389-ds-base (1.4.0.21-1+deb10u1) buster-security; urgency=medium
authorAnton Gladky <gladk@debian.org>
Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)
committerAnton Gladky <gladk@debian.org>
Mon, 24 Apr 2023 04:08:15 +0000 (05:08 +0100)
commita478cb302275875710a55a32ff51903c3309e395
tree5e7f408673892c7a612e8f086000680143cea453
parentebafa41940888baf819cb6aeee703f2b71e50075
parentc748aa3b5ce4e2fbe24e15a888d122c160517341
389-ds-base (1.4.0.21-1+deb10u1) buster-security; urgency=medium

  * Non-maintainer upload by the LTS Security Team.
  * CVE-2021-4091: double free of the virtual attribute context in
                   persistent search.
  * CVE-2022-0918: an unauthenticated attacker with network access to
                   the LDAP port
                   can cause a denial of service.
  * CVE-2022-0996: expired password was still allowed to access the database.
  * CVE-2022-2850: possible NULL pointer dereference leading to a denial of
                   service.
  * CVE-2021-3652: importing an asterisk as password hashes enables successful
                   authentication with any password, allowing attackers to
                   access accounts with disabled passwords.
  * CVE-2021-3514: an authenticated attacker can crash 389-ds-base using a
                   specially crafted query in sync_repl client, due to a NULL
                   pointer dereference.
  * CVE-2019-14824:deref plugin vulnerability lets authenticated attackers
                   access private attributes, like password hashes, using the
                   'search' permission.
  * CVE-2019-10224:vulnerability that may disclose sensitive information,
                   including the Directory Manager password, when executing
                   dscreate and dsconf commands in verbose mode.and dsconf
                   commands in verbose mode and recording the terminal standard
                   error output.
  * CVE-2019-3883: SSL/TLS requests do not enforce ioblocktimeout limit, leading
                   to DoS vulnerability by hanging all workers with hanging LDAP
                   requests.

[dgit import unpatched 389-ds-base 1.4.0.21-1+deb10u1]
58 files changed:
debian/389-ds-base-dev.install
debian/389-ds-base-legacy-tools.install
debian/389-ds-base-libs.install
debian/389-ds-base-libs.lintian-overrides
debian/389-ds-base.default
debian/389-ds-base.dirs
debian/389-ds-base.install
debian/389-ds-base.links
debian/389-ds-base.lintian-overrides
debian/389-ds-base.postinst
debian/389-ds-base.postrm
debian/389-ds-base.prerm
debian/README.Debian
debian/changelog
debian/cockpit-389-ds.install
debian/compat
debian/control
debian/copyright
debian/missing-sources/bootpopup.js
debian/missing-sources/bootstrap.js
debian/missing-sources/c3.js
debian/missing-sources/d3.js
debian/missing-sources/jquery-1.12.4.js
debian/missing-sources/jquery-3.3.1.js
debian/missing-sources/jquery-ui.js
debian/missing-sources/jquery.dataTables.js
debian/missing-sources/jquery.dataTables.select.js
debian/missing-sources/jquery.dropdown.js
debian/missing-sources/jquery.js
debian/missing-sources/jquery.timepicker.js
debian/missing-sources/jstree.js
debian/missing-sources/moment.js
debian/missing-sources/patternfly.js
debian/patches/CVE-2017-15135.patch
debian/patches/CVE-2019-10224.patch
debian/patches/CVE-2019-14824.patch
debian/patches/CVE-2019-3883.patch
debian/patches/CVE-2021-3514.patch
debian/patches/CVE-2021-3652.patch
debian/patches/CVE-2021-4091.patch
debian/patches/CVE-2022-0918.patch
debian/patches/CVE-2022-0996.patch
debian/patches/CVE-2022-2850.patch
debian/patches/fix-nss-path.diff
debian/patches/fix-obsolete-target.diff
debian/patches/fix-saslpath.diff
debian/patches/fix-systemctl-path.diff
debian/patches/icu_pkg-config.patch
debian/patches/perl-use-move-instead-of-rename.diff
debian/patches/rename-online-scripts.diff
debian/patches/series
debian/patches/use-bash-instead-of-sh.diff
debian/python3-lib389.install
debian/rules
debian/source/format
debian/tests/control
debian/tests/setup
debian/watch