[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2013-0628 -- Oracle 389-ds-base

ID: oval:org.secpod.oval:def:1500117Date: (C)2013-03-20   (M)2022-10-10
Class: PATCHFamily: unix




Updated 389-ds-base packages that fix one security issue and multiple bugsare now available for Red Hat Enterprise Linux 6.The Red Hat Security Response Team has rated this update as having moderatesecurity impact. A Common Vulnerability Scoring System base score,which gives a detailed severity rating, is available from the CVE link inthe References section. The 389 Directory Server is an LDAPv3 compliant server. The base packagesinclude the Lightweight Directory Access Protocol server andcommand-line utilities for server administration.A flaw was found in the way LDAPv3 control data was handled by 389Directory Server. If a malicious user were able to bind to the directory and send an LDAP request containing crafted LDAPv3control data, they could cause the server to crash, denying service to thedirectory. The CVE-2013-0312 issue was discovered by Thierry Bordaz of Red Hat.This update also fixes the following bugs:* After an upgrade from Red Hat Enterprise Linux 6.3 to version 6.4, theupgrade script did not update the schema file for the PamConfig objectclass. Consequently, new features for PAM such as configuration of multipleinstances and pamFilter attribute could not be used because of the schemaviolation. With this update, the upgrade script updates the schema file forthe PamConfig object class and new features function properly. * Previously, the valgrind test suite reported recurring memory leaks inthe modify_update_last_modified_attr function. The size of the leaksaveraged between 60-80 bytes per modify call. In environments where modifyoperations were frequent, this caused significant problems. Now, memoryleaks no longer occur in the modify_update_last_modified_attr function.* The Directory Server failed when multi-valued attributes werereplaced. The problem occurred when replication was enabled, while theserver executing the modification was configured as a single master andthere was at least one replication agreement. Consequently, themodification requests were refused by the master server, which returned acode 20 "Type or value exists" error message. These requests werereplacements of multi-valued attributes, and the error only occurred whenone of the new values matched one of the current values of the attribute,but had a different letter case. Now, modification requests functionproperly and no longer return code 20 errors. * The DNA plug-in, under certainconditions, could log error messages with the "DB_LOCK_DEADLOCK" errorcode when attempting to create an entry with a uidNumber attribute. Now,DNA handles this case properly and errors no longer occur during attemptsto create entries with uidNumber attributes. * Posix Winsync plugin was calling an internal modify function which wasnot necessary. The internal modify call failed and logged an error message"slapi_modify_internal_set_pb: NULL parameter" which was not clear. Thispatch stops calling the internal modify function if it is not necessary andthe cryptic error message is not observed. * Previously, under certain conditions, the dse.ldif file had 0 bytes aftera server termination or when the machine was powered off. Consequently,after the system was brought up, a DS or IdM system could be unable torestart, leading to production server outages. Now, the server mechanism bywhich the dse.ldif is written is more robust, and tries all availablebackup dse.ldif files, and outages no longer occur. * Due to an incorrect interpretation of an error code, a directory serverconsidered an invalid chaining configuration setting as the disk full errorand shut down unexpectedly. Now, a more appropriate error code is in useand the server no longer shuts down from invalid chaining configuration settings. * While trying to remove a tombstone entry, the ns-slapd daemon terminatedunexpectedly with a segmentation fault. With this update, removal oftombstone entries no longer causes crashes. All 389-ds-base users are advised to upgrade to these updated packages,which contain backported patches to correct these issues. After installingthis update, the 389 server service will be restarted automatically.

Platform:
Oracle Linux 6
Product:
389-ds-base
Reference:
ELSA-2013-0628
CVE-2013-0312
CVE    1
CVE-2013-0312
CPE    3
cpe:/a:fedoraproject:389_directory_server
cpe:/o:oracle:linux:6
cpe:/a:fedoraproject:389_directory_server:1.3.0.3

© SecPod Technologies