Back to 389-ds-base PTS page

Accepted 389-ds-base 1.4.0.21-1+deb10u1 (source) into oldstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 24 Apr 2023 06:08:15 +0200
Source: 389-ds-base
Architecture: source
Version: 1.4.0.21-1+deb10u1
Distribution: buster-security
Urgency: medium
Maintainer: Debian FreeIPA Team <pkg-freeipa-devel@alioth-lists.debian.net>
Changed-By: Anton Gladky <gladk@debian.org>
Changes:
 389-ds-base (1.4.0.21-1+deb10u1) buster-security; urgency=medium
 .
   * Non-maintainer upload by the LTS Security Team.
   * CVE-2021-4091: double free of the virtual attribute context in
                    persistent search.
   * CVE-2022-0918: an unauthenticated attacker with network access to
                    the LDAP port
                    can cause a denial of service.
   * CVE-2022-0996: expired password was still allowed to access the database.
   * CVE-2022-2850: possible NULL pointer dereference leading to a denial of
                    service.
   * CVE-2021-3652: importing an asterisk as password hashes enables successful
                    authentication with any password, allowing attackers to
                    access accounts with disabled passwords.
   * CVE-2021-3514: an authenticated attacker can crash 389-ds-base using a
                    specially crafted query in sync_repl client, due to a NULL
                    pointer dereference.
   * CVE-2019-14824:deref plugin vulnerability lets authenticated attackers
                    access private attributes, like password hashes, using the
                    'search' permission.
   * CVE-2019-10224:vulnerability that may disclose sensitive information,
                    including the Directory Manager password, when executing
                    dscreate and dsconf commands in verbose mode.and dsconf
                    commands in verbose mode and recording the terminal standard
                    error output.
   * CVE-2019-3883: SSL/TLS requests do not enforce ioblocktimeout limit, leading
                    to DoS vulnerability by hanging all workers with hanging LDAP
                    requests.
Checksums-Sha1:
 afe31edc81eb356f1a60cee407030be566956382 2861 389-ds-base_1.4.0.21-1+deb10u1.dsc
 0da4dd27166f637ec4ded2237edb9a29b6c5bada 9040466 389-ds-base_1.4.0.21.orig.tar.bz2
 846ec2af3d22404fc4600e8592108046c7f50d38 456012 389-ds-base_1.4.0.21-1+deb10u1.debian.tar.xz
 c6ad9e105967b4a93dc26bc30d50cd741f0bde93 8835 389-ds-base_1.4.0.21-1+deb10u1_source.buildinfo
Checksums-Sha256:
 096052071d315949e99f7cbf7e4bf7dce230cc302b29c23aa37b7161c8d3371e 2861 389-ds-base_1.4.0.21-1+deb10u1.dsc
 597b958a5f22dfda4f3b5e975c69a23c1e3818779fa5d0008ebedbd2ca55a1e1 9040466 389-ds-base_1.4.0.21.orig.tar.bz2
 5d479ab84174c1dd765367b131b268324f342c677e19878782dbf8f7e624f07f 456012 389-ds-base_1.4.0.21-1+deb10u1.debian.tar.xz
 d81588555dcd1527125995da401c8962913e46bfe18a938484843f6a0ed128d0 8835 389-ds-base_1.4.0.21-1+deb10u1_source.buildinfo
Files:
 5c3e14f2f657b853f93d642cd8aac949 2861 net optional 389-ds-base_1.4.0.21-1+deb10u1.dsc
 ca85333e9f3525ff7751b8ea28185e86 9040466 net optional 389-ds-base_1.4.0.21.orig.tar.bz2
 1028e539872169efdf01900ea573c123 456012 net optional 389-ds-base_1.4.0.21-1+deb10u1.debian.tar.xz
 c8bb43dd70daa773b3202e01fb39e2d2 8835 net optional 389-ds-base_1.4.0.21-1+deb10u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=KSu+
-----END PGP SIGNATURE-----