Описание
ELSA-2018-3127: 389-ds-base security, bug fix, and enhancement update (MODERATE)
[1.3.8.4-15]
- Bump version to 1.3.8.4-15
- Resolves: Bug 1624004 - Fix regression in last patch
[1.3.8.4-14]
- Bump version to 1.3.8.4-14
- Resolves: Bug 1624004 - potential denial of service attack
[1.3.8.4-13]
- Bump version to 1.3.8.4-13
- Resolves: Bug 1623949 - Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly
[1.3.8.4-12]
- Bump version to 1.3.8.4-12
- Resolves: Bug 1616412 - filter optimization fix causes regression(fix reverted)
[1.3.8.4-11]
- Bump version to 1.3.8.4-11
- Resolves: Bug 1614820 - Server crash through modify command with large DN
[1.3.8.4-10]
- Bump verison to 1.3.8.4-10
- Resolves: Bug 1614501 - Disable nunc-stans by default
- Resolves: Bug 1607078 - ldapsearch with server side sort crashes the ldap server
[1.3.8.4-9]
- Bump version to 1.3.8.4-9
- Resolves: Bug 1594484 - setup-ds.pl not able to handle/create the user 'dirsrv' if there is an already existing user with the UID/GID 389 on the machine.
[1.3.8.4-8]
- Bump version to 1.3.8.4-8
- Resolves: Bug 1594484 - setup-ds.pl not able to handle/create the user 'dirsrv' if there is an already existing user with the UID/GID 389 on the machine.
[1.3.8.4-7]
- Bump version to 1.3.8.4-7
- Resolves: Bug 1595766 - backout this fix for now because it breaks FreeIPA (removed patch file all together)
[1.3.8.4-6]
- Bump version to 1.3.8.4-6
- Resolves: Bug 1595766 - backout this fix for now because it breaks FreeIPA
[1.3.8.4-5]
- Bump version to 1.3.8.4-5
- Resolves: Bug 1595766 - CVE-2018-10871 389-ds-base: replication and the Retro Changelog plugin store plaintext password by default
[1.3.8.4-4]
- Bump version to 1.3.8.4-4
- Resolves: Bug 1597384 - Async operations can hang when the server is running nunc-stans
- Resolves: Bug 1598186 - A search with the scope 'one' returns a non-matching entry
- Resolves: Bug 1598718 - import fails if backend name is 'default'
- Resolves: Bug 1598478 - If a replica is created with a bindDNGroup, this group is taken into account only after bindDNGroupCheckInterval seconds
- Resolves: Bug 1525256 - Invalid SNMP MIB for 389 DS
- Resolves: Bug 1597518 - ds-replcheck command returns traceback errors against ldif files having garbage content when run in offline mode
[1.3.8.4-3]
- Bump version to 1.3.8.4-3
- Resolves: Bug 1594484 - setup-ds.pl not able to handle/create the user 'dirsrv' if there is an already existing user with the UID/GID 389 on the machine.
[1.3.8.4-2]
- Bump version to 1.3.8.4-2
- Resolves: Bug 1594484 - setup-ds.pl not able to handle/create the user 'dirsrv' if there is an already existing user with the UID/GID 389 on the machine.
[1.3.8.4-1]
- Bump version to 1.3.8.4-1
- Resolves: Bug 1560653 - Rebase 389-ds-base in RHEL 7.6 to 1.3.8
[1.3.8.2-1]
- Bump version to 1.3.8.2-1
- Resolves: Bug 1560653 - Rebase 389-ds-base in RHEL 7.6 to 1.3.8
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
389-ds-base
1.3.8.4-15.el7
389-ds-base-devel
1.3.8.4-15.el7
389-ds-base-libs
1.3.8.4-15.el7
389-ds-base-snmp
1.3.8.4-15.el7
Oracle Linux x86_64
389-ds-base
1.3.8.4-15.el7
389-ds-base-devel
1.3.8.4-15.el7
389-ds-base-libs
1.3.8.4-15.el7
389-ds-base-snmp
1.3.8.4-15.el7
Связанные CVE
Связанные уязвимости
A flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive CPU consumption in the do_search() function. An unauthenticated attacker could use this flaw to provoke a denial of service.
A flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive CPU consumption in the do_search() function. An unauthenticated attacker could use this flaw to provoke a denial of service.
A flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive CPU consumption in the do_search() function. An unauthenticated attacker could use this flaw to provoke a denial of service.
A flaw was found in 389 Directory Server. A specially crafted search q ...
A flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive CPU consumption in the do_search() function. An unauthenticated attacker could use this flaw to provoke a denial of service.