Описание
ELSA-2012-0813: 389-ds-base security, bug fix, and enhancement update (LOW)
[1.2.10.2-15]
- Resolves: Bug 824014 - DS Shuts down intermittently
[1.2.10.2-14]
- Resolves: Bug 819643 - Database RUV could mismatch the one in changelog under the stress -- patch 0015 fixes a small memleak in previous patch
[1.2.10.2-13]
- Resolves: Bug 822700 - Bad DNs in ACIs can segfault ns-slapd
[1.2.10.2-12]
- Resolves: Bug 819643 - Database RUV could mismatch the one in changelog under the stress
- Resolves: Bug 821542 - letters in object's cn get converted to lowercase when renaming object
[1.2.10.2-11]
- Resolves: Bug 819643 - Database RUV could mismatch the one in changelog under the stress
- 1.2.10.2-10 was built from the private branch
[1.2.10.2-10]
- Resolves: Bug 819643 - Database RUV could mismatch the one in changelog under the stress
[1.2.10.2-9]
- Resolves: Bug 815991 - crash in ldap_initialize with multiple threads
- previous fix was still crashing in ldclt
[1.2.10.2-8]
- Resolves: Bug 815991 - crash in ldap_initialize with multiple threads
[1.2.10.2-7]
- Resolves: Bug 813964 - IPA dirsvr seg-fault during system longevity test
[1.2.10.2-6]
- Resolves: Bug 811291 - [abrt] 389-ds-base-1.2.10.4-2.fc16: index_range_read_ext: Process /usr/sbin/ns-slapd was killed by signal 11 (SIGSEGV)
- typo in previous patch
[1.2.10.2-5]
- Resolves: Bug 811291 - [abrt] 389-ds-base-1.2.10.4-2.fc16: index_range_read_ext: Process /usr/sbin/ns-slapd was killed by signal 11 (SIGSEGV)
[1.2.10.2-4]
- Resolves: Bug 803930 - ipa not starting after upgade because of missing data
- get rid of posttrans - move update code to post
[1.2.10.2-3]
- Resolves: Bug 800215 - Certain CMP operations hang or cause ns-slapd to crash
[1.2.10.2-2]
- Resolves: Bug 800215 - Certain CMP operations hang or cause ns-slapd to crash
- Resolves: Bug 800217 - fix valgrind reported issues
[1.2.10.2-1]
- Resolves: Bug 766989 - Rebase 389-ds-base to 1.2.10
- Resolves: Bug 796770 - crash when replicating orphaned tombstone entry
[1.2.10.1-1]
- Resolves: Bug 766989 - Rebase 389-ds-base to 1.2.10
- Resolves: Bug 790491 - 389 DS Segfaults during replica install in FreeIPA
[1.2.10.0-1]
- Resolves: Bug 766989 - Rebase 389-ds-base to 1.2.10
[1.2.10-0.11.rc2]
- Resolves: Bug 766989 - Rebase 389-ds-base to 1.2.10
[1.2.9.16-1]
- Bug 759301 - Incorrect entryUSN index under high load in replicated environment
- Bug 743979 - Add slapi_rwlock API and use POSIX rwlocks
- WARNING - patches 0030 and 0031 remove and add back the file configure
- this is necessary because the merge commit to rebase RHEL-6 to 1.2.9.6
- seriously messed up configure - so in order to add the patch for 743979
- which also touched configure, the file had to be removed and added back
- also note that the commit for the RHEL-6 branch to remove configure does
- not work - the way patch works, it has to match every line exactly in
- order to remove the file, and because the merge commit messed things
- up, it doesn't work
- So, DO NOT TOUCH 0030-remove-configure-to-get-rid-of-merge-conflict.patch
- BECAUSE IT IS HAND CRAFTED and not generated by git format-patch
- if you must regenerate this file,
- git format-patch ...args... to generate a file in patch format
- remove all of the patch matches (all the lines beginning with -)
- get the 1.2.9.6 version of configure from the source tarball
- wc -l configure to get the number of lines in the file
- sed 's/^/-/' configure >> thefile.patch
- edit thefile.patch to have the right number of lines and have the
- patch commands in the correct place
- PROFIT!!!
[1.2.9.15-1]
- Bug 752577 - crash when simple paged fails to send entry to client
- Bug 757897 - rhds81 modrn operation and 100% cpu use in replication
- Bug 757898 - Fix Coverity (11104) Resource leak: ids_sasl_user_to_entry (slapd/saslbind.c)
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
389-ds-base
1.2.10.2-15.el6
389-ds-base-devel
1.2.10.2-15.el6
389-ds-base-libs
1.2.10.2-15.el6
Oracle Linux i686
389-ds-base
1.2.10.2-15.el6
389-ds-base-devel
1.2.10.2-15.el6
389-ds-base-libs
1.2.10.2-15.el6
Связанные CVE
Связанные уязвимости
The acllas__handle_group_entry function in servers/plugins/acl/acllas.c in 389 Directory Server before 1.2.10 does not properly handled access control instructions (ACIs) that use certificate groups, which allows remote authenticated LDAP users with a certificate group to cause a denial of service (infinite loop and CPU consumption) by binding to the server.
The acllas__handle_group_entry function in servers/plugins/acl/acllas.c in 389 Directory Server before 1.2.10 does not properly handled access control instructions (ACIs) that use certificate groups, which allows remote authenticated LDAP users with a certificate group to cause a denial of service (infinite loop and CPU consumption) by binding to the server.
The acllas__handle_group_entry function in servers/plugins/acl/acllas.c in 389 Directory Server before 1.2.10 does not properly handled access control instructions (ACIs) that use certificate groups, which allows remote authenticated LDAP users with a certificate group to cause a denial of service (infinite loop and CPU consumption) by binding to the server.
The acllas__handle_group_entry function in servers/plugins/acl/acllas. ...
The acllas__handle_group_entry function in servers/plugins/acl/acllas.c in 389 Directory Server before 1.2.10 does not properly handled access control instructions (ACIs) that use certificate groups, which allows remote authenticated LDAP users with a certificate group to cause a denial of service (infinite loop and CPU consumption) by binding to the server.