Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2017-2569

Опубликовано: 05 сент. 2017
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2017-2569: 389-ds-base security and bug fix update (MODERATE)

[1.3.6.19-1]

  • Bump version to 1.3.6.19-1
  • Remove old mozldap and db4 requirements
  • Resolves: Bug 1483865 - Crash while binding to a server during replication online init

[1.3.6.1-18]

  • Bump version to 1.3.6.1-18
  • Require srvcore 4.1.3
  • Resolves: Bug 1479757 - dse.ldif and fsync
  • Resolves: Bug 1479755 - backup fails if changelog is enabled
  • Resolves: Bug 1479756 - Locked account provides different return code if password is correct

[1.3.6.1-17]

  • Bump version to 1.3.6.1-17
  • Resolves: Bug 1476161 - replication halt - pending list first CSN not committed, pending list increasing
  • Resolves: Bug 1476162 - Change the retrochangelog default cache size

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

389-ds-base

1.3.6.1-19.el7_4

389-ds-base-devel

1.3.6.1-19.el7_4

389-ds-base-libs

1.3.6.1-19.el7_4

389-ds-base-snmp

1.3.6.1-19.el7_4

Связанные CVE

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

389-ds-base version before 1.3.5.19 and 1.3.6.7 are vulnerable to password brute-force attacks during account lockout due to different return codes returned on password attempts.

CVSS3: 5.3
redhat
больше 8 лет назад

389-ds-base version before 1.3.5.19 and 1.3.6.7 are vulnerable to password brute-force attacks during account lockout due to different return codes returned on password attempts.

CVSS3: 9.8
nvd
около 8 лет назад

389-ds-base version before 1.3.5.19 and 1.3.6.7 are vulnerable to password brute-force attacks during account lockout due to different return codes returned on password attempts.

CVSS3: 9.8
debian
около 8 лет назад

389-ds-base version before 1.3.5.19 and 1.3.6.7 are vulnerable to pass ...

CVSS3: 9.8
github
больше 3 лет назад

389-ds-base version before 1.3.5.19 and 1.3.6.7 are vulnerable to password brute-force attacks during account lockout due to different return codes returned on password attempts.