Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-0126

Опубликовано: 03 фев. 2014
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2014-0126: openldap security and bug fix update (MODERATE)

[2.4.23-34.1]

  • fix: segfault on certain queries with rwm overlay (#1058250)

[2.4.23-34]

  • fix: deadlock during SSL_ForceHandshake (#996373)
    • revert nss-handshake-threadsafe.patch

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

openldap

2.4.23-34.el6_5.1

openldap-clients

2.4.23-34.el6_5.1

openldap-devel

2.4.23-34.el6_5.1

openldap-servers

2.4.23-34.el6_5.1

openldap-servers-sql

2.4.23-34.el6_5.1

Oracle Linux i686

openldap

2.4.23-34.el6_5.1

openldap-clients

2.4.23-34.el6_5.1

openldap-devel

2.4.23-34.el6_5.1

openldap-servers

2.4.23-34.el6_5.1

openldap-servers-sql

2.4.23-34.el6_5.1

Связанные CVE

Связанные уязвимости

ubuntu
больше 11 лет назад

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

redhat
почти 12 лет назад

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

nvd
больше 11 лет назад

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

debian
больше 11 лет назад

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not prope ...

github
больше 3 лет назад

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.