Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2018-03-13 |
[1.2.11-15-94]
- Release 1.2.11.15-94
- Resolves: Bug 1544415 - CVE-2017-15135 389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c (fix cherry-pick error)
[1.2.11-15-93]
- Release 1.2.11.15-93
- Resolves: Bug 1544415 - CVE-2017-15135 389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c
- Resolves: Bug 1543798 - EMBARGOED CVE-2018-1054 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c
[1.2.11-15-92]
- Release 1.2.11.15-92
- Resolves: Bug 1543798 - EMBARGOED CVE-2018-1054 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c
CVE-2018-1054 |
CVE-2017-15135 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (i386) | 389-ds-base-1.2.11.15-94.el6_9.src.rpm | 7bef0bf4241f22e94d15a0a2dd609061 | ELBA-2018-2407 |
389-ds-base-1.2.11.15-94.el6_9.i686.rpm | d41b1257c0af09b196deb5450639c385 | ELBA-2018-2407 | |
389-ds-base-devel-1.2.11.15-94.el6_9.i686.rpm | fd1d2963309ffc2e44687fcfb396e31d | ELBA-2018-2407 | |
389-ds-base-libs-1.2.11.15-94.el6_9.i686.rpm | e6b4c6f267d89bd2e1be8b7ef0e9845c | ELBA-2018-2407 | |
Oracle Linux 6 (x86_64) | 389-ds-base-1.2.11.15-94.el6_9.src.rpm | 7bef0bf4241f22e94d15a0a2dd609061 | ELBA-2018-2407 |
389-ds-base-1.2.11.15-94.el6_9.x86_64.rpm | 6bdfdc3a8d671412d7b3ed3948c1d774 | ELBA-2018-2407 | |
389-ds-base-devel-1.2.11.15-94.el6_9.i686.rpm | fd1d2963309ffc2e44687fcfb396e31d | ELBA-2018-2407 | |
389-ds-base-devel-1.2.11.15-94.el6_9.x86_64.rpm | 2b874eea1263931de04e5aba002c0efe | ELBA-2018-2407 | |
389-ds-base-libs-1.2.11.15-94.el6_9.i686.rpm | e6b4c6f267d89bd2e1be8b7ef0e9845c | ELBA-2018-2407 | |
389-ds-base-libs-1.2.11.15-94.el6_9.x86_64.rpm | ec1d8c409e55e1a998c4fa800ab19dd8 | ELBA-2018-2407 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team