Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.123882
Categoría:Oracle Linux Local Security Checks
Título:Oracle: Security Advisory (ELSA-2012-0813)
Resumen:The remote host is missing an update for the '389-ds-base' package(s) announced via the ELSA-2012-0813 advisory.
Descripción:Summary:
The remote host is missing an update for the '389-ds-base' package(s) announced via the ELSA-2012-0813 advisory.

Vulnerability Insight:
[1.2.10.2-15]
- Resolves: Bug 824014 - DS Shuts down intermittently

[1.2.10.2-14]
- Resolves: Bug 819643 - Database RUV could mismatch the one in changelog under the stress
-- patch 0015 fixes a small memleak in previous patch

[1.2.10.2-13]
- Resolves: Bug 822700 - Bad DNs in ACIs can segfault ns-slapd

[1.2.10.2-12]
- Resolves: Bug 819643 - Database RUV could mismatch the one in changelog under the stress
- Resolves: Bug 821542 - letters in object's cn get converted to lowercase when renaming object

[1.2.10.2-11]
- Resolves: Bug 819643 - Database RUV could mismatch the one in changelog under the stress
- 1.2.10.2-10 was built from the private branch

[1.2.10.2-10]
- Resolves: Bug 819643 - Database RUV could mismatch the one in changelog under the stress

[1.2.10.2-9]
- Resolves: Bug 815991 - crash in ldap_initialize with multiple threads
- previous fix was still crashing in ldclt

[1.2.10.2-8]
- Resolves: Bug 815991 - crash in ldap_initialize with multiple threads

[1.2.10.2-7]
- Resolves: Bug 813964 - IPA dirsvr seg-fault during system longevity test

[1.2.10.2-6]
- Resolves: Bug 811291 - [abrt] 389-ds-base-1.2.10.4-2.fc16: index_range_read_ext: Process /usr/sbin/ns-slapd was killed by signal 11 (SIGSEGV)
- typo in previous patch

[1.2.10.2-5]
- Resolves: Bug 811291 - [abrt] 389-ds-base-1.2.10.4-2.fc16: index_range_read_ext: Process /usr/sbin/ns-slapd was killed by signal 11 (SIGSEGV)

[1.2.10.2-4]
- Resolves: Bug 803930 - ipa not starting after upgrade because of missing data
- get rid of posttrans - move update code to post

[1.2.10.2-3]
- Resolves: Bug 800215 - Certain CMP operations hang or cause ns-slapd to crash

[1.2.10.2-2]
- Resolves: Bug 800215 - Certain CMP operations hang or cause ns-slapd to crash
- Resolves: Bug 800217 - fix valgrind reported issues

[1.2.10.2-1]
- Resolves: Bug 766989 - Rebase 389-ds-base to 1.2.10
- Resolves: Bug 796770 - crash when replicating orphaned tombstone entry

[1.2.10.1-1]
- Resolves: Bug 766989 - Rebase 389-ds-base to 1.2.10
- Resolves: Bug 790491 - 389 DS Segfaults during replica install in FreeIPA

[1.2.10.0-1]
- Resolves: Bug 766989 - Rebase 389-ds-base to 1.2.10

[1.2.10-0.11.rc2]
- Resolves: Bug 766989 - Rebase 389-ds-base to 1.2.10

[1.2.9.16-1]
- Bug 759301 - Incorrect entryUSN index under high load in replicated environment
- Bug 743979 - Add slapi_rwlock API and use POSIX rwlocks
- WARNING - patches 0030 and 0031 remove and add back the file configure
- this is necessary because the merge commit to rebase RHEL-6 to 1.2.9.6
- seriously messed up configure - so in order to add the patch for 743979
- which also touched configure, the file had to be removed and added back
- also note that the commit for the RHEL-6 branch to remove configure does
- not work - the way patch works, it has to match every line exactly in
- order to remove the file, and because the merge commit messed things
- up, it doesn't work
- So, DO ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'389-ds-base' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
2.3

CVSS Vector:
AV:A/AC:M/Au:S/C:N/I:N/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2012-0833
48035
http://secunia.com/advisories/48035
49562
http://secunia.com/advisories/49562
RHSA-2012:0813
http://rhn.redhat.com/errata/RHSA-2012-0813.html
https://fedorahosted.org/389/changeset/1bbbb3e5049c1aa0650546efab87ed2f1ea59637/389-ds-base
https://fedorahosted.org/389/ticket/162
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.