Package: 389-ds-base / 2.3.1+dfsg1-1+deb12u1
Metadata
| Package | Version | Patches format |
|---|---|---|
| 389-ds-base | 2.3.1+dfsg1-1+deb12u1 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| fix saslpath.diff | (download) |
configure.ac |
4 3 + 1 - 0 ! |
--- |
| 5610 fix linking.diff | (download) |
Makefile.am |
6 3 + 3 - 0 ! |
Move -lssl and -lcrypto for libslapd.so from LDFLAGS to LIBADD. Fixes: https://github.com/389ds/389-ds-base/issues/5610 Reviewed by: ??? |
| dont run rpm.diff | (download) |
src/lib389/lib389/cli_ctl/cockpit.py |
18 11 + 7 - 0 ! |
--- |
| use packaged rust registry.diff | (download) |
.cargo/config.in |
2 1 + 1 - 0 ! |
--- |
| allow newer crates.diff | (download) |
Makefile.am |
2 1 + 1 - 0 ! |
--- |
| CVE 2024 2199.patch | (download) |
dirsrvtests/tests/suites/password/password_test.py |
56 56 + 0 - 0 ! |
When doing a mod on userPassword we reset the pblock modifier after we set the modified timestamp, ensuring the pblock data stays valid. References: - https://nvd.nist.gov/vuln/detail/CVE-2024-2199 - https://access.redhat.com/security/cve/CVE-2024-2199 - https://bugzilla.redhat.com/show_bug.cgi?id=2267976 |
| CVE 2024 8445.patch | (download) |
ldap/servers/slapd/modify.c |
1 1 + 0 - 0 ! |
The fix for CVE-2024-2199 in 389-ds-base was insufficient to cover all scenarios. In certain product versions, this issue may allow an authenticated user to cause a server crash while modifying `userPassword` using malformed input. References: - https://access.redhat.com/security/cve/CVE-2024-8445 - https://nvd.nist.gov/vuln/detail/cve-2024-8445 - https://bugzilla.redhat.com/show_bug.cgi?id=2310110 - https://nvd.nist.gov/vuln/detail/CVE-2024-2199 - https://access.redhat.com/security/cve/CVE-2024-2199 - https://bugzilla.redhat.com/show_bug.cgi?id=2267976 |
| CVE 2024 5953.patch | (download) |
dirsrvtests/tests/suites/password/regression_test.py |
51 50 + 1 - 0 ! |
To prevent buffer overflow when a bind request is processed, the bind fails if the hash size is not coherent without even attempting to process further the hashed password. References: - https://nvd.nist.gov/vuln/detail/CVE-2024-5953 - https://access.redhat.com/security/cve/CVE-2024-5953 - https://bugzilla.redhat.com/show_bug.cgi?id=2292104 |
| CVE 2024 3657.patch | (download) |
dirsrvtests/tests/suites/filter/large_filter_test.py |
39 38 + 1 - 0 ! |
The code was modified to avoid a buffer overflow when logging some requests in the audit log. References: - https://nvd.nist.gov/vuln/detail/CVE-2024-3657 - https://access.redhat.com/security/cve/CVE-2024-3657 - https://bugzilla.redhat.com/show_bug.cgi?id=2274401 |
