Описание
ELSA-2014-0126: openldap security and bug fix update (MODERATE)
[2.4.23-34.1]
- fix: segfault on certain queries with rwm overlay (#1058250)
[2.4.23-34]
- fix: deadlock during SSL_ForceHandshake (#996373)
- revert nss-handshake-threadsafe.patch
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
openldap
2.4.23-34.el6_5.1
openldap-clients
2.4.23-34.el6_5.1
openldap-devel
2.4.23-34.el6_5.1
openldap-servers
2.4.23-34.el6_5.1
openldap-servers-sql
2.4.23-34.el6_5.1
Oracle Linux i686
openldap
2.4.23-34.el6_5.1
openldap-clients
2.4.23-34.el6_5.1
openldap-devel
2.4.23-34.el6_5.1
openldap-servers
2.4.23-34.el6_5.1
openldap-servers-sql
2.4.23-34.el6_5.1
Связанные CVE
Связанные уязвимости
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not prope ...
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.