ALT-BU-2019-4108-1
Branch c8.1 update bulletin.
Package 389-ds-base updated to version 1.3.9.1-alt1.gitb6ba77876 for branch c8.1 in task 240868.
Closed vulnerabilities
BDU:2020-02774
Уязвимость функции log__error_emergency() сервера службы каталогов 389 Directory Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02901
Уязвимость службы каталогов уровня предприятия 389 Directory Server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05827
Уязвимость плагина deref сервера службы каталогов 389 Directory Server, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2017-15134
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
- openSUSE-SU-2019:1397
- openSUSE-SU-2019:1397
- 102790
- 102790
- RHSA-2018:0163
- RHSA-2018:0163
- https://bugzilla.redhat.com/show_bug.cgi?id=1531573
- https://bugzilla.redhat.com/show_bug.cgi?id=1531573
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update
- https://pagure.io/389-ds-base/c/6aa2acdc3cad9
- https://pagure.io/389-ds-base/c/6aa2acdc3cad9
Modified: 2024-11-21
CVE-2017-2668
389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.
Modified: 2024-11-21
CVE-2018-10871
389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.
- RHSA-2019:3401
- RHSA-2019:3401
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10871
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10871
- [debian-lts-announce] 20180830 [SECURITY] [DLA 1483-1] 389-ds-base security update
- [debian-lts-announce] 20180830 [SECURITY] [DLA 1483-1] 389-ds-base security update
- https://pagure.io/389-ds-base/issue/49789
- https://pagure.io/389-ds-base/issue/49789
Modified: 2024-11-21
CVE-2018-1089
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
- 104137
- 104137
- RHSA-2018:1364
- RHSA-2018:1364
- RHSA-2018:1380
- RHSA-2018:1380
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update
Modified: 2024-11-21
CVE-2018-14624
A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.
- openSUSE-SU-2019:1397
- RHSA-2018:2757
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14624
- [debian-lts-announce] 20180929 [SECURITY] [DLA 1526-1] 389-ds-base security update
- https://pagure.io/389-ds-base/issue/49937
- openSUSE-SU-2019:1397
- https://pagure.io/389-ds-base/issue/49937
- [debian-lts-announce] 20180929 [SECURITY] [DLA 1526-1] 389-ds-base security update
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14624
- RHSA-2018:2757
Modified: 2024-11-21
CVE-2018-14638
A flaw was found in 389-ds-base before version 1.3.8.4-13. The process ns-slapd crashes in delete_passwdPolicy function when persistent search connections are terminated unexpectedly leading to remote denial of service.
Modified: 2024-11-21
CVE-2019-14824
A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes.
- RHSA-2019:3981
- RHSA-2019:3981
- RHSA-2020:0464
- RHSA-2020:0464
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14824
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14824
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2004-1] 389-ds-base security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2004-1] 389-ds-base security update
- https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html
Closed bugs
Паразитарная вставка в agent_trap.h и snmp_agent.h
Команды start-dirsrv и stop-dirsrv вызывают /usr/bin/systemctl, а у нас /bin/systemctl
При установке пакета 389-ds-base не создается пользователь "dirsrv"
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-10195
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.
- RHBA-2019:4268
- RHBA-2019:4268
- RHSA-2020:0378
- RHSA-2020:0378
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195
- FEDORA-2019-c64e1612f5
- FEDORA-2019-c64e1612f5
- FEDORA-2019-8e9093da55
- FEDORA-2019-8e9093da55
- https://www.freeipa.org/page/Releases/4.6.7
- https://www.freeipa.org/page/Releases/4.6.7
- https://www.freeipa.org/page/Releases/4.7.4
- https://www.freeipa.org/page/Releases/4.7.4
- https://www.freeipa.org/page/Releases/4.8.3
- https://www.freeipa.org/page/Releases/4.8.3
Modified: 2024-11-21
CVE-2019-14867
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server.
- RHBA-2019:4268
- RHBA-2019:4268
- RHSA-2020:0378
- RHSA-2020:0378
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14867
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14867
- FEDORA-2019-c64e1612f5
- FEDORA-2019-c64e1612f5
- FEDORA-2019-8e9093da55
- FEDORA-2019-8e9093da55
- https://www.freeipa.org/page/Releases/4.6.7
- https://www.freeipa.org/page/Releases/4.6.7
- https://www.freeipa.org/page/Releases/4.7.4
- https://www.freeipa.org/page/Releases/4.7.4
- https://www.freeipa.org/page/Releases/4.8.3
- https://www.freeipa.org/page/Releases/4.8.3