File _patchinfo of Package patchinfo.32582
<patchinfo incident="32582"> <issue tracker="bnc" id="1226277">VUL-0: CVE-2024-5953: 389-ds: malformed userPassword hashes may cause a denial of service</issue> <issue tracker="bnc" id="1225507">VUL-0: CVE-2024-2199: 389-ds: malformed userPassword may cause crash at do_modify in slapd/modify.c</issue> <issue tracker="bnc" id="1225512">VUL-0: CVE-2024-3657: 389-ds: potential denial of service via specially crafted kerberos AS-REQ request</issue> <issue tracker="bnc" id="1219836">VUL-0: CVE-2024-1062: 389-ds: 389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr)</issue> <issue tracker="cve" id="2024-5953"/> <issue tracker="cve" id="2024-3657"/> <issue tracker="cve" id="2024-2199"/> <issue tracker="cve" id="2024-1062"/> <packager>firstyear</packager> <rating>important</rating> <category>security</category> <summary>Security update for 389-ds</summary> <description>This update for 389-ds fixes the following issues: - Update to version 2.0.20 - CVE-2024-3657: DOS via via specially crafted kerberos AS-REQ request. (bsc#1225512) - CVE-2024-5953: Malformed userPassword hashes may cause a denial of service. (bsc#1226277) - CVE-2024-2199: Malformed userPassword may cause crash at do_modify in slapd/modify.c. (bsc#1225507) - CVE-2024-1062: Fixed a heap overflow leading to denail-of-servce while writing a value larger than 256 chars in log_entry_attr. (bsc#1219836) </description> </patchinfo>