SUSE-SU-2019:1207-2

Source
https://www.suse.com/support/update/announcement/2019/suse-su-20191207-2/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2019:1207-2.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2019:1207-2
Related
Published
2019-07-01T13:04:11Z
Modified
2019-07-01T13:04:11Z
Summary
Security update for 389-ds
Details

This update for 389-ds fixes the following issues:

The following security vulnerabilities were addressed:

  • CVE-2018-10850: Fixed a race condition on reference counter that would lead to a denial of service using persistent search (bsc#1096368)
  • CVE-2017-15134: Fixed a remote denial of service via search filters in slapifiltersprintf in slapd/util.c (bsc#1076530)
  • CVE-2017-15135: Fixed authentication bypass due to lack of size check in slapictmemcmp function in ch_malloc.c (bsc#1076530)
  • CVE-2018-10935: Fixed an issue that allowed users to cause a crash via ldapsearch with server side sorts (bsc#1105606)
  • CVE-2018-14624: The lock controlling the error log was not correctly used when re-opening the log file in log_erroremergency(), allowing an attacker to send a flood of modifications to a very large DN, which could have caused slapd to crash (bsc#1106699).
References

Affected packages

SUSE:Linux Enterprise Module for Server Applications 15 SP1 / 389-ds

Package

Name
389-ds
Purl
pkg:rpm/suse/389-ds&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.0.3-4.7.52

Ecosystem specific

{
    "binaries": [
        {
            "389-ds": "1.4.0.3-4.7.52",
            "389-ds-devel": "1.4.0.3-4.7.52"
        }
    ]
}