389-ds-base-1.3.6.1-26.el7
エラータID: AXSA:2018-2535:01
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* A stack buffer overflow flaw was found in the way 389-ds-base handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service. (CVE-2017-15134)
Bug Fix(es):
* Previously, when a connection received a high operation rate, Directory Server stopped to poll the connection in certain situations. As a consequence, new requests on the connection were not detected and processed. With this update, Directory Server correctly decides whether a connection has to be polled. As a result, connections with a high request rate no longer remain unprocessed. (BZ#1523505)
* Previously, if Directory Server was stopped during an operation which created additional changes in the memory changelog, the Replication Update Vector (RUV) in the changelog was higher than the RUV in the database. As a consequence, Directory Server recreated the changelog when the server started. With this update, the server now writes the highest RUV to the changelog only if there is the highest Change Sequence Number (CSN) present in it. As a result, the database and the changelog RUV are consistent and the server does not need recreating the changelog at start up. (BZ#1523507)
* Due to a bug, using a large number of Class of Service (CoS) templates in Directory Server increased the virtual attribute processing time. This update improves the structure of the CoS storage. As a result, using a large number of CoS templates no longer increases the virtual attribute processing time. (BZ#1526928)
CVE-2017-15134
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
Update packages.
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
N/A
SRPMS
- 389-ds-base-1.3.6.1-26.el7.src.rpm
MD5: 7b7a144ac510a7ef2b32818f9ee0b714
SHA-256: 864ece56ce4a98ae07b30fab25f6b04f537786d2517c46aeca67580624d6b06b
Size: 3.63 MB
Asianux Server 7 for x86_64
- 389-ds-base-1.3.6.1-26.el7.x86_64.rpm
MD5: 0b3c3fe8bb655db0be560d7047ce9140
SHA-256: fc3c1d62a620a637ffbb9a3ae4ae39195373b023b79fd7f377707011cc301d59
Size: 1.70 MB - 389-ds-base-libs-1.3.6.1-26.el7.x86_64.rpm
MD5: 23612c4b5ea38275c14789e21dcea939
SHA-256: 67f1048517f9836afdfd319f9ee8f992b996b7d58771eb00407df6e8b2fd6776
Size: 679.91 kB