File _patchinfo of Package patchinfo.15319
<patchinfo incident="15319">
<issue tracker="bnc" id="1171749">L3: TLS1.0 not recognized by ds-389 server</issue>
<packager>firstyear</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for 389-ds</summary>
<description>This update for 389-ds fixes the following issues:
- Resolve TLS 1.0 recognition issue. (bsc#1171749)
- Update from version 1.4.2.12~git0.b11942c36 to version 1.4.2.14~git0.5ac5b02ce:
* Allow using uid for replication manager entry
* Abort operation if CSN can not be generated
* Fix ASAN ODR warnings
* RFE - ds-replcheck - make online timeout configurable
* Remove unnecessary slapi entry dups
* Improve dscreate instance name validation
* Ignore pid when it is ourself in protect_db
* Fix some npm audit issues
* Healthcheck json report fails when mapping tree is deleted
* Container pid start and stop issues
* Fix return code when it's nothing to free
* Abort when a empty valueset is freed
* Memory leaks in dbscan and changelog encryption
* Prevent unnecessarily duplication of the target entry
* Permissions of some shipped directories may change over time
* Fix implementation of attr unique
* Add nsslapd-enable-upgrade-hash to the schema
* Deadlock when updating the schema
* Unable to set sslVersionMin to TLS1.0
* Unable to install server where IPv6 is disabled
* CLI fix consistency issues with confirmations
* React deprecating ComponentWillMount
* Fix npm audit issues
* Heavy StartTLS connection load can randomly fail with err=1
* Transition between two instances needs improvement
* Replace exec() with setattr()
* The check for the ds version for the backend config was broken
* Refactor passwordUserAttributes's and passwordBadWords's code
* slapi_pal.c possible static buffer overflow
* Remove dbmon "incr" option from arg parser
* Port dbmon.sh to dsconf
* Intermittent SSL hang with rhds
* SSCA lacks basicConstraint:CA
* Database links: get_monitor() takes 1 positional argument but 2 were given
* Setting nsslapd-allowed-sasl-mechanisms truncates the value
</description>
</patchinfo>