ALAS2-2019-1262

Related Vulnerabilities: CVE-2019-3883  

It was found that encrypted connections did not honor the 'ioblocktimeout' parameter to end blocking requests. As a result, an unauthenticated attacker could repeatedly start a sufficient number of encrypted connections to block all workers, resulting in a denial of service. (CVE-2019-3883)

ALAS2-2019-1262


Amazon Linux 2 Security Advisory: ALAS-2019-1262
Advisory Release Date: 2019-08-07 23:51 Pacific
Advisory Updated Date: 2019-08-09 13:31 Pacific
Severity: Medium
References: CVE-2019-3883 

Issue Overview:

It was found that encrypted connections did not honor the 'ioblocktimeout' parameter to end blocking requests. As a result, an unauthenticated attacker could repeatedly start a sufficient number of encrypted connections to block all workers, resulting in a denial of service. (CVE-2019-3883)


Affected Packages:

389-ds-base


Issue Correction:
Run yum update 389-ds-base to update your system.

New Packages:
aarch64:
    389-ds-base-1.3.8.4-25.1.amzn2.0.1.aarch64
    389-ds-base-libs-1.3.8.4-25.1.amzn2.0.1.aarch64
    389-ds-base-devel-1.3.8.4-25.1.amzn2.0.1.aarch64
    389-ds-base-snmp-1.3.8.4-25.1.amzn2.0.1.aarch64
    389-ds-base-debuginfo-1.3.8.4-25.1.amzn2.0.1.aarch64

i686:
    389-ds-base-1.3.8.4-25.1.amzn2.0.1.i686
    389-ds-base-libs-1.3.8.4-25.1.amzn2.0.1.i686
    389-ds-base-devel-1.3.8.4-25.1.amzn2.0.1.i686
    389-ds-base-snmp-1.3.8.4-25.1.amzn2.0.1.i686
    389-ds-base-debuginfo-1.3.8.4-25.1.amzn2.0.1.i686

src:
    389-ds-base-1.3.8.4-25.1.amzn2.0.1.src

x86_64:
    389-ds-base-1.3.8.4-25.1.amzn2.0.1.x86_64
    389-ds-base-libs-1.3.8.4-25.1.amzn2.0.1.x86_64
    389-ds-base-devel-1.3.8.4-25.1.amzn2.0.1.x86_64
    389-ds-base-snmp-1.3.8.4-25.1.amzn2.0.1.x86_64
    389-ds-base-debuginfo-1.3.8.4-25.1.amzn2.0.1.x86_64