Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:2595

Опубликовано: 29 июн. 2021
Источник: rocky
Оценка: Moderate

Описание

Moderate: 389-ds:1.4 security and bug fix update

389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.

Security Fix(es):

  • 389-ds-base: sync_repl NULL pointer dereference in sync_create_state_control() (CVE-2021-3514)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • ACIs are being evaluated against the Replication Manager account in a replication context. (BZ#1968588)

  • A connection can be erroneously flagged as replication conn during evaluation of an aci with ip bind rule (BZ#1970791)

  • Large updates can reset the CLcache to the beginning of the changelog (BZ#1972721)

  • Changelog cache can upload updates from a wrong starting point (CSN) (BZ#1972738)

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
389-ds-base-libsx86_6416.module+el8.4.0+596+159889e5389-ds-base-libs-1.4.3.16-16.module+el8.4.0+596+159889e5.x86_64.rpm
389-ds-base-develx86_6416.module+el8.4.0+596+159889e5389-ds-base-devel-1.4.3.16-16.module+el8.4.0+596+159889e5.x86_64.rpm
389-ds-base-snmpx86_6416.module+el8.4.0+596+159889e5389-ds-base-snmp-1.4.3.16-16.module+el8.4.0+596+159889e5.x86_64.rpm
python3-lib389noarch16.module+el8.4.0+596+159889e5python3-lib389-1.4.3.16-16.module+el8.4.0+596+159889e5.noarch.rpm
389-ds-basex86_6416.module+el8.4.0+596+159889e5389-ds-base-1.4.3.16-16.module+el8.4.0+596+159889e5.x86_64.rpm
389-ds-base-legacy-toolsx86_6416.module+el8.4.0+596+159889e5389-ds-base-legacy-tools-1.4.3.16-16.module+el8.4.0+596+159889e5.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 4 лет назад

When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash.

CVSS3: 6.5
redhat
больше 4 лет назад

When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash.

CVSS3: 6.5
nvd
больше 4 лет назад

When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash.

CVSS3: 6.5
debian
больше 4 лет назад

When using a sync_repl client in 389-ds-base, an authenticated attacke ...

suse-cvrf
больше 4 лет назад

Security update for 389-ds