldb-1.1.24/debian/patches/CVE-2019-3824-1.patch --- ldb-1.1.16/debian/patches/CVE-2019-3824-1.patch 1970-01-01 00:00:00.000000000 +0000 +++ ldb-1.1.24/debian/patches/CVE-2019-3824-1.patch 2019-02-25 13:26:50.000000000 +0000 @@ -0,0 +1,92 @@ +From 27c9e6cfb3492830423bc21a49506452ac98fbe0 Mon Sep 17 00:00:00 2001 +From: Lukas Slebodnik +Date: Fri, 18 Jan 2019 16:37:24 +0100 +Subject: [PATCH 1/6] CVE-2019-3824 ldb: Out of bound read in + ldb_wildcard_compare + +There is valgrind error in few tests tests/test-generic.sh + 91 echo "Test wildcard match" + 92 $VALGRIND ldbadd $LDBDIR/tests/test-wildcard.ldif || exit 1 + 93 $VALGRIND ldbsearch '(cn=test*multi)' || exit 1 + 95 $VALGRIND ldbsearch '(cn=*test_multi)' || exit 1 + 97 $VALGRIND ldbsearch '(cn=test*multi*test*multi)' || exit 1 + +e.g. + ==3098== Memcheck, a memory error detector + ==3098== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. + ==3098== Using Valgrind-3.14.0 and LibVEX; rerun with -h for copyright info + ==3098== Command: ./bin/ldbsearch (cn=test*multi) + ==3098== + ==3098== Invalid read of size 1 + ==3098== at 0x483CEE7: memchr (vg_replace_strmem.c:890) + ==3098== by 0x49A9073: memmem (in /usr/lib64/libc-2.28.9000.so) + ==3098== by 0x485DFE9: ldb_wildcard_compare (ldb_match.c:313) + ==3098== by 0x485DFE9: ldb_match_substring (ldb_match.c:360) + ==3098== by 0x485DFE9: ldb_match_message (ldb_match.c:572) + ==3098== by 0x558F8FA: search_func (ldb_kv_search.c:549) + ==3098== by 0x48C78CA: ??? (in /usr/lib64/libtdb.so.1.3.17) + ==3098== by 0x48C7A60: tdb_traverse_read (in /usr/lib64/libtdb.so.1.3.17) + ==3098== by 0x557B7C4: ltdb_traverse_fn (ldb_tdb.c:274) + ==3098== by 0x558FBFA: ldb_kv_search_full (ldb_kv_search.c:594) + ==3098== by 0x558FBFA: ldb_kv_search (ldb_kv_search.c:854) + ==3098== by 0x558E497: ldb_kv_callback (ldb_kv.c:1713) + ==3098== by 0x48FCD58: tevent_common_invoke_timer_handler (in /usr/lib64/libtevent.so.0.9.38) + ==3098== by 0x48FCEFD: tevent_common_loop_timer_delay (in /usr/lib64/libtevent.so.0.9.38) + ==3098== by 0x48FE14A: ??? (in /usr/lib64/libtevent.so.0.9.38) + ==3098== Address 0x4b4ab81 is 0 bytes after a block of size 129 alloc'd + ==3098== at 0x483880B: malloc (vg_replace_malloc.c:309) + ==3098== by 0x491048B: talloc_strndup (in /usr/lib64/libtalloc.so.2.1.15) + ==3098== by 0x48593CA: ldb_casefold_default (ldb_utf8.c:59) + ==3098== by 0x485F68D: ldb_handler_fold (attrib_handlers.c:64) + ==3098== by 0x485DB88: ldb_wildcard_compare (ldb_match.c:257) + ==3098== by 0x485DB88: ldb_match_substring (ldb_match.c:360) + ==3098== by 0x485DB88: ldb_match_message (ldb_match.c:572) + ==3098== by 0x558F8FA: search_func (ldb_kv_search.c:549) + ==3098== by 0x48C78CA: ??? (in /usr/lib64/libtdb.so.1.3.17) + ==3098== by 0x48C7A60: tdb_traverse_read (in /usr/lib64/libtdb.so.1.3.17) + ==3098== by 0x557B7C4: ltdb_traverse_fn (ldb_tdb.c:274) + ==3098== by 0x558FBFA: ldb_kv_search_full (ldb_kv_search.c:594) + ==3098== by 0x558FBFA: ldb_kv_search (ldb_kv_search.c:854) + ==3098== by 0x558E497: ldb_kv_callback (ldb_kv.c:1713) + ==3098== by 0x48FCD58: tevent_common_invoke_timer_handler (in /usr/lib64/libtevent.so.0.9.38) + ==3098== + # record 1 + dn: cn=test_multi_test_multi_test_multi,o=University of Michigan,c=TEST + cn: test_multi_test_multi_test_multi + description: test multi wildcards matching + objectclass: person + sn: multi_test + name: test_multi_test_multi_test_multi + distinguishedName: cn=test_multi_test_multi_test_multi,o=University of Michiga + n,c=TEST + + # returned 1 records + # 1 entries + # 0 referrals + +BUG: https://bugzilla.samba.org/show_bug.cgi?id=13773 + +Signed-off-by: Lukas Slebodnik +--- + lib/ldb/common/ldb_match.c | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +diff --git a/common/ldb_match.c b/common/ldb_match.c +index e83ad637dff..71f8b9671d5 100644 +--- a/common/ldb_match.c ++++ b/common/ldb_match.c +@@ -308,9 +308,10 @@ static int ldb_wildcard_compare(struct ldb_context *ldb, + if (p == NULL) goto mismatch; + if ( (! tree->u.substring.chunks[c + 1]) && (! tree->u.substring.end_with_wildcard) ) { + uint8_t *g; ++ uint8_t *end = val.data + val.length; + do { /* greedy */ + g = memmem(p + cnk.length, +- val.length - (p - val.data), ++ end - (p + cnk.length), + (const uint8_t *)cnk.data, + cnk.length); + if (g) p = g; +-- +2.17.1 + diff -Nru ldb-1.1.16/debian/patches/CVE-2019-3824-2.patch ldb-1.1.24/debian/patches/CVE-2019-3824-2.patch --- ldb-1.1.16/debian/patches/CVE-2019-3824-2.patch 1970-01-01 00:00:00.000000000 +0000 +++ ldb-1.1.24/debian/patches/CVE-2019-3824-2.patch 2019-02-25 13:26:53.000000000 +0000 @@ -0,0 +1,56 @@ +From 23f386668b4e2b28f69bf6d227cc2210562afae2 Mon Sep 17 00:00:00 2001 +From: Andrew Bartlett +Date: Mon, 4 Feb 2019 11:22:34 +1300 +Subject: [PATCH 2/6] CVE-2019-3824 ldb: Extra comments to clarify no pointer + wrap in wildcard processing + +BUG: https://bugzilla.samba.org/show_bug.cgi?id=13773 + +Signed-off-by: Andrew Bartlett +--- + lib/ldb/common/ldb_match.c | 25 +++++++++++++++++++++++-- + 1 file changed, 23 insertions(+), 2 deletions(-) + +diff --git a/common/ldb_match.c b/common/ldb_match.c +index 71f8b9671d5..b49085286a2 100644 +--- a/common/ldb_match.c ++++ b/common/ldb_match.c +@@ -306,12 +306,33 @@ static int ldb_wildcard_compare(struct ldb_context *ldb, + p = memmem((const void *)val.data,val.length, + (const void *)cnk.data, cnk.length); + if (p == NULL) goto mismatch; ++ ++ /* ++ * At this point we know cnk.length <= val.length as ++ * otherwise there could be no match ++ */ ++ + if ( (! tree->u.substring.chunks[c + 1]) && (! tree->u.substring.end_with_wildcard) ) { + uint8_t *g; + uint8_t *end = val.data + val.length; + do { /* greedy */ +- g = memmem(p + cnk.length, +- end - (p + cnk.length), ++ ++ /* ++ * haystack is a valid pointer in val ++ * because the memmem() can only ++ * succeed if the needle (cnk.length) ++ * is <= haystacklen ++ * ++ * p will be a pointer at least ++ * cnk.length from the end of haystack ++ */ ++ uint8_t *haystack ++ = p + cnk.length; ++ size_t haystacklen ++ = end - (haystack); ++ ++ g = memmem(haystack, ++ haystacklen, + (const uint8_t *)cnk.data, + cnk.length); + if (g) p = g; +-- +2.17.1 + diff -Nru ldb-1.1.16/debian/patches/CVE-2019-3824-3.patch ldb-1.1.24/debian/patches/CVE-2019-3824-3.patch --- ldb-1.1.16/debian/patches/CVE-2019-3824-3.patch 1970-01-01 00:00:00.000000000 +0000 +++ ldb-1.1.24/debian/patches/CVE-2019-3824-3.patch 2019-02-25 13:26:56.000000000 +0000 @@ -0,0 +1,34 @@ +From fb005204b4248012f49e31e4c2c452a667f3fc87 Mon Sep 17 00:00:00 2001 +From: Andrew Bartlett +Date: Mon, 4 Feb 2019 11:22:50 +1300 +Subject: [PATCH 3/6] CVE-2019-3824 ldb: Improve code style and layout in + wildcard processing + +BUG: https://bugzilla.samba.org/show_bug.cgi?id=13773 + +Signed-off-by: Andrew Bartlett +--- + lib/ldb/common/ldb_match.c | 8 +++++--- + 1 file changed, 5 insertions(+), 3 deletions(-) + +diff --git a/common/ldb_match.c b/common/ldb_match.c +index b49085286a2..e332ba0da53 100644 +--- a/common/ldb_match.c ++++ b/common/ldb_match.c +@@ -333,9 +333,11 @@ static int ldb_wildcard_compare(struct ldb_context *ldb, + + g = memmem(haystack, + haystacklen, +- (const uint8_t *)cnk.data, +- cnk.length); +- if (g) p = g; ++ (const uint8_t *)cnk.data, ++ cnk.length); ++ if (g) { ++ p = g; ++ } + } while(g); + } + val.length = val.length - (p - (uint8_t *)(val.data)) - cnk.length; +-- +2.17.1 diff -Nru ldb-1.1.16/debian/patches/CVE-2019-3824-4.patch ldb-1.1.24/debian/patches/CVE-2019-3824-4.patch --- ldb-1.1.16/debian/patches/CVE-2019-3824-4.patch 1970-01-01 00:00:00.000000000 +0000 +++ ldb-1.1.24/debian/patches/CVE-2019-3824-4.patch 2019-02-25 13:27:00.000000000 +0000 @@ -0,0 +1,31 @@ +From 832993c20c96e51faa2e25f2d0581737fb2bfabf Mon Sep 17 00:00:00 2001 +From: Gary Lockyer +Date: Tue, 19 Feb 2019 10:25:24 +1300 +Subject: [PATCH 4/6] CVE-2019-3824 ldb: ldb_parse_tree use talloc_zero + +Initialise the created ldb_parse_tree with talloc_zero, this ensures +that it is correctly initialised if inadvertently passed to a function +expecting a different operation type. + +BUG: https://bugzilla.samba.org/show_bug.cgi?id=13773 + +Signed-off-by: Gary Lockyer +--- + lib/ldb/common/ldb_parse.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/common/ldb_parse.c b/common/ldb_parse.c +index 5fa5a74afa9..db420091311 100644 +--- a/common/ldb_parse.c ++++ b/common/ldb_parse.c +@@ -389,7 +389,7 @@ static struct ldb_parse_tree *ldb_parse_simple(TALLOC_CTX *mem_ctx, const char * + struct ldb_parse_tree *ret; + enum ldb_parse_op filtertype; + +- ret = talloc(mem_ctx, struct ldb_parse_tree); ++ ret = talloc_zero(mem_ctx, struct ldb_parse_tree); + if (!ret) { + errno = ENOMEM; + return NULL; +-- +2.17.1 diff -Nru ldb-1.1.16/debian/patches/CVE-2019-3824-5.patch ldb-1.1.24/debian/patches/CVE-2019-3824-5.patch --- ldb-1.1.16/debian/patches/CVE-2019-3824-5.patch 1970-01-01 00:00:00.000000000 +0000 +++ ldb-1.1.24/debian/patches/CVE-2019-3824-5.patch 2019-02-25 13:27:03.000000000 +0000 @@ -0,0 +1,37 @@ +From 52e26aaf19720ae73a9a2c683b8ddfbfd765ce1c Mon Sep 17 00:00:00 2001 +From: Gary Lockyer +Date: Tue, 19 Feb 2019 10:26:25 +1300 +Subject: [PATCH 5/6] CVE-2019-3824 ldb: wildcard_match check tree operation + +Check the operation type of the passed parse tree, and return +LDB_INAPPROPRIATE_MATCH if the operation is not LDB_OP_SUBSTRING. + +A query of "attribute=*" gets parsed as LDB_OP_PRESENT, checking the +operation and failing ldb_wildcard_match should help prevent confusion +writing tests. + +BUG: https://bugzilla.samba.org/show_bug.cgi?id=13773 + +Signed-off-by: Gary Lockyer +--- + lib/ldb/common/ldb_match.c | 5 +++++ + 1 file changed, 5 insertions(+) + +diff --git a/common/ldb_match.c b/common/ldb_match.c +index e332ba0da53..e529b5e26a5 100644 +--- a/common/ldb_match.c ++++ b/common/ldb_match.c +@@ -244,6 +244,11 @@ static int ldb_wildcard_compare(struct ldb_context *ldb, + uint8_t *save_p = NULL; + unsigned int c = 0; + ++ if (tree->operation != LDB_OP_SUBSTRING) { ++ *matched = false; ++ return LDB_ERR_INAPPROPRIATE_MATCHING; ++ } ++ + a = ldb_schema_attribute_by_name(ldb, tree->u.substring.attr); + if (!a) { + return LDB_ERR_INVALID_ATTRIBUTE_SYNTAX; +-- +2.17.1 diff -Nru ldb-1.1.16/debian/patches/CVE-2019-3824-6.patch ldb-1.1.24/debian/patches/CVE-2019-3824-6.patch --- ldb-1.1.16/debian/patches/CVE-2019-3824-6.patch 1970-01-01 00:00:00.000000000 +0000 +++ ldb-1.1.24/debian/patches/CVE-2019-3824-6.patch 2019-02-25 13:27:06.000000000 +0000 @@ -0,0 +1,34 @@ +From 146bf02a8ecc81177011dd1075b37883ef0bd5e1 Mon Sep 17 00:00:00 2001 +From: Gary Lockyer +Date: Tue, 19 Feb 2019 10:26:56 +1300 +Subject: [PATCH 6/6] CVE-2019-3824 ldb: wildcard_match end of data check + +ldb_handler_copy and ldb_val_dup over allocate by one and add a trailing '\0' +to the data, to make them safe to use the C string functions on. + +However testing for the trailing '\0' is not the correct way to test for +the end of a value, the length should be checked instead. + +BUG: https://bugzilla.samba.org/show_bug.cgi?id=13773 + +Signed-off-by: Gary Lockyer +--- + lib/ldb/common/ldb_match.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/common/ldb_match.c b/common/ldb_match.c +index e529b5e26a5..79894d0c89b 100644 +--- a/common/ldb_match.c ++++ b/common/ldb_match.c +@@ -353,7 +353,7 @@ static int ldb_wildcard_compare(struct ldb_context *ldb, + } + + /* last chunk may not have reached end of string */ +- if ( (! tree->u.substring.end_with_wildcard) && (*(val.data) != 0) ) goto mismatch; ++ if ( (! tree->u.substring.end_with_wildcard) && (val.length != 0) ) goto mismatch; + talloc_free(save_p); + *matched = true; + return LDB_SUCCESS; +-- +2.17.1 + diff -Nru ldb-1.1.16/debian/patches/series ldb-1.1.24/debian/patches/series --- ldb-1.1.16/debian/patches/series 2013-08-11 15:50:12.000000000 +0000 +++ ldb-1.1.24/debian/patches/series 2019-02-25 13:27:06.000000000 +0000 @@ -0,0 +1,6 @@ +CVE-2019-3824-1.patch +CVE-2019-3824-2.patch +CVE-2019-3824-3.patch +CVE-2019-3824-4.patch +CVE-2019-3824-5.patch +CVE-2019-3824-6.patch diff -Nru ldb-1.1.16/debian/python-ldb.symbols ldb-1.1.24/debian/python-ldb.symbols --- ldb-1.1.16/debian/python-ldb.symbols 2013-08-11 15:50:12.000000000 +0000 +++ ldb-1.1.24/debian/python-ldb.symbols 2016-04-05 17:27:43.000000000 +0000 @@ -14,5 +14,13 @@ PYLDB_UTIL_1.1.14@PYLDB_UTIL_1.1.14 1:1.1.15 PYLDB_UTIL_1.1.15@PYLDB_UTIL_1.1.15 1:1.1.15 PYLDB_UTIL_1.1.16@PYLDB_UTIL_1.1.16 1:1.1.16 + PYLDB_UTIL_1.1.17@PYLDB_UTIL_1.1.17 1:1.1.17 + PYLDB_UTIL_1.1.18@PYLDB_UTIL_1.1.18 1:1.1.18 + PYLDB_UTIL_1.1.19@PYLDB_UTIL_1.1.19 1:1.1.19 + PYLDB_UTIL_1.1.20@PYLDB_UTIL_1.1.20 1:1.1.20 + PYLDB_UTIL_1.1.21@PYLDB_UTIL_1.1.21 1:1.1.21 + PYLDB_UTIL_1.1.22@PYLDB_UTIL_1.1.22 1:1.1.22 + PYLDB_UTIL_1.1.23@PYLDB_UTIL_1.1.23 1:1.1.23 + PYLDB_UTIL_1.1.24@PYLDB_UTIL_1.1.24 1:1.1.24 pyldb_Dn_FromDn@PYLDB_UTIL_1.1.2 1.1.2~ pyldb_Object_AsDn@PYLDB_UTIL_1.1.2 1.1.2~ diff -Nru ldb-1.1.16/debian/rules ldb-1.1.24/debian/rules --- ldb-1.1.16/debian/rules 2013-08-11 15:50:12.000000000 +0000 +++ ldb-1.1.24/debian/rules 2016-04-05 17:16:22.000000000 +0000 @@ -46,8 +46,8 @@ # Waf should be doing this; see # https://bugzilla.samba.org/show_bug.cgi?id=8855 rm -f buildtools/wafsamba/*.pyc \ - buildtools/wafadmin/*.pyc \ - buildtools/wafadmin/Tools/*.pyc + third_party/waf/wafadmin/*.pyc \ + third_party/waf/wafadmin/Tools/*.pyc override_dh_auto_build: $(WAF) build