lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri Jun 9 21:55:05 2006 From: jmforbes at rpath.com (Justin M. Forbes) Subject: rPSA-2006-0099-1 openldap openldap-clients openldap-servers rPath Security Advisory: 2006-0099-1 Published: 2006-06-09 Products: rPath Linux 1 Rating: Minor Exposure Level Classification: Weakness Updated Versions: openldap=/conary.rpath.com@rpl:devel//1/2.2.26-8.3-1 openldap-clients=/conary.rpath.com@rpl:devel//1/2.2.26-8.3-1 openldap-servers=/conary.rpath.com@rpl:devel//1/2.2.26-8.3-1 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2754 http://issues.rpath.com/browse/RPL-423 http://secunia.com/advisories/20126 Description: Previous versions of the openldap server have a weakness reading the openldap status file. This weakness may result in some vulnerability, which may include denial of service or remote privilege escalation when an openldap service is exposed.
Powered by blists - more mailing lists