Описание
ELSA-2018-0163: 389-ds-base security and bug fix update (IMPORTANT)
[1.3.6.1-26]
- Bump version to 1.3.6.1-25
- Resolves: Bug 1534430 - crash in slapi_filter_sprintf
[1.3.6.1-25]
- Bump version to 1.3.6.1-25
- Resolves: Bug 1526928 - search with CoS attribute is getting slower after modifying/adding CosTemplate
- Resolves: Bug 1523505 - opened connection are hanging, no longer poll
- Resolves: Bug 1523507 - IPA server replication broken, after DS stop-start, due to changelog reset
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
389-ds-base
1.3.6.1-26.el7_4
389-ds-base-devel
1.3.6.1-26.el7_4
389-ds-base-libs
1.3.6.1-26.el7_4
389-ds-base-snmp
1.3.6.1-26.el7_4
Oracle Linux x86_64
389-ds-base
1.3.6.1-26.el7_4
389-ds-base-devel
1.3.6.1-26.el7_4
389-ds-base-libs
1.3.6.1-26.el7_4
389-ds-base-snmp
1.3.6.1-26.el7_4
Связанные CVE
Связанные уязвимости
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x ...
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.