ELSA-2018-0515

ELSA-2018-0515 - 389-ds-base security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2018-03-13

Description


[1.2.11-15-94]
- Release 1.2.11.15-94
- Resolves: Bug 1544415 - CVE-2017-15135 389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c (fix cherry-pick error)

[1.2.11-15-93]
- Release 1.2.11.15-93
- Resolves: Bug 1544415 - CVE-2017-15135 389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c
- Resolves: Bug 1543798 - EMBARGOED CVE-2018-1054 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c

[1.2.11-15-92]
- Release 1.2.11.15-92
- Resolves: Bug 1543798 - EMBARGOED CVE-2018-1054 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c


Related CVEs


CVE-2018-1054
CVE-2017-15135

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) 389-ds-base-1.2.11.15-94.el6_9.src.rpm7bef0bf4241f22e94d15a0a2dd609061ELBA-2018-2407
389-ds-base-1.2.11.15-94.el6_9.i686.rpmd41b1257c0af09b196deb5450639c385ELBA-2018-2407
389-ds-base-devel-1.2.11.15-94.el6_9.i686.rpmfd1d2963309ffc2e44687fcfb396e31dELBA-2018-2407
389-ds-base-libs-1.2.11.15-94.el6_9.i686.rpme6b4c6f267d89bd2e1be8b7ef0e9845cELBA-2018-2407
Oracle Linux 6 (x86_64) 389-ds-base-1.2.11.15-94.el6_9.src.rpm7bef0bf4241f22e94d15a0a2dd609061ELBA-2018-2407
389-ds-base-1.2.11.15-94.el6_9.x86_64.rpm6bdfdc3a8d671412d7b3ed3948c1d774ELBA-2018-2407
389-ds-base-devel-1.2.11.15-94.el6_9.i686.rpmfd1d2963309ffc2e44687fcfb396e31dELBA-2018-2407
389-ds-base-devel-1.2.11.15-94.el6_9.x86_64.rpm2b874eea1263931de04e5aba002c0efeELBA-2018-2407
389-ds-base-libs-1.2.11.15-94.el6_9.i686.rpme6b4c6f267d89bd2e1be8b7ef0e9845cELBA-2018-2407
389-ds-base-libs-1.2.11.15-94.el6_9.x86_64.rpmec1d8c409e55e1a998c4fa800ab19dd8ELBA-2018-2407



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete