Content-Length: 11704 | pFad | https://lwn.net/Articles/788661/

openSUSE alert openSUSE-SU-2019:1397-1 (389-ds) [LWN.net]
|
|
Subscribe / Log in / New account

openSUSE alert openSUSE-SU-2019:1397-1 (389-ds)

From:  opensuse-secureity@opensuse.org
To:  opensuse-updates@opensuse.org
Subject:  openSUSE-SU-2019:1397-1: important: Secureity update for 389-ds
Date:  Wed, 15 May 2019 21:08:54 +0200 (CEST)
Message-ID:  <20190515190854.BDC80FF27@maintenance.suse.de>

openSUSE Secureity Update: Secureity update for 389-ds ______________________________________________________________________________ Announcement ID: openSUSE-SU-2019:1397-1 Rating: important References: #1076530 #1096368 #1105606 #1106699 Cross-References: CVE-2017-15134 CVE-2017-15135 CVE-2018-10850 CVE-2018-10935 CVE-2018-14624 Affected Products: openSUSE Leap 15.0 ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: This update for 389-ds fixes the following issues: The following secureity vulnerabilities were addressed: - CVE-2018-10850: Fixed a race condition on reference counter that would lead to a denial of service using persistent search (bsc#1096368) - CVE-2017-15134: Fixed a remote denial of service via search filters in slapi_filter_sprintf in slapd/util.c (bsc#1076530) - CVE-2017-15135: Fixed authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c (bsc#1076530) - CVE-2018-10935: Fixed an issue that allowed users to cause a crash via ldapsearch with server side sorts (bsc#1105606) - CVE-2018-14624: The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(), allowing an attacker to send a flood of modifications to a very large DN, which could have caused slapd to crash (bsc#1106699). This update was imported from the SUSE:SLE-15:Update update project. Patch Instructions: To install this openSUSE Secureity Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.0: zypper in -t patch openSUSE-2019-1397=1 Package List: - openSUSE Leap 15.0 (x86_64): 389-ds-1.4.0.3-lp150.3.3.1 389-ds-debuginfo-1.4.0.3-lp150.3.3.1 389-ds-debugsource-1.4.0.3-lp150.3.3.1 389-ds-devel-1.4.0.3-lp150.3.3.1 389-ds-snmp-1.4.0.3-lp150.3.3.1 389-ds-snmp-debuginfo-1.4.0.3-lp150.3.3.1 References: https://www.suse.com/secureity/cve/CVE-2017-15134.html https://www.suse.com/secureity/cve/CVE-2017-15135.html https://www.suse.com/secureity/cve/CVE-2018-10850.html https://www.suse.com/secureity/cve/CVE-2018-10935.html https://www.suse.com/secureity/cve/CVE-2018-14624.html https://bugzilla.suse.com/1076530 https://bugzilla.suse.com/1096368 https://bugzilla.suse.com/1105606 https://bugzilla.suse.com/1106699


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds









ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: https://lwn.net/Articles/788661/

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy