Описание
ELSA-2014-0206: openldap security update (MODERATE)
[2.3.43-27]
- fix: CVE-2013-4449 segfault on certain queries with rwm overlay (#1064145)
[2.3.43-26]
- fix: do not send IPv6 DNS queries when IPv6 is disabled on the host (#812772)
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
compat-openldap
2.3.43_2.2.29-27.el5_10
openldap
2.3.43-27.el5_10
openldap-clients
2.3.43-27.el5_10
openldap-devel
2.3.43-27.el5_10
openldap-servers
2.3.43-27.el5_10
openldap-servers-overlays
2.3.43-27.el5_10
openldap-servers-sql
2.3.43-27.el5_10
Oracle Linux x86_64
compat-openldap
2.3.43_2.2.29-27.el5_10
openldap
2.3.43-27.el5_10
openldap-clients
2.3.43-27.el5_10
openldap-devel
2.3.43-27.el5_10
openldap-servers
2.3.43-27.el5_10
openldap-servers-overlays
2.3.43-27.el5_10
openldap-servers-sql
2.3.43-27.el5_10
Oracle Linux i386
compat-openldap
2.3.43_2.2.29-27.el5_10
openldap
2.3.43-27.el5_10
openldap-clients
2.3.43-27.el5_10
openldap-devel
2.3.43-27.el5_10
openldap-servers
2.3.43-27.el5_10
openldap-servers-overlays
2.3.43-27.el5_10
openldap-servers-sql
2.3.43-27.el5_10
Связанные CVE
Связанные уязвимости
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not prope ...
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.