Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in redhat-ds
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in redhat-ds
ID: RHSA-2025:1632
Distribution: Red Hat
Plattformen: Red Hat Directory Server 11.5 E4S for RHEL 8
Datum: Di, 18. Februar 2025, 22:33
Referenzen: https://access.redhat.com/security/cve/CVE-2024-2199
https://access.redhat.com/security/cve/CVE-2024-1062
https://bugzilla.redhat.com/show_bug.cgi?id=2292104
https://access.redhat.com/errata/RHSA-2025:1632
https://bugzilla.redhat.com/show_bug.cgi?id=2267976
https://access.redhat.com/security/cve/CVE-2024-3657
https://access.redhat.com/security/cve/CVE-2024-5953
https://bugzilla.redhat.com/show_bug.cgi?id=2274401
https://bugzilla.redhat.com/show_bug.cgi?id=2261879
Applikationen: 389 Directory Server

Originalnachricht

An update for the redhat-ds:11 module is now available for Red Hat Directory
Server 11.5 E4S for RHEL 8.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of
packages includes the Lightweight Directory Access Protocol (LDAP) server, as well as command-line utilities and Web UI packages for server administration.

Security Fix(es):

* 389-ds-base: a heap overflow leading to denail-of-servce while writing a
value larger than 256 chars (in log_entry_attr) (CVE-2024-1062)

* 389-ds-base: Malformed userPassword may cause crash at do_modify in
slapd/modify.c (CVE-2024-2199)

* 389-ds-base: potential denial of service via specially crafted kerberos
AS-REQ request (CVE-2024-3657)

* 389-ds-base: Malformed userPassword hash may cause Denial of Service
(CVE-2024-5953)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2024-1062: Heap-based Buffer Overflow (CWE-122)
CVE-2024-2199: Improper Input Validation (CWE-20)
CVE-2024-3657: Improper Input Validation (CWE-20)
CVE-2024-5953: Improper Validation of Consistency within Input (CWE-1288)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung