Mageia 2019-0411: 389-ds-base security update
Summary
he updated packages fix security vulnerabilities and a packaging problem:
An out-of-bounds memory read flaw was found in the way 389-ds-base handled
certain LDAP search filters, affecting all versions including 1.4.x. A
remote, unauthenticated attacker could potentially use this flaw to make
ns-slapd crash via a specially crafted LDAP request, thus resulting in
denial of service. (CVE-2018-1054)
389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext
Storage of Sensitive Information. By default, when the Replica and/or
retroChangeLog plugins are enabled, 389-ds-base stores passwords in
plaintext format in their respective changelog files. An attacker with
sufficiently high privileges, such as root or Directory Manager, can
query these files in order to retrieve plaintext passwords.
(CVE-2018-10871)
In 389-ds-base up to version 1.4.1.2, requests are handled by workersthreads. Each sockets will be waited by the worker for at most
'ioblocktimeout' seconds. However th...
References
- https://bugs.mageia.org/show_bug.cgi?id=25824
- https://bugs.mageia.org/show_bug.cgi?id=25709
- http://lists.suse.com/pipermail/sle-security-updates/2019-August/005817.html
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1054
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10871
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3883
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14824
Resolution
MGASA-2019-0411 - Updated 389-ds-base packages fix security vulnerabilities
SRPMS
- 7/core/389-ds-base-1.4.0.26-1.1.mga7