Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-0206

Опубликовано: 24 фев. 2014
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2014-0206: openldap security update (MODERATE)

[2.3.43-27]

  • fix: CVE-2013-4449 segfault on certain queries with rwm overlay (#1064145)

[2.3.43-26]

  • fix: do not send IPv6 DNS queries when IPv6 is disabled on the host (#812772)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

compat-openldap

2.3.43_2.2.29-27.el5_10

openldap

2.3.43-27.el5_10

openldap-clients

2.3.43-27.el5_10

openldap-devel

2.3.43-27.el5_10

openldap-servers

2.3.43-27.el5_10

openldap-servers-overlays

2.3.43-27.el5_10

openldap-servers-sql

2.3.43-27.el5_10

Oracle Linux x86_64

compat-openldap

2.3.43_2.2.29-27.el5_10

openldap

2.3.43-27.el5_10

openldap-clients

2.3.43-27.el5_10

openldap-devel

2.3.43-27.el5_10

openldap-servers

2.3.43-27.el5_10

openldap-servers-overlays

2.3.43-27.el5_10

openldap-servers-sql

2.3.43-27.el5_10

Oracle Linux i386

compat-openldap

2.3.43_2.2.29-27.el5_10

openldap

2.3.43-27.el5_10

openldap-clients

2.3.43-27.el5_10

openldap-devel

2.3.43-27.el5_10

openldap-servers

2.3.43-27.el5_10

openldap-servers-overlays

2.3.43-27.el5_10

openldap-servers-sql

2.3.43-27.el5_10

Связанные CVE

Связанные уязвимости

ubuntu
больше 11 лет назад

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

redhat
почти 12 лет назад

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

nvd
больше 11 лет назад

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.

debian
больше 11 лет назад

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not prope ...

github
больше 3 лет назад

The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.