openSUSE: 2019:1397-1: important: 389-ds

    Date15 May 2019
    CategoryopenSUSE
    372
    Posted ByLinuxSecurity Advisories
    An update that fixes 5 vulnerabilities is now available.
       openSUSE Security Update: Security update for 389-ds
    ______________________________________________________________________________
    
    Announcement ID:    openSUSE-SU-2019:1397-1
    Rating:             important
    References:         #1076530 #1096368 #1105606 #1106699 
    Cross-References:   CVE-2017-15134 CVE-2017-15135 CVE-2018-10850
                        CVE-2018-10935 CVE-2018-14624
    Affected Products:
                        openSUSE Leap 15.0
    ______________________________________________________________________________
    
       An update that fixes 5 vulnerabilities is now available.
    
    Description:
    
       This update for 389-ds fixes the following issues:
    
       The following security vulnerabilities were addressed:
    
       - CVE-2018-10850: Fixed a race condition on reference counter that would
         lead to a denial of service using persistent search (bsc#1096368)
       - CVE-2017-15134: Fixed a remote denial of service via search filters in
         slapi_filter_sprintf in slapd/util.c (bsc#1076530)
       - CVE-2017-15135: Fixed authentication bypass due to lack of size check in
         slapi_ct_memcmp function in ch_malloc.c (bsc#1076530)
       - CVE-2018-10935: Fixed an issue that allowed users to cause a crash via
         ldapsearch with server side sorts (bsc#1105606)
       - CVE-2018-14624: The lock controlling the error log was not correctly
         used when re-opening the log file in log__error_emergency(), allowing an
         attacker to send a flood of modifications to a very large DN, which
         could have caused slapd to crash (bsc#1106699).
    
       This update was imported from the SUSE:SLE-15:Update update project.
    
    
    Patch Instructions:
    
       To install this openSUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - openSUSE Leap 15.0:
    
          zypper in -t patch openSUSE-2019-1397=1
    
    
    
    Package List:
    
       - openSUSE Leap 15.0 (x86_64):
    
          389-ds-1.4.0.3-lp150.3.3.1
          389-ds-debuginfo-1.4.0.3-lp150.3.3.1
          389-ds-debugsource-1.4.0.3-lp150.3.3.1
          389-ds-devel-1.4.0.3-lp150.3.3.1
          389-ds-snmp-1.4.0.3-lp150.3.3.1
          389-ds-snmp-debuginfo-1.4.0.3-lp150.3.3.1
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2017-15134.html
       https://www.suse.com/security/cve/CVE-2017-15135.html
       https://www.suse.com/security/cve/CVE-2018-10850.html
       https://www.suse.com/security/cve/CVE-2018-10935.html
       https://www.suse.com/security/cve/CVE-2018-14624.html
       https://bugzilla.suse.com/1076530
       https://bugzilla.suse.com/1096368
       https://bugzilla.suse.com/1105606
       https://bugzilla.suse.com/1106699
    
    -- 
    

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"6","type":"x","order":"1","pct":60,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":30,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":10,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.